International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN

Size: px
Start display at page:

Download "International Journal of Computer Engineering and Applications, Volume XIII, Issue II, Feb. 19, ISSN"

Transcription

1 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES Monalisha Sinha ABSTRACT: Department of computer science & engineering Birla institute of technology Ranchi, India Blockchain has gained wide attention in the recent years due to the advantage related to the decentralised and distributed ledger technology. It contains block of chain, and each block is connected to everyone. Each block contains the information of every block. Peer to peer network is trusted by everyone as any single change is seen by everyone. Block-chain is used by every application like IOT (Internet of Things), finance and so on. But still its privacy challenge can temper block-chain applications. The survey of this paper is to highlight the privacy challenges of block-chain. We also highlight the overview of block-chain their working and their applications used in various field. Keywords: Block-chain, Crypto-currency, Privacy, Digital Signature, IOT, Smart contract, Security [1] INTRODUCTION As internet has covers all the industry, same as block-chain will cover all the industry. In the next 2 and 5 years, block-chain will be used by everyone. Marketing, the beginning of this recent era, block-chain has become the innovative innovation in this digital world. The application of blockchain is widely spread from crypto currency to IOT (internet of things) [1] and so on. Bit coin, the digital crypto currency is the first application of block chain application. It is used to exchange money. Bit coin works on peer-to-peer network. In traditional transaction, when we transfer money there is bank in between them but in block-chain there is no centralised user. It is distributed. But in distributed, the main points come in mind is of security and trust. Security can Monalisha Sinha 6

2 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES be achieved by asymmetric cryptography but how can we gain trust. To achieve trust each node will work as ledger and each person present in that node will be able to update and validate the transaction, which will be visible by all of them. This can make trust on each other. [2] CONCEPT OF BLOCK-CHAIN Block-chain is a peer-to -peer network technology, which compromises of several technologies like cryptography, mathematics, algorithm to solve problems of distributed database. The key elements of block-chain make it secure as compared with traditional database. The key elements of block-chain are: - [A]Distributed: Block-chain, P2P (peer-to-peer) network technology [5], where every incoming block are visible by another block in the following node. That incoming block will be verified by all other block in the node, if that block is invalid than it will be discarded otherwise it is added to the chain of block-chain. [B]Transparent: The blocks in the block-chain is seen by all the members present in the chain and if a block is updated then it is also seen by all the members of block-chain. This makes block-chain more secure and transparent. [C]Autonomy: Because of autonomous nature, no single person can control the network. Particularly any person can update and validate the block in the block-chain and view them anytime if they are accepted by other block i.e. members present in that chain in decentralised network. Meanwhile anyone can join the network and a new node will be created. According to consensus property, everyone present in the chain has to trust the entire member in the chain. [D]Immutable: Any block in the block chain cannot be altered by anyone. One has to gain51% of the total node so that he can challenge that block is inaccurate. [3] WORKING OF BLOCK-CHAIN The block-chain works as: - 1. When-ever a new block or an update comes in the chain of block-chain; majority present in the chain verifies the present block and check the history of that block. 2. If the majority in the chain agrees that the history of present block is valid, then that the present block is added to the chain of block-chain. 3. If the majority does not agree of the addition or validation of the block, then that block will be discarded from the chain. Monalisha Sinha 7

3 4. This property of distributed consensus model allows block-chain to be distributed ledger.it means that is no need of centralised database. [4] STRUCTURE OF BLOCK-CHAIN: Block-chain contains of sequence of blocks. That blocks consists of complete list of transactions records and main data, previous block hash, current block hash, timestamp and other information s. Each block present in the block chain points to the previous block and so on and contains the hash of that previous block called the parent block. The first block is called genesis block as it has no parent block and does not contain any hash of previous block. Genesis block only contain hash of its block. The diagram of structure of block-chain is given below: - Block hash Block hash Block hash Time-stamp Time-stamp Time-stamp Previous hash Other information information s GENESIS BLOCK Figure:1. Structure of block-chain Previous hash Other information Previous hash Other information [5] DIGITAL SIGNATURE: Digital signature is an electronic verification of the sender. It serves three purposes: 1. Authentication: a digital signature gives the receiver reason to believe the message was created and sent by the claimed sender. 2. Non-repudiation: with digital signature, the sender cannot deny having sent the message later. 3. Integrity: a digital signature ensures that the message was not altered in transit. It is commonly used for software distribution, financial transaction and other cases where it is important to detect forgery and tampering. Digital signature uses asymmetric cryptography which means public key is employed. In the transaction two keys are created public and private key. Private key is kept with sender and public key is given to receiver. Digest is created by the sender by hashing algorithm. Then the sender encrypts the digest with his private key. This encrypt digest is called digital signature. Elliptic curve digital signature (ECDSA) []is used by the block-chain as digital signature. Monalisha Sinha 8

4 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES [6] CONSENSUS IN BLOCK CHAIN: Firstly, what is consensus and why it is required. The dictionary meaning of consensus is general agreement and this is the exact thing happen in distributed system. The fundamental problem in distributed computing is that how we can achieve overall system reliability in the presence of a number of faulty processes. A consensus algorithm is a process in computer science which is used to achieve agreement among distributed processes or system. Proof of work is the example of consensus algorithm. Consensus algorithms in blockchain are: 1. Proof-of-work (PoW) 2. Proof-of-stake (PoS) 3. Proof-of-elapsed time 4. Byzantine fault tolerance 5. Proof of burn [7] PROOF OF WORK (PoW): Bit coins, devised by Satoshi Nakamoto, uses proof of work consensus algorithm. It does two things:- 1. It ensures that the next block in a block-chain is the one and only version of the truth 2. It keeps powerful adversaries from derailing the system and successfully forking the chain.the benefits of Proof-of-work (PoW) is that it works but since one has to do massive mining operation that means bit coin miner has to solve cryptographic puzzles to get reward and it required huge computational power. Huge amount to time and power is consumed in mining in proof of work. The cons of Proof-of-work (PoW) is that it is located in that place where electricity is cheap, it means its killing the planet and the second is that it is slow, it takes 10 to 16 minutes to do a bit coin transaction which actually tough to scale. Proof-of-work (PoW) runs on the system of longest chain wind it runs on the assumption that most of the miner working on the chain and that chain will grow the faster and the longest. Hence, bit coin is safe if more than 50% of the miners are honest. [8] PROOF-OF-STAKE(PoS) Crypto currencies like bit coin uses enormous amounts of energy to secure their networks, but why are that and more importantly- what are the solutions? Mining new coins takes a lot of computing power because of the proof-of work algorithm. Proof of stake is the solution of proof of work. Proof-of-stake uses an election process in which one node is randomly chosen to validate the next block. proof-of-stake has no miner but instead has validator and it does not let people mine block but instead mint or forge blocks. Validators are not chosen completely randomly. To become a validator, a node has to deposit a certain amount of coins into the network as stake. This is also known as security deposit. The size of the stake determines the chances of the validator to be chosen to forge the next block. [9] TYPES OF BLOCKCHAIN: Block-chain is of three types: Monalisha Sinha 9

5 1. Public block-chain: as the name suggests is the block-chain of public, meaning a kind of blockchain which is for the people, by the people and of the people. Anyone in the chain can participate in updating, validating the blocks. Public block-chain is open and transparent to all, it means anyone can see the transaction in the chain. In public block-chain no one is in charge so decision is made by various decentralised consensus mechanism such as proof of work (PoW) and proof-of- stake (PoS). Bit coin and ethereum are public block-chain. 2. Private block-chain: it is a private property of an individual or an organisation. There is an in charge that can validate and update the transaction. The consensus is achieved on the whims of the central in-charge who can give mining rights to anyone or not giving at all. It is cryptographic secured. 3. Consortium block-chain: In consortium block-chain, instead of having one in-charge, there is more than one in-charge. Basically, it is done in group of companies or representatives individuals coming together and making decision for the best benefit of the whole network. [10]APPLICATION OF BLOCK-CHAIN: 1. CRYPTOCURRENCY: BIT COIN Bit coin is a digital currency [2][3][4] which aims to do away with all the problems we have paying for things online. It is the electronic cash which does not depends on any bank. Money is transfer through peer-to-peer network. Bit coin is extremely fast instead of traditional bank. When we send money to someone, we can t get it back. This seems that no one can blame that they can t get their money. 2. SMART CONTRACT Smart contract, also called distributed apps) are very popular. It uses distributed ledger to store contracts. It is same as contract in the real world. The difference is that it is digital. It is tiny program that is stored in block-chain [6][8] 3. HYPERLEDGER Hyper-ledger is not a crypto currency, a block-chain and not a company. It is the project under Linux foundation. It is the open-source development project where people from all over the planet can come and help hyper-ledger to get developed as software and as a platform. It is the open sourced community of communities. 4. IOT IOT continues to grow at a rapid rate sensors and devices are becoming more common place to communicate information in business networks where data such as location temperature or other properties need to be shared a permission block-chain ledger can help create a tamper evident record this opens up new ways of automatic business processes among partner without having to set up a costly centralized It infrastructure and all participate have access to the same data. IOT permits packets transmit required status information as it passes through multiple carriers. the business contract specifies the conditions that must be met during the shipment from the factory to the grocery store and all parties must adhere to the term of the contract, a temperature sensor embedded in the package stores the data locally and sends it to the block-chain through the IOT platform, add weight points upon receiving connectivity information is shared across all peers. In this example, both carrier1 and carrier2 met the contractual obligation and the shipment arrived at its destination without exposure to access temperature using block-chain allows all the business partner to access the same temperature data without requiring central control. Monalisha Sinha 10

6 BLOCK-CHAIN: SURVEY ON PRIVACY, SECURITY AND CHALLENGES [11] SECURITY AND CHALLENGES Now mobile phones are also not safe. They are openly to various attacks. There are number of ways to detect the data such as pattern matching, which are stored in centralised server. So centralized server is also vulnerable for theft of data. Block-chain has helped the security of distributed network [7] 1. 51% attacks: It is the attack on a block-chain i.e. bit coin. In this attack, miners takes control more than 50% of the networks which helps them to prevent new transaction from getting permission to be added in the chain. They could also reverse the transactions that were already completed. Therefore, this could result in double-spending. 2. Fork problems in block-chain Cryptographic key that moves memory, the rules by which the memory is moved are set by the miner itself. So, rules are understood and if rules are changed, then fork is done, and the entire miner needs to agree about the new rules. There are two types of fork Hard fork In hard fork, it only accepts the new nodes, old nodes are made invalid. Updated version must be upgraded. One Path only follow the new and updated path while another path follows the old path. Soft fork In soft fork, previous valid blocks are made invalid. Soft fork requires majority of the miner updating the new rules and likes hard forks only new version is accepted. 3. Block-chain scale As the number of transaction increases, the chain of block-chain will increases and it will take a lot of times and computing power. 4. Block-chain confirmation time Traditional bank takes almost 2-3 days for transaction of money, but block-chain takes nearly 2-3 min to transfer the money. But still some factors are missing in it. [12] CONCLUSION As block-chain is increasing day by day, there are some advantages and disadvantages of blockchain too. People should be made aware about the block-chain technologies. Government should take care regarding their disadvantages and makes new laws so that this technology should change the digital world which should prevent misbehaves. [13] AKNOWLEDGEMENT I would like to thank the Computer Science department at BIT Mesra, Ranchi to provide me deep knowledge regarding block-chain. This helped me a lot in doing survey regarding this paper. Monalisha Sinha 11

7 REFERENCES [1] A. Dorri, S. S. Kanhere, and R. Jurdak, Blockchain in internet of things: challenges and solutions, arxiv preprint arxiv: , [2] D. Genkin, D. Papadopoulos, and C. Papamanthou, Privacy in decentralized cryptocurrencies, Communications of the Acm, vol. 61, no. 6, pp , [3] S. Meiklejohn and C. Orlandi, Privacy-Enhancing Overlays in Bit- coin. Springer Berlin Heidelberg, [4] J. Ylihuumo, D. Ko, S. Choi, S. Park, and K. Smolander, Where is current research on blockchain technology?a systematic review, Plos One, vol. 11, no. 10, p. e , [5] S. King and S. Nadal, Ppcoin: Peer-to-peer Crypto-Currency with Proof-of-Stake, [6] A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Pa- pamanthou, Hawk: The blockchain model of cryp tography and privacy-preserving smart contracts, in 2016 IEEE Symposium on Security and Privacy (SP 16), pp , May [7] Iuon-Chang Lin1,2 and Tzu-Chun Liao, A Survey of Blockchain Security Issues and Challenges, International Journal of Network Security, Vol.19, No.5, PP , Sept [8] H. Watanabe, S. Fujimura, A. Nakadaira, Y. Miyazaki, A. Akutsu, and J. Kishigami, Blockchain contract: Securing a blockchain ap- plied to smart contracts, in IEEE International Conference on Consumer Electronics (ICCE 16), pp , Jan Monalisha Sinha 12

ENEE 457: E-Cash and Bitcoin

ENEE 457: E-Cash and Bitcoin ENEE 457: E-Cash and Bitcoin Charalampos (Babis) Papamanthou cpap@umd.edu Money today Any problems? Cash is cumbersome and can be forged Credit card transactions require centralized online bank are not

More information

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017 Distributed Ledger Technology & Fintech Applications Hart Montgomery, NFIC 2017 Let s consider a common scenario: Banks want to trade some asset class Participants in the market want to be able to efficiently

More information

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards

The game If you listen very carefully during the first 4 cards (or use the cheat sheet) you will get an advantage on the last 5 cards The blockchain game GAMEMASTER NOTES Time: 10 minutes The game: up to 9 info/question cards + a short test with 7 questions Reward: The game If you listen very carefully during the first 4 cards (or use

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University March 30 2017 Outline Digital currencies Advantages over paper cash

More information

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold

Smalltalk 3/30/15. The Mathematics of Bitcoin Brian Heinold Smalltalk 3/30/15 The Mathematics of Bitcoin Brian Heinold What is Bitcoin? Created by Satoshi Nakamoto in 2008 What is Bitcoin? Created by Satoshi Nakamoto in 2008 Digital currency (though not the first)

More information

Proof of Stake Made Simple with Casper

Proof of Stake Made Simple with Casper Proof of Stake Made Simple with Casper Olivier Moindrot ICME, Stanford University olivierm@stanford.edu Charles Bournhonesque ICME, Stanford University cbournho@stanford.edu Abstract We study the recent

More information

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019

Computer Security. 14. Blockchain & Bitcoin. Paul Krzyzanowski. Rutgers University. Spring 2019 Computer Security 14. Blockchain & Bitcoin Paul Krzyzanowski Rutgers University Spring 2019 April 15, 2019 CS 419 2019 Paul Krzyzanowski 1 Bitcoin & Blockchain Bitcoin cryptocurrency system Introduced

More information

I. Introduction. II. Security, Coinage and Attacks

I. Introduction. II. Security, Coinage and Attacks Abstract Proof of Stake's security has proven itself over years of testing. Advances in this technology in Blackcoin's Proof-of-Stake 3.0 have solved the issues faced with Coin-Age, Block Reward and Blockchain

More information

Chapter 13. Digital Cash. Information Security/System Security p. 570/626

Chapter 13. Digital Cash. Information Security/System Security p. 570/626 Chapter 13 Digital Cash Information Security/System Security p. 570/626 Introduction While cash is used in illegal activities such as bribing money laundering tax evasion it also protects privacy: not

More information

Proof-of-Stake Protocol v3.0

Proof-of-Stake Protocol v3.0 Proof-of-Stake Protocol v3.0 Abstract Proof of Stake's security has proven itself reliable & effective over years of testing while at the same time solving Bitcoin s issues caused by the Proof of Work

More information

Let's build a blockchain!

Let's build a blockchain! I'm Haseeb. That's me. Let's build a blockchain! A mini-cryptocurrency in Ruby I'm Haseeb Qureshi. I'm a software engineer. I'm working at a blockchain company called 21.co. Unless something terrible has

More information

Problem: Equivocation!

Problem: Equivocation! Bitcoin: 10,000 foot view Bitcoin and the Blockchain New bitcoins are created every ~10 min, owned by miner (more on this later) Thereafter, just keep record of transfers e.g., Alice pays Bob 1 BTC COS

More information

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University

CS 4770: Cryptography. CS 6750: Cryptography and Communication Security. Alina Oprea Associate Professor, CCIS Northeastern University CS 4770: Cryptography CS 6750: Cryptography and Communication Security Alina Oprea Associate Professor, CCIS Northeastern University April 9 2018 Schedule HW 4 Due on Thu 04/12 Programming project 3 Due

More information

Introduction to Bitcoin I

Introduction to Bitcoin I Introduction to Bitcoin I P Peterlongo 1 A Tomasi 1 1 University of Trento Department of Mathematics June 10, 2013 Outline 1 Fiat and online payments Functions of Online payments and cost of clearing 2

More information

Blockchains & Cryptocurrencies

Blockchains & Cryptocurrencies 1 Blockchains & Cryptocurrencies A Technical Introduction Lorenz Breidenbach ETH Zürich Cornell Tech The Initiative for CryptoCurrencies & Contracts (IC3) 2 Cryptocurrency Mania Market cap as of yesterday:

More information

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services

ECC: Peer-to-Peer Electronic Cash with Trustless Network Services ECC: Peer-to-Peer Electronic Cash with Trustless Network Services Greg Griffith October 2017 (griffith@cryptounited.io) https://www.ecc.network ECC: Peer-to-Peer Electronic Cash with Trustless Network

More information

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices

A Review on Blockchain Application for Decentralized Decision of Ownership of IoT Devices Advances in Computational Sciences and Technology ISSN 0973-6107 Volume 10, Number 8 (2017) pp. 2449-2456 Research India Publications http://www.ripublication.com A Review on Blockchain Application for

More information

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake.

DEV. Deviant Coin, Innovative Anonymity. A PoS/Masternode cr yptocurrency developed with POS proof of stake. DEV Deviant Coin, Innovative Anonymity A PoS/Masternode cr yptocurrency developed with POS proof of stake. CONTENTS 03 Overview 06 Pre-mine phase 07 Privacy 08 Basic parameters 09 Proof-of-stake The benefits

More information

Blockchain Based E-Voting Recording System Design

Blockchain Based E-Voting Recording System Design Blockchain Based E-Voting Recording System Design Rifa Hanifatunnisa (Author) School of Electrical Engineering and Informatics Bandung Institute of Technology Bandung, West Java, Indonesia rifahani@students.itb.ac.id

More information

Key concepts of blockchain

Key concepts of blockchain Advisory A brief history of blockchains 2008 The mysterious Satoshi Nakamoto publishes his Bitcoin white paper 2014 2017 Nov. 23 rd Ethereum crowd sale Number of crypto tokens: 1.172 BTC $8.216 The first

More information

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany Blockchain without Bitcoin Muralidhar Gopinath October 19, 2017 University at Albany What is Blockchain? Contains records (blocks) that are linked (chained) to one another using cryptography Each block

More information

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract

On the impact of propogation delay on mining rewards in Bitcoin. Xuan Wen 1. Abstract On the impact of propogation delay on mining rewards in Bitcoin Xuan Wen 1 Abstract Bitcoin 2 is a decentralized digital currency that is rapidly gaining in popularity. The Bitcoin system relies on miners

More information

An Introduction to Blockchain and Distributed Ledger Technology

An Introduction to Blockchain and Distributed Ledger Technology An Introduction to Blockchain and Distributed Ledger Technology Ron van der Meyden UNSW School of Computer Science and Engineering The source of the buzz Bitcoin: A Peer-to-Peer Electronic Cash System,

More information

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts. Yashar Dehkan Asl Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts Yashar Dehkan Asl Chapter I Introduction Decentralized Cryptocurrencies: Such as Bitcoin and altcoins are getting more

More information

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini

Blockchain. CS 240: Computing Systems and Concurrency Lecture 20. Marco Canini Blockchain CS 240: Computing Systems and Concurrency Lecture 20 Marco Canini Credits: Michael Freedman and Kyle Jamieson developed much of the original material. Bitcoin: 10,000 foot view New bitcoins

More information

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW

BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW BITCOIN PROTOCOL & CONSENSUS: A HIGH LEVEL OVERVIEW Rustie Lin Wang Move the area1 over the image a little inside and then right click, replace image to change the background. (and delete this box while

More information

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air -

BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - BBc-1 : Beyond Blockchain One - An Architecture for Promise-Fixation Device in the Air - Kenji Saito and Takeshi Kubo {ks91 t-kubo}@beyond-blockchain.org Revision 0.1 October 31, 2017 1 Introduction Blockchain

More information

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman

Bitcoin. CS6450: Distributed Systems Lecture 20 Ryan Stutsman Bitcoin CS6450: Distributed Systems Lecture 20 Ryan Stutsman Material taken/derived from Princeton COS-418 materials created by Michael Freedman and Kyle Jamieson at Princeton University. Licensed for

More information

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins. Introduction With the circulation of cryptocurrency becoming common, there is a need for additional information. The scope of this white paper is to provide that information. If you are under the impression

More information

Blockchain! What consultants should know about it. Daniel

Blockchain! What consultants should know about it. Daniel Blockchain! What consultants should know about it. Daniel Karzel @ Workshop Overview Quick overview of what is planned for the workshop. What you get out of this workshop Workshop goals Understand what

More information

Burstcoin Technical information about mining and block forging

Burstcoin Technical information about mining and block forging Burstcoin Technical information about mining and block forging Table of contents 1. Introduction 2. Algorithms and Acronyms 3. Mining process 4. Block forging process Introduction With most cryptocurrencies

More information

Who wants to be a millionaire? A class in creating your own cryptocurrency

Who wants to be a millionaire? A class in creating your own cryptocurrency DEVNET-3626 Who wants to be a millionaire? A class in creating your own cryptocurrency Tom Davies, Sr. Manager, DevNet Sandbox Vallard Benincosa, Software Engineer Cisco Spark How Questions? Use Cisco

More information

Bitcoin, a decentralized and trustless protocol

Bitcoin, a decentralized and trustless protocol Bitcoin, a decentralized and trustless protocol Thomas Sibut-Pinote Inria Saclay February 12, 2015 Thomas Sibut-Pinote Bitcoin, a decentralized and trustless protocol 1 / 42 Introduction Questions 1 Introduction

More information

GENESIS VISION NETWORK

GENESIS VISION NETWORK GENESIS VISION NETWORK Contents 1. Description of the problem 7 11. Trust management 15 2. The problem with smart contracts 8 12. GVN Token 16 3. Centralised exchanges against decentralised 8 13. Deposit

More information

SpaceMint Overcoming Bitcoin s waste of energy

SpaceMint Overcoming Bitcoin s waste of energy Bitcoin Overcoming Bitcoin s waste of energy Georg Fuchsbauer joint work with S Park, A Kwon, K Pietrzak, J Alwen and P Gaži Digital currency Decentralized (no bank issuing coins) Pseudonymous Controled

More information

BLOCKCHAIN ARCHITECT Certification. Blockchain Architect

BLOCKCHAIN ARCHITECT Certification. Blockchain Architect BLOCKCHAIN ARCHITECT Certification Blockchain Architect The Next-Gen IT Academy from Arcitura is dedicated to providing an ever-growing variety of training courses and accreditations in contemporary technologies

More information

Bitcoin and Blockchain

Bitcoin and Blockchain Bitcoin and Blockchain COS 418: Distributed Systems Lecture 18 Zhenyu Song [Credit: Selected content adapted from Michael Freedman. Slides refined by Chris Hodsdon and Theano Stavrinos] Why Bitcoin? All

More information

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology 2 nd Advanced Workshop on Blockchain, IIT Bombay Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology Sivakumar.P M.Tech (CSE), Sem-III, NIT Trichy Guide:- Dr Kunwar

More information

Introduction to Cryptoeconomics

Introduction to Cryptoeconomics Introduction to Cryptoeconomics What is cryptoeconomics? Cryptoeconomics is about... Building systems that have certain desired properties Use cryptography to prove properties about messages that happened

More information

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY BLOCKCHAIN EVOLVED THE PROBLEM SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY An overall lack of governance is one of the most challenging facets of current blockchain ecosystems Controversy regarding scalability

More information

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK

BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK Informatiemanagement: BYZANTINE CONSENSUS THROUGH BITCOIN S PROOF- OF-WORK The aim of this paper is to elucidate how Byzantine consensus is achieved through Bitcoin s novel proof-of-work system without

More information

primechain building blockchains for a better world

primechain building blockchains for a better world primechain building blockchains for a better world The nuts and bolts of blockchain technology Rohas Nagpal, Primechain Technologies Pvt. Ltd. The nuts and bolts of blockchain technology Depending upon

More information

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose... Table Of Contents Introduction... 1 Blockchain and Cryptocurrency...1 Stellar (payment network)...2 Internet and its issues...3 LocalXpose... 5 How LocalXpose Actually works?...6 Why to use LocalXpose?...7

More information

Reliability, distributed consensus and blockchain COSC412

Reliability, distributed consensus and blockchain COSC412 Reliability, distributed consensus and blockchain COSC412 Learning objectives Encourage you to always design for failure Appreciate how decentralised consensus is useful to support principles of security

More information

Hyperledger fabric: towards scalable blockchain for business

Hyperledger fabric: towards scalable blockchain for business Marko Vukolić, IBM Research - Zurich Hyperledger fabric: towards scalable blockchain for business Trust in Digital Life The Hague, Netherlands, June 17 2016 Blockchain shared, replicated, ledger Consensus

More information

Consensus & Blockchain

Consensus & Blockchain Consensus & Blockchain S P Suresh Chennai Mathematical Institute Formal Methods Update Meeting IIT Mandi July 17, 2017 The Bitcoin revolution is upon us What is Bitcoin? Bitcoin: an exciting new currency

More information

Introduc)on to Bitcoin

Introduc)on to Bitcoin Introduc)on to Bitcoin CONTENTS What is Bitcoin Who created it? Who prints it? How does Bitcoin work? The characteris5cs of Bitcoin WHAT IS BITCOIN Bitcoin is a form of digital currency, created and held

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April

BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April BlockFin A Fork-Tolerant, Leaderless Consensus Protocol April 2018 @storecoin What are the most desirable features in a blockchain? Scalability (throughput) and decentralization (censorship resistance),

More information

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula

Security Analysis of Bitcoin. Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Dibyojyoti Mukherjee Jaswant Katragadda Yashwant Gazula Security Analysis of Bitcoin Introduction How Bitcoin works? Similar peer-to-peer systems Vulnerabilities and solutions

More information

Whitepaper Rcoin Global

Whitepaper Rcoin Global Whitepaper Rcoin Global SUMMARY 1. Introduction 2. What is Rcoin Global? 3. Transactions 4. Hybrid Network Concept 5. Keepers 6. Incentive 7. Smart Contract Token 8. Token Distribution 9. Rcoin Global

More information

REM: Resource Efficient Mining for Blockchains

REM: Resource Efficient Mining for Blockchains REM: Resource Efficient Mining for Blockchains Fan Zhang, Ittay Eyal, Robert Escriva, Ari Juels, Robbert van Renesse Vancouver, Canada 13 September 2017 USENIX Security 2017 1 The Cryptocurrency Vision

More information

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner.

Table of contents. Technical Features. Our approach. Technical Overview. Stage 1 (Using Ethereum blockchain) Participants. Data Owner. Table of contents Technical Features Our approach Technical Overview Stage 1 (Using Ethereum blockchain) Participants Data Owner Data Verifier Marketplace Data Buyer Creditor Data Platform Architecture

More information

EECS 498 Introduction to Distributed Systems

EECS 498 Introduction to Distributed Systems EECS 498 Introduction to Distributed Systems Fall 2017 Harsha V. Madhyastha Today Bitcoin: A peer-to-peer digital currency Spark: In-memory big data processing December 4, 2017 EECS 498 Lecture 21 2 December

More information

White Paper. Blockchain alternatives: The case for CRAQ

White Paper. Blockchain alternatives: The case for CRAQ White Paper Blockchain alternatives: The case for CRAQ Blockchain technology continues to gain attention as the foundation of the bitcoin economy. Given the rapid gain in popularity of bitcoin, it s no

More information

Blockchain and Additive Manufacturing

Blockchain and Additive Manufacturing Blockchain and Additive Manufacturing January 10, 2019 Presentation to the South Texas Section, AIChE Lisa M. Smith Chief Corporate Development Officer Data Gumbo Corporation Blockchain Basics Data Gumbo

More information

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ)

Data Consistency and Blockchain. Bei Chun Zhou (BlockChainZ) Data Consistency and Blockchain Bei Chun Zhou (BlockChainZ) beichunz@cn.ibm.com 1 Data Consistency Point-in-time consistency Transaction consistency Application consistency 2 Strong Consistency ACID Atomicity.

More information

BLOCKCHAIN The foundation behind Bitcoin

BLOCKCHAIN The foundation behind Bitcoin BLOCKCHAIN The foundation behind Bitcoin Sourav Sen Gupta Indian Statistical Institute, Kolkata CRYPTOGRAPHY Backbone of Blockchain Technology Component 1 : Cryptographic Hash Functions HASH FUNCTIONS

More information

Blockchain (de)constructed

Blockchain (de)constructed Blockchain (de)constructed Fritz Henglein Department of Computer Science, University of Copenhagen (DIKU) DIKU Business Club meeting on blockchain January 11th, 2016 Fritz Henglein Professor of programming

More information

Security: Focus of Control

Security: Focus of Control Security: Focus of Control Three approaches for protection against security threats a) Protection against invalid operations b) Protection against unauthorized invocations c) Protection against unauthorized

More information

What is Proof of Work?

What is Proof of Work? What is Proof of Work? Educational Series September 18, 2018 Overview There are many protocols that regulate how nodes on a blockchain achieve consensus, and currently the most popular is proof-of-work.

More information

The security and insecurity of blockchains and smart contracts

The security and insecurity of blockchains and smart contracts The security and insecurity of blockchains and smart contracts Jean-Pierre Flori, expert in cryptography, Agence Nationale de la Sécurité des Systèmes d Information (ANSSI) In J.P. Dardayrol, editor of

More information

A Blockchain-based Mapping System

A Blockchain-based Mapping System A Blockchain-based Mapping System IETF 98 Chicago March 2017 Jordi Paillissé, Albert Cabellos, Vina Ermagan, Fabio Maino jordip@ac.upc.edu http://openoverlayrouter.org 1 A short Blockchain tutorial 2 Blockchain

More information

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING

EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING EVALUATION OF PROOF OF WORK (POW) BLOCKCHAINS SECURITY NETWORK ON SELFISH MINING I Gusti Ayu Kusdiah Gemeliarana Department of Electrical Engineering University of Indonesia Depok, Indonesia i.gusti79@ui.ac.id

More information

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente)

CONSENSUS PROTOCOLS & BLOCKCHAINS. Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) CONSENSUS PROTOCOLS & BLOCKCHAINS Techruption Lecture March 16 th, 2017 Maarten Everts (TNO & University of Twente) 2 Consensus protocols & blockchain 3 Consensus protocols & blockchain 4 Consensus protocols

More information

Formally Specifying Blockchain Protocols

Formally Specifying Blockchain Protocols Formally Specifying Blockchain Protocols 1 IOHK company building blockchain applications research focused invested in functional programming built Cardano network, Ada cryptocurrency 2 Blockchain Protocols

More information

A Lightweight Blockchain Consensus Protocol

A Lightweight Blockchain Consensus Protocol A Lightweight Blockchain Consensus Protocol Keir Finlow-Bates keir@chainfrog.com Abstract A lightweight yet deterministic and objective consensus protocol would allow blockchain systems to be maintained

More information

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa

ICS 421 & ICS 690. Bitcoin & Blockchain. Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa ICS 421 & ICS 690 Bitcoin & Blockchain Assoc. Prof. Lipyeow Lim Information & Computer Sciences Department University of Hawai`i at Mānoa Accepted by: Overstock.com Expedia.com Newegg.com Tigerdirect.com

More information

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS

DAVID ANDREWS, FOUNDER RYATTA BLOCKCHAIN FOUNDATIONS DAVID ANDREWS, FOUNDER RYATTA GROUP, CRYPTOGRAPHY IS THE STUDY OF TECHNIQUES FOR SECURE COMMUNICATION cryptography is defined as the practice and study of techniques for secure communication in the early

More information

Analyzing Bitcoin Security. Philippe Camacho

Analyzing Bitcoin Security. Philippe Camacho Analyzing Bitcoin Security Philippe Camacho philippe.camacho@dreamlab.net Universidad Católica, Santiago de Chile 15 of June 2016 Bitcoin matters Map Blockchain Design Known Attacks Security Models Double

More information

NON-TECHNICAL WHITEPAPER Version 1.0

NON-TECHNICAL WHITEPAPER Version 1.0 NON-TECHNICAL WHITEPAPER Version 1.0 Abstract Decentralization in Cryptocurrency Standard blockchain environments contain many centralization vulnerabilities, such as monolithic development, consensus

More information

Physical Access Control Management System Based on Permissioned Blockchain

Physical Access Control Management System Based on Permissioned Blockchain Physical Access Control Management System Based on Permissioned Blockchain Sara Rouhani Department of Computer Science University of Saskatchewan Saskatoon, Canada sara.rouhani@usask.ca Vahid Pourheidari

More information

The nuts and bolts of blockchain technology

The nuts and bolts of blockchain technology The nuts and bolts of blockchain technology Rohas Nagpal Primechain Technologies Pvt. Ltd. rohas@primechain.in Abstract: Blockchain technology has earned the respect of Governments and banks around the

More information

Realization and Addressing Analysis In Blockchain Bitcoin

Realization and Addressing Analysis In Blockchain Bitcoin IOP Conference Series: Materials Science and Engineering PAPER OPEN ACCESS Realization and Addressing Analysis In Blockchain Bitcoin To cite this article: Raja Sakti Arief Daulay et al 2017 IOP Conf. Ser.:

More information

Distributed Ledger With Secure Data Deletion

Distributed Ledger With Secure Data Deletion Distributed Ledger With Secure Data Deletion Vitalii Demianets (norbloc AB), Astyanax Kanakakis (norbloc AB) Revision 1.4, November 2016 Abstract One of the core attributes of distributed ledgers, the

More information

BaFin-Tech 2018 BlockChain & Security (from #developerview)

BaFin-Tech 2018 BlockChain & Security (from #developerview) BaFin-Tech 2018 BlockChain & Security (from #developerview) DLT Lab 10 th April 2018 sven.lehnert@main-incubator.com, @itnext_de Experiences from practice Agenda: Blockchain Security 1 Theory: Blockchain

More information

Blockchain, cryptography, and consensus

Blockchain, cryptography, and consensus ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,

More information

IoT security based on the DPK platform

IoT security based on the DPK platform Zz S E C U M O B I. WHITE PAPER IoT security based on the DPK platform Powered by Ethereum David Khoury Elie Kfoury ABSTRACT Public key distribution remains one of the main security weaknesses in many

More information

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake.

Neel Gupte. Index Terms Bitcoin, Cryptocurreny, Block Chain, Hashing, Proof-of-Work, Double-spending, Momentum Method, Proof of Stake. International Journal of Scientific & Engineering Research, Volume 6, Issue 9, September-2015 259 An Analysis of the Hash-Based Proof-of-Work Chain in the Bitcoin Network Neel Gupte Abstract A Bitcoin

More information

KDC COIN WHITEPAPER KDC COIN WHITEPAPER.

KDC COIN WHITEPAPER KDC COIN WHITEPAPER. KDC COIN WHITEPAPER Contents 1.Introduction 2.Key technologies 2.1 Proof-of-stake 2.1.1 Comparison of POW and DPOS 2.1.2 Encryption 2.1.3 Blocks and block creation 2.1.4 Coins and forging process 2.1.5

More information

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. Prelude The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency. This document will explain methodically, the details of the

More information

Blockchain Certification Protocol (BCP)

Blockchain Certification Protocol (BCP) Blockchain Certification Protocol (BCP) Fu Yong Quah fuyong@fyquah.me www.fyquah.me Abstract. A semi-decentralized certification system built above the existing 1 Bitcoin network, an innovative peer-to-peer

More information

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto

Ensimag - 4MMSR Network Security Student Seminar. Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto Ensimag - 4MMSR Network Security Student Seminar Bitcoin: A peer-to-peer Electronic Cash System Satoshi Nakamoto wafa.mbarek@ensimag.fr halima.myesser@ensimag.fr 1 Table of contents: I- Introduction: Classic

More information

Ergo platform. Dmitry Meshkov

Ergo platform. Dmitry Meshkov Ergo platform Dmitry Meshkov Prehistory Motivation Theory Practice Provably secure 1000 currencies New features Ad-hoc solutions Impractical Security issues Motivation Theory Provably secure New features

More information

How Formal Analysis and Verification Add Security to Blockchain-based Systems

How Formal Analysis and Verification Add Security to Blockchain-based Systems Verification Add Security to Blockchain-based Systems January 26, 2017 (MIT Media Lab) Pindar Wong (VeriFi Ltd.) 2 Outline of this talk Security Definition of Blockchain-based system Technology and Security

More information

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs

Biomedical and Healthcare Applications for Blockchain. Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Biomedical and Healthcare Applications for Blockchain Tiffany J. Callahan Computational Bioscience Program Hunter/Kahn Labs Network Analysis Working Group 01.25.2018 Outline Introduction to bitcoin + blockchain

More information

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1

Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January Keeping Current 1 Bitcoin (Part I) Ken Calvert Keeping Current Seminar 22 January 2014 2014.01.22 Keeping Current 1 Questions What problem is Bitcoin solving? Where did it come from? How does the system work? What makes

More information

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities

Key Security Issues for implementation of Digital Currency, including ITU-T SG17 activities ITU Workshop on FG DFC Workshop on Standards for Digital Fiat Currency (DFC) () Key Issues for implementation of Digital Currency, including ITU-T SG17 activities Heung Youl Youm, PhD. Chairman of ITU-T

More information

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see)

Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) Blockchain (a.k.a. the slowest, most fascinating database you ll ever see) GOTO Amsterdam 13 June, 2017 Stefan Tilkov, @stilkov I don t know Blockchain and so can you 1. Bitcoin > Practical application

More information

BLOCKCHIAN (BC) is an immutable timestamp ledger of

BLOCKCHIAN (BC) is an immutable timestamp ledger of 1 LSB: A Lightweight Scalable BlockChain for IoT Security and Privacy Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram arxiv:1712.2969v1 [cs.cr] 8 Dec 217 Abstract BlockChain (BC) has attracted

More information

Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues

Bitcoin/Namecoin/*coin: On Bitcoin like protocols and their relation to other IT-Security issues : On Bitcoin like protocols and their relation to other IT-Security issues Aljosha Judmayer ajudmayer@sba-research.org 2014-11-07 SBA Research Area 1 (GRC): Governance, Risk and Compliance P1.1: Risk Management

More information

EXECUTIVE PRODUCT SUMMARY

EXECUTIVE PRODUCT SUMMARY Enterprise Blockchain Infrastructure For Decentralized Internet EXECUTIVE PRODUCT SUMMARY August 10 th 2018 A product by Contents Opportunity....1 Introduction.... 2 Solution.... 3 Microservices Oriented

More information

Technical White Paper. Cube Engine Version 1.0

Technical White Paper. Cube Engine Version 1.0 Technical White Paper Cube Engine Version 1.0 Last Updated: Feb 06. 2018 1 Contents 1. Summary 1) Introduction 2) Overview 2. Features of Cube Chain 1) Cubing 2) Indexing Block 3) Statistics Block 4) Escrow

More information

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote

Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote Elphyrecoin (ELPH) a Private, Untraceable, ASIC-Resistant CryptoCurrency Based on CryptoNote This is the First Version of the Elphyrecoin s White Paper Please Check the Website for Future Updates White

More information

Vladimir Groshev. COO, Project Coordinator.

Vladimir Groshev. COO, Project Coordinator. Vladimir Groshev COO, Project Coordinator If absolute anonymity and complete security is what you are looking for, Then SISHUB is what you need! 1. Anonymous STEEL Messenger 2. Built-in cryptocurrency

More information

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011

University of Duisburg-Essen Bismarckstr Duisburg Germany HOW BITCOIN WORKS. Matthäus Wander. June 29, 2011 University of Duisburg-Essen Bismarckstr. 90 47057 Duisburg Germany HOW BITCOIN WORKS June 29, 2011 Overview Electronic currency system Decentralized No trusted third party involved Unstructured peer-to-peer

More information

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e Token White Paper Global marketplace based on Block chain for small-scale business 1 P a g e 2018 I ver. 1.0 Contents Qatar Coin Token 3 Contents 4 1. What is QatarCoin 5 2. What is a digital currency

More information

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures

Ethereum. Campbell R. Harvey* Duke University and NBER. Ashwin Ramachandran Duke University. Brent Xu ConsenSys. Innovation and Cryptoventures Innovation and Cryptoventures Ethereum Campbell R. Harvey* Duke University and NBER Ashwin Ramachandran Duke University Brent Xu ConsenSys February 12, 2018 1 2 Overview Ethereum Basics Under the hood

More information

Secure Multi Level Encryption with Blockchain in Distributed system

Secure Multi Level Encryption with Blockchain in Distributed system Impact Factor (SJIF): 5.301 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 6, Issue 4, April-2019 Secure Multi Level Encryption

More information