Corpus ID: 4056401

Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger

@article{KokorisKogias2018HiddenIP,
  title={Hidden in Plain Sight: Storing and Managing Secrets on a Public Ledger},
  author={Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gailly and Philipp Jovanovic and Linus Gasser and Bryan Ford},
  journal={IACR Cryptol. ePrint Arch.},
  year={2018},
  volume={2018},
  pages={209}
}
Current blockchain systems are incapable of holding sensitive data securely on their public ledger while supporting accountability of data access requests and revocability of data access rights. Instead, they either keep the sensitive data off-chain as a semi-centralized solution or they just publish the data on the ledger ignoring the problem altogether. In this work, we introduce SCARAB the first secure decentralized access control mechanism for blockchain systems that addresses the… Expand
Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains
TLDR
UWeb is developed, the first provably secure, censorship resistant, cost-efficient storage system with anonymous and private access, built on top of commercial cryptocurrency transactions, and max-rate transactions are introduced, a practical construct to persist data of arbitrary size entirely in a Satoshi blockchain. Expand
Toward Uncensorable , Anonymous and Private Access Over
Providing unrestricted access to sensitive content such as news and software is difficult in the presence of adaptive and resourceful surveillance and censoring adversaries. In this paper we leverageExpand
Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption
TLDR
This work proposes the Atomic Information Disclosure (AID) pattern based on threshold encryption that allows a set of key holders to govern the release of data without having access to it. Expand
Enabling Reliable Keyword Search in Encrypted Decentralized Storage with Fairness
TLDR
This work utilizes the smart contract to record the logs of encrypted search (aka evidence) on the blockchain, and devise a fair protocol to handle disputes and issue fair payments, and craft a concrete scheme that preserves encrypted search capability and enforces ecosystem healthiness. Expand
Brick: Asynchronous State Channels
TLDR
Brick is introduced, the first off-chain construction that remains secure under full asynchrony and an off- chain construction that can provide auditability on top of Brick without conflicting with its privacy guarantees, and the permissioned model of blockchains is considered. Expand
Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains
TLDR
This paper deploys channels for permissioned blockchains to adapt sharding on asset-management applications for the permissioned setting, while preserving liveness and safety even on transactions spanning across-channels. Expand
TRADE: TRusted Anonymous Data Exchange: Threat Sharing Using Blockchain Technology
TLDR
This paper presents TRADE – TRusted Anonymous Data Exchange – a collaborative, distributed, trusted, and anonymized CTI sharing platform based on blockchain technology that allows organizations to preserve their anonymity while keeping organizations fully accountable for their action in the network. Expand
Deployment of a Blockchain-Based Self-Sovereign Identity
  • Q. Stokkink, J. Pouwelse
  • Computer Science
  • 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData)
  • 2018
TLDR
This paper presents a blockchain-based digital identity solution without depending upon a single trusted third party, the proposed solution achieves passport-level legally valid identity and is considered to be fit for adoption by the general public. Expand
A blockchain based approach for the definition of auditable Access Control systems
TLDR
This paper presents the proposed Access Control system in general, but also its application to the innovative reference scenario where the resources to be protected are themselves smart contracts deployed on the Ethereum blockchain. Expand
Blockchain – ICBC 2020: Third International Conference, Held as Part of the Services Conference Federation, SCF 2020, Honolulu, HI, USA, September 18-20, 2020, Proceedings
TLDR
A blockchain based solution for Public Procurement is proposed, which eliminates auctioneers/third-parties using secure multi-party computation (MPC) and fully preserves bid privacy and is secure against malicious bidders. Expand
...
1
2
...

References

SHOWING 1-10 OF 41 REFERENCES
BBDS: Blockchain-Based Data Sharing for Electronic Medical Records in Cloud Environments
TLDR
This work proposes a blockchain-based data sharing framework that sufficiently addresses the access control challenges associated with sensitive data stored in the cloud using immutability and built-in autonomy properties of the blockchain. Expand
Decentralizing Privacy: Using Blockchain to Protect Personal Data
TLDR
A decentralized personal data management system that ensures users own and control their data is described, and a protocol that turns a block chain into an automated access-control manager that does not require trust in a third party is implemented. Expand
Towards Blockchain-based Auditable Storage and Sharing of IoT Data
TLDR
A blockchain-based design for the IoT that brings a distributed access control and data management that empower the users with data ownership and facilitates the storage of time-series IoT data at the edge of the network via a locality-aware decentralized storage system that is managed with the blockchain technology. Expand
Blockstack: A Global Naming and Storage System Secured by Blockchains
TLDR
This paper describes the experiences operating a large deployment of a decentralized PKI service built on top of the Namecoin blockchain, and presents various challenges pertaining to network reliability, throughput, and security that were needed to overcome while registering and updating over 33,000 entries and 200,000 transactions on the Namecoins blockchain. Expand
FairAccess: a new Blockchain-based access control framework for the Internet of Things
TLDR
FairAccess is introduced as a fully decentralized pseudonymous and privacy preserving authorization management framework that enables users to own and control their data in IoT. Expand
Blockchain Based Access Control
TLDR
A new approach based on blockchain technology to publish the policies expressing the right to access a resource and to allow the distributed transfer of such right among users is proposed. Expand
OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding
TLDR
OmniLedger ensures security and correctness by using a bias-resistant public-randomness protocol for choosing large, statistically representative shards that process transactions, and by introducing an efficient cross-shard commit protocol that atomically handles transactions affecting multiple shards. Expand
MedRec: Using Blockchain for Medical Data Access and Permission Management
TLDR
This paper proposes MedRec: a novel, decentralized record management system to handle EMRs, using blockchain technology, and incentivizes medical stakeholders to participate in the network as blockchain “miners”, enabling the emergence of data economics. Expand
Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning
TLDR
CoSi, a scalable witness cosigning protocol ensuring that every authoritative statement is validated and publicly logged by a diverse group of witnesses before any client will accept it, is introduced, offering the first transparency mechanism effective against persistent man-in-the-middle attackers. Expand
CHAINIAC: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds
TLDR
Evaluation of the proposed CHAINIAC framework using real-world data from the PyPI package repository shows that it offers clients security comparable to verifying every single update themselves while consuming only one-fifth of the bandwidth and having a minimal computational overhead. Expand
...
1
2
3
4
5
...