Дисертації з теми "Anonymity of transactions in blockchain"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-22 дисертацій для дослідження на тему "Anonymity of transactions in blockchain".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Бещук, Андрій Андрійович. "Аналіз загроз при повторному використанні налаштування у протоколі GRO-16". Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/34490.
Повний текст джерелаQualification work consists of: 63 pages, 1 picture, 0 tables, 15 sources. Goal of this work is analysis of vulnerabilities zero knowledge proof protocols zk-SNARK type GRO-16 and conditions, in which those vulnerabilities are critical. The object of this research is process of protection personal data while performing transactions in the blockchain. The subject of this research is attacks on personal data protection protocol in blockchain subject to reuse setup. The SETUP stage of zero knowledge proof protocols zk-SNARK type was considered step by step and setup constricting algorithms were developed. Vulnerabilities of generation setup parallelization were analyzed and five types of attack on protocol GRO-16 were developed. They are based on the human factor and the conspiracy of several participants. Also, strategies have been developed to protect against the attacks described in this work, both algorithmic and using third-party devices.
Lawal, Yusuf Lanre. "Anomaly Detection in Ethereum Transactions Using Network Science Analytics." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin159585057190135.
Повний текст джерелаBattaglia, Bruno. "Simulation of Bitcoin Transactions to Identify Money Laundering Activities." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24249/.
Повний текст джерелаTimander, Terese. "Using Blockchain Technology to Improve Security of Financial Transactions - a Design Proposal." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272995.
Повний текст джерелаBlockchainteknik är ett relativt nytt forskningsområde, omgivet av ett stort intresse tack vare de möjligheter tekniken för med sig i termer av ökad säkerhet. Det här arbetet kommer betrakta blockchainteknik såsom det appliceras inom den finansiella industrin. Mer specifikt så resulterar det här projektet i konstruktionen av ett beslutsstödssystem. Detta beslutsstödssystem kommer vara en produkt, likt en miniräknare, vilken banker och andra finansiella institutioner kommer kunna använda sig av om de beslutat implementera blockchainteknik. Således kommer detta projekt resultera i en färdig produkt, detta innefattar dock även att en analys kommer presenteras gällande vilka algoritmer och protokoll som är bäst lämpade för ett dylikt beslutsstödssystem. Ä ven en kommentar gällande de juridiska förutsättningarna kommer inkluderas. Slutligen presenteras resultaten som fås vid användande av den färdiga produkten, liksom en analys av systemets kvalitet och användbarhet.
Löf, Marcus. "Decentralized Transactions in a Centralized Environment : A Blockchain Study Within the Transport Industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210042.
Повний текст джерелаBlockchainteknologin utgör ett område där mycket forskning utförs. Teknologin revolutionerade världen genom kryptovalutan Bitcoin, och sedan dess har nya applikationer av teknologin växt fram. En av applikationerna är att representera verkliga tillgångar som digitala tillgångar på en blockchain, så kallad smart-property. I denna uppsats används smart-property för att lösa kreditvärdighetsproblem som finns inom transportindustrin. En implementation för att påvisa konceptets ändamålsenlighet utförs där smart-property används genom colored coins på Bitcoins blockchain. För att kunna bedöma användbarheten hos lösningen, föreslås även två alternativa lösningar för jämförelse. Krav för en lösning på problemet specificeras i uppsatsen och lösningarna evalueras mot dessa. Alltså undersöker och jämför denna uppsats lösningarnas förmåga att lösa kreditvärdighetsproblemet som motiverar denna uppsats. Aspekterna för evaluering utgörs av: konfidentialitet, integritet, tillgänglighet, konsistens, oförändlighet, responstid, kundnytta, pålitlighet och miljöpåverkan. Slutsatsen som dras är att en lösning baserad på smart-property är adekvat för problemet. Lösningen har dock brister, främst vad gäller konfidentialitet, som däremot inte påverkar problemdomänen.
Johansson, Tom, and Viktor Charpentier. "Blockchain database; technical background and a reconnaissance on an implementation within the banking industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211075.
Повний текст джерелаDalmasso, Loïc. "De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS069.
Повний текст джерелаThe Internet of Things (IoT) is a global infrastructure, aiming to connect any systems of various kinds, to generate new services. While this hyperconnectivity offers many opportunities in many areas (e.g. health, industry, energy, etc.), its deployment represents a major challenge in terms of security and privacy. The use of cryptography becomes essential, particularly to ensure the confidentiality of data. Nevertheless, classical algorithms such as AES are not designed to be embedded in systems with limited resources, such as connected devices. To address this issue, the scientific community is moving towards so-called "lightweight" cryptography. Despite this term, to what extent is it relevant and in line with the resources of the connected objects ? What level of security can it achieve ?Through common metrics, the objective of the first axis of this thesis is to determine the gains of lightweight cryptography compared to the classical one, in terms of size, performance and robustness against side channel analysis, recognized as a major attack vector. This evaluation focuses on the AES- 128 standard and its close lightweight derivatives PRESENT-80/128 and more recent GIFT-64- 128/GIFT-128-128, whose bit-level oriented structure favours hardware implementation. In terms of performances, GIFT-64-128 is positioned as the best alternative, with a reduction in size by almost a factor of 10, for a 58% gain in efficiency over AES-128. In terms of resistance against side channel analysis, CPA in this thesis, lightweight cryptography is once again proving its worth, with PRESENT-128 achieving an increased robustness by a factor of 3 compared to AES-128.Although indispensable, confidentiality alone is not enough to create a secure environment. Facing the emergence of cyber attacks, an IoT ecosystem has to integrate security mechanisms to deal with various threats. In addition, its network topology is becoming conducive to decentralization for efficiency reasons. Without central organization, how can the reliability and security of a highly heterogeneous environment be ensured ?The second part of this thesis proposes a trust protocol, specifically designed for IoT. Inspired by the blockchain concept, several optimizations have been implemented, allowing to reduce the use of resources to a minimum. In an approach centered on network gateways, the results show a reduction in storage space by a factor of 3 000 compared to Bitcoin, as well as a latency divided by 18, for a consumption lower than that of a smartphone charger. Finally, an extension of the protocol is proposed to be embedded in objects. The model focuses on the trust assessment in a close environment, that means on entities where direct communication is possible. With less than 400 bytes, the protocol is capable of evaluating the trust of about ten objects, and up to thirty with only 1 KB
Larsson, Kihlgren Tobias, and Björn Sterner. "New Kids On The Block chain : En kartläggning om svenska bankers syn på blockkedjeteknologin och dess potentiella användningsområden." Thesis, Linköpings universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151038.
Повний текст джерелаBackground: The interest for the first cryptocurrency in the world made the world caught the attention of the technology behind Bitcoin: Blockchain. Blockchain can be described as a decentralized database with no central part controlling its network. Instead, all transactions are registered and verified by the members of the network. This enables digital information to be distributed but not copied in a trustworthy way. The technology therefore has the possibility to create trust between parties that normally does not trust each other and is for that reason considered to have the potential to make many industries, including the banking industry more effective. Amongst a number of financial players that investigate the possible opportunities the technology have for improving their products and services, the optimism is high. Purpose: The purpose of this study is to research which potential fields of application Swedish banks sees for Blockchain and how the technology could be used by the banking industry. The study also intend to analyze the effects the usage of the technology would have on transactions within the Swedish banking industry. Completion: A qualitative research method characterize the study. The empirical data has been collected through a selected sample focused on individuals with knowledge and experience within the field. Conclusion: The study identifies KYC, Smart Contracts and Transactions as potential fields of application for the Swedish banking industry. In particular, KYC was highlighted as an area where the Blockchain technology could help improve managing the personal information of the customer. The study also points out trade finance and interbank-transactions as attractive areas of possible use for the technology. Furthermore, the result of the study shows that the technology should not be seen as a threat against banks role as an intermediary but a technology that enables the banks services to become more efficient. The technology is to be seen as an Emerging technology with high uncertainty today and where the potential impact lays in the future. The biggest threats against an implementation of the technology are that the technology still is in an experimental phase and the shortage of common standards and rules between banks and across countries.
Drozda, Tomáš. "Forenzní analýza sítě Bitcoin." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255465.
Повний текст джерелаLeung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.
Повний текст джерелаProjektet ämnar lösa problemen med oförnekbarhet, integritet och konfidentialitet när man delar känsligt data mellan parter som behöver lita på varandra utan inblanding av betrodd tredje part. Detta diskuteras för att besvara till vilken omfattning digitala resurser kan delas säkert i ett decentraliserat system baserat på publika liggare jämfört med existerande tillitsbaserade alternativ. En undersökning av nuvarande resursdelningslösningar visar att det existerar många tillitsbaserade system men även en växande andel lösningar baserade på publika liggare. En intressant lösning som lyfts fram är Storj som använder sådan teknologi men fokuserar på resurslagring mer är delning. Projektets föreslagna lösning, kallad SecuRES, är ett kommunikationsprotokoll baserat på en publik liggare likt Bitcoin. En prototyp baserad på protokollet har tagits fram som visar att det är möjligt att dela krypterade filer med en eller flera mottagare genom ett decentraliserat nätverk baserat på publika liggare. Slutsatsen som dras är att SecuRES klarar sig utan betrodda tredje parter för att dela resurser medan vissa operationer kan göras mer användarvänliga genom externa autentiseringstjänster. Själva lösningen garanterar integritet av data och medför ytterligare fördelar såsom oförnekbarhet, konfidentialitet och hög transparens då man kan göra källkoden och protocoldokumentation fritt läsbar utan att utsätta systemet för fara. Vidare forskning behövs för att undersöka om systemet kan skalas upp för allmän användning och alltjämt bibehålla säkerhets- samt prestandakrav.
Duarte, João Carlos Ribeiro. "Blockchain Technologies applied to Interbank Transactions." Dissertação, 2019. https://hdl.handle.net/10216/122814.
Повний текст джерелаDuarte, João Carlos Ribeiro. "Blockchain Technologies applied to Interbank Transactions." Master's thesis, 2019. https://hdl.handle.net/10216/122814.
Повний текст джерелаChen, Ming-Hsin, and 陳明心. "An Electronic Commerce Scheme for Anonymity Transactions – a Case of Third Party Payment." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/67wucc.
Повний текст джерела國防大學
資訊管理學系
104
Third-party payment is a new online transaction model in e-commerce to guarantee the logistics and cash flow involved in the transaction process. It provides a trust mechanism for online transactions. In addition to ensuring fair exchange, how to guarantee the customer anonymity of online transactions is an important issue. If customer information cannot be kept safely, the customer's transaction information may be leaked and even illegally abused. This study proposes a new e-commerce protocol, and the new protocol is designed for trading digital goods through a third-party payment model. It not only ensures fair exchange, but also retains customer anonymity. This study adopts the elliptic curve cryptography (ECC) to strengthen the security of the online transaction process. In particular, self-authentication and blind signature schemes are incorporated into the proposed scheme to avoid the counterfeiting of user identity during the certificate issuing process, and also to reduce the cost and risk of public key storage, computation and management. Through the rigorous analysis, the proposed solution has three main advantages: (1) achieving the same security strength by using a shorter key; (2) simplifying the certification process by a self-authentication scheme; (3) fulfilling the basic information security requirements including confidentiality, integrity, authenticity, non-repudiation, customer anonymity and fairness.
Liu, Ding-Chyu, and 劉定衢. "A Fair-exchange and Customer-anonymity Electronic Commerce Protocol for Digital Content Transactions." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/41352782963251201986.
Повний текст джерела國立中央大學
資訊管理研究所
96
Fair exchange and customer anonymity are two important characteristics that e-commerce protocols are needed to address. However, the majority of the existing protocols only focus on fair exchange, and few of them discuss customer anonymity. This research adopts state-of-the-art cryptography techniques, uses the pay-per-use business model, combines the off-line arbitrator and the bank, and then proposes a new e-commerce protocol for digital contents transactions. This new protocol can ensure both characteristics and remedy the flaws of the related protocols. The proposed e-commerce protocol consists of negotiating, withdrawing, purchasing and arbitrating phases. By scrupulous protocol analysis, it can achieve fair exchange, customer anonymity and payment security. Compared with the most related protocol, the new protocol has better efficiency. Besides protocol analysis, this research uses “protocol prototype” and “model checking” to do thorough verifications. The protocol prototype proves that the new protocol is workable when it is implemented in the real world. By experimental designs, this research identifies the length of asymmetric keys as the main factor to affect protocol performance. The model-checking result shows that the new protocol does indeed have the desirable properties for fairness. This research also introduces failures into communication processes and participant processes and then obtains counterexamples by the FDR. This research extends the new protocol based on these counterexamples. Protocol extensions can provide protocol participants with the capability for failure resilience. Through three kinds of verification methods, this research proves that the new protocol is well-designed. This research also expects that the new protocol has significant potential for flourishing e-commence transactions because it can keep customer anonymity.
Hsu, Yu-Hsiang, and 徐煜翔. "The study on blockchain smart contracts for e-book digital rights transactions." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5rq82n.
Повний текст джерела國立中興大學
資訊管理學系所
106
Since 2011, Amazon company announced that its electronic books sales were more than paper books. The electronic book market has been increasingly valued by publishers and authors. Not only more and more publishers and authors make paper books into electronic books and sell through the Internet, but also a growing number of electronic book service platform emerge and sell electronic books for them. For readers, not only they can easily buy electronic books on electronic book service platforms, but also can read them through mobile phones or other devices anytime and anywhere. Due to the current electronic book sales model, all readers, authors and publishers must highly rely on electronic book service platforms to merchandise. For authors and publishers, they not only are necessary to cover publication fees, but their sales revenue be charged by the service platforms. For readers, after buying and reading the electronic books, there is no way to resell the digital rights and only can be stored in cloud bookcases on the service platforms. Therefore, this study will build a smart contract operation system based on the ethereum blockchain to improve the above problems. Through this system, it can provide readers, authors and publishers with more direct electronic book transaction without heavily relying on the service platform. And it will enable readers to make further use of the digital rights of the electronic books.
Chen, Yi-Jhih, and 陳怡之. "A Study of Critical Success Factors of Blockchain Application for Financial Transactions." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/25946429950184849883.
Повний текст джерела國立中興大學
資訊管理學系所
105
The blockchain technology in financial technology industry has proposed that the disintermediation transaction mechanism consists of such characteristics: consensus, provenance, immutability, finality, and other key features. It has become one of the trusted financial technologies. Many advanced countries have invested a lot of resources in its research and development. The motivation of the research aims to deeply investigate blockchain consortia and financial technology market platforms developed based on blockchain technology, including formulation of related policies and regulations, promotion targets of financial service, and applications of transaction information streams. On the basis of case study and literature analysis methods, the research performed case analysis of the data collected first to write an individual case report, and then compared the report with the analysis results through case study method. The analysis objectives focused on four blockchain technology application platforms, including the Linq developed by Nasdaq, the T0 developed by Overstock, the Interledger protocol of Ripple, and the NTU Help Center developed by the G-Coin laboratory of National Taiwan University. Eventually, these key success factors are proposed to be: (1) The application platform technologies and privacy security in blockchain technologies, including standardization and consistency of encryption and decryption technology and broadcasting protocol, reduction of transaction processes and data transmission time, information security protection mechanism, human intervention elimination, error rate decrease, and fault tolerant mechanisms, (2) The economic and organization integrations in blockchain technology application platforms, including improvements of information transfer efficiency, and reductions of transaction costs and hidden ones, and (3) The policies and regulations for blockchain technology application platforms, and the social benefit improvements, including money laundering control strengthening, illegal transaction prevention, tax evasion investigation, government taxation and sharing information enhancement, and information asymmetry interruption.
WANG, HSUAN-YU, and 王藼譽. "A Fair-Exchange and Customer-Anonymity Electronic Commerce Protocol for Digital Content Transactions with Bitcoin." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/s797m7.
Повний текст джерела國防大學
資訊管理學系
106
“Fair exchange” and “customer anonymity” are two indispensable characteristics of e-commerce protocols. The former ensures that either both or neither a customer or a merchant involved in an e-commerce transaction obtain the other’s item. The latter ensures that the real identity of any customer is not revealed during a transaction process, and it is also essential to protect personal privacy. To implement these important characteristics, this study designs a new e-commerce protocol based on Bitcoin and the past researches for digital content transactions. The proposed protocol consists of authorizing, browsing, purchasing and arbitrating phases. By scrupulous protocol analysis, it can achieve fair exchange and customer anonymity. Compared with the related research, the proposed protocol has the lower computation cost at all phases. In addition, it can satisfy the confidentiality, integrity, authentication and non-repudiation of information security requirements.
Wagman, Liad. "Essays on Privacy, Information, and Anonymous Transactions." Diss., 2009. http://hdl.handle.net/10161/1165.
Повний текст джерелаThis dissertation uses game theoretic models to examine the effects of agent anonymity on markets for goods and for information. In open, anonymous settings, such as the Internet, anonymity is relatively easy to obtain --- oftentimes another email address is sufficient. By becoming anonymous, agents can participate in various mechanisms (such as elections, opinion polls, auctions, etc.) multiple times. The first chapter (joint work with Vincent Conitzer) studies elections that disincentivize voters from voting multiple times. A voting rule is false-name-proof if no agent ever benefits from casting additional votes. In elections with two alternatives, it is shown that there is a unique false-name-proof voting rule that is most responsive to votes. The probability that this rule selects the majority winner converges to 1 as the population grows large. Methods to design analogous rules for elections with 3 or more alternatives are proposed. The second chapter (also joint work with Vincent Conitzer) extends the analysis in the first chapter to broader mechanism design settings, where the goal is to disincentivize agents from participating multiple times. The cost model from the first chapter is generalized and revelation principles are proven. The third chapter studies a setting where firms are able to recognize their previous customers, and may use information about consumers' purchase histories to price discriminate (which may incentivize consumers to be anonymous). The formal model considers a monopolist and a continuum of heterogeneous consumers, where consumers are able to maintain their anonymity at some cost. It is shown that when consumers can costlessly maintain their anonymity, they all individually choose to do so, which paradoxically results in the highest profit for the monopolist. Increasing the cost of anonymity can benefit consumers, but only up to a point; at that point, the effect is reversed. Some of the results are extended to a setting with two competing firms selling differentiated products. Finally, the cost of maintaining anonymity is endogenized by considering a third party that can make consumers anonymous for a fee of its choosing. It is shown that this third party would prefer to be paid by the firm for allowing consumers to costlessly maintain their anonymity.
Dissertation
"Everything You Ever Wanted to Know About Bitcoin Mixers (But Were Afraid to Ask)." Master's thesis, 2020. http://hdl.handle.net/2286/R.I.57199.
Повний текст джерелаDissertation/Thesis
Masters Thesis Computer Science 2020
Magalhães, Maria Marques. "Bitcoins in the context of M&A transactions : a glimpse through an emerging reality." Master's thesis, 2018. http://hdl.handle.net/10400.14/27817.
Повний текст джерелаLeiding, Benjamin. "The M2X Economy – Concepts for Business Interactions, Transactions and Collaborations Among Autonomous Smart Devices." Doctoral thesis, 2019. http://hdl.handle.net/21.11130/00-1735-0000-0005-12E4-5.
Повний текст джерелаPascoal, José Carlos Ferrão. "Implementação Funcional de Bulletproofs." Master's thesis, 2019. http://hdl.handle.net/10400.6/10054.
Повний текст джерелаIt’s because of the blockchain technology presented by Bitcoin that it’s possible to create digital currencies (cryptocurrencies) managed by its users and not by a central entity (such as banks or governments). These type of coins gives another form of payment, which stands out because there is no need to rely on institutions but only in the system, and some other features, such as pseudo-anonymity. To prevent the currencies from being spent more than once on multiple transactions (double spending), the transactions must be publicly announced, in this way, everyone can verify and agree on only one transaction history. The traditional banking system achieves a level of privacy by limiting access to transactions. A participant only has access to their transactions while the bank has access to all of them. Since all transactions are public, privacy in a blockchain depends only on the property of pseudo-anonymity. The public can only observe that one address sent currencies to another, not revealing information about any entity. But in a transaction, the recipient needs to announce one of their addresses. In this way, the sender of the transaction can establish a connection between the announced address and the entity, and from there can discover other entity addresses and how many currencies it has in the discovered addresses. Through zero-knowledge proofs, it’s possible to achieve greater privacy in cryptocurrencies. The Bulletproofs are zero-knowledge proofs which allow efficient confidential transactions. In a confidential transaction, the amount transferred is “hidden” through Pedersen Commitments, which maintain the algebraic property of the sum. So it’s possible to verify that the number of currencies as input and output of a transaction are balanced. But it’s also necessary to verify that a Pedersen Commitments of one value is in a certain range to prevent negative values or overflows. For this, it requires a range proof. Bulletproofs enable more efficient range proofs, which only grow logarithmically with the range size and the number of outputs. So it’s better to have multiple outputs in a single range proof. This feature allows CoinJoin (multiple outputs of multiple transactions in one transaction), improving privacy.