Decentralized secure multiparty computation

Download
2019
Taşcı, Buse
Advances in blockchain technology have led to new applications that aim to eliminate central systems, to improve transparency and user control in transactions whiledealing with the privacy and security challenges. In this thesis, a system which enables users to control their private data and to share chosen data to other parties usingsecure computation techniques is reviewed. Then, we present a blockchain-based digital identity system depending on this architecture. This system ensures that identity information is shared and transmitted confidentially in accordance with their own consent.

Suggestions

A Fully decentralized framework for securely sharing digital content
Demir, Ahmet Serhat; Acar, Aybar Can; Department of Cyber Security (2019)
Blockchain is a secure, immutable, and distributed public ledger that stores transactional data. It enables information transfer without the need for a trusted third party via its decentralized consensus mechanism. Besides finance, blockchain technology has the potential to change several industries, through smart contracts and decentralized applications. This thesis explores using blockchain technology, smart contracts, and Ethereum Web 3.0 stack for secure information and file sharing on a fully decentral...
Analysing Opportunities and Challenges of Integrated Blockchain Technologies in Healthcare
Gökalp, Ebru; Gökalp, Mert Onuralp; Eren, Pekin Erhan (2018-09-20)
Blockchain is a disruptive technology with the potential to have a significant impact on business models and industries, similar to the adoption of Internet. Blockchain promotes distributed, open, inclusive, immutable, and secure architectural approaches, instead of centralized, hidden, exclusive, and alterable alternatives. The adoption of blockchain in the healthcare domain offers promising solutions for securing communications among stakeholders, efficient delivery of clinical reports, and integrating va...
Distributed Content Based Video Identification in Peer-to-Peer Networks: Requirements and Solutions
Koz, Alper; Lagendijk, R. (Inald) L. (2017-03-01)
In this paper, we first discuss the essential requirements for a fingerprint (perceptual hash)-based distributed video identification system in peer-to-peer (P2P) networks in comparison with traditional central database implementations of fingerprints. This discussion reveals that first, fingerprint sizes of existing video fingerprint methods are not compatible with the cache sizes of current P2P clients; second, fingerprint extraction durations during a query are not at tolerable levels for a user in the n...
A Digital Twins Approach to Smart Grid Security Testing and Standardization
Atalay, Manolya; Angın, Pelin (2020-06-01)
The exponential growth of the Internet of Things in recent years has created an ever larger cyber attack surface, introducing new security vulnerabilities for all computerized systems. Among the most significant of those systems are industrial control systems (ICS) consisting of many cyber physical components, and smart grids are a prominent example of ICS, whose failures have potential to cause major disruptions in all aspects of our daily lives. In this paper, we provide an overview of smart grid cybersec...
Blockchain in project management: a systematic review of use cases and a design decision framework
Sönmez, Rifat; Ahmadisheykhsarmast, Salar (2021-11-01)
Blockchain presents a novel technology for improving existing paradigms in a wide span of domains, including project management. In this paper, we first review the state of the art blockchain use cases in project management to reveal the current status of blockchain research and to identify the blockchain application domains in project management. We then present a framework based on the review results, to guide implementers and researchers on blockchain design decisions about privacy, transparency, decentr...
Citation Formats
B. Taşcı, “Decentralized secure multiparty computation,” Thesis (M.S.) -- Graduate School of Applied Mathematics. Cryptography., Middle East Technical University, 2019.