Professional Documents
Culture Documents
CS391 - Design - Project - End - Sem - Presentation
CS391 - Design - Project - End - Sem - Presentation
blockchain
Group - 09 Presentation
• Al kahaf (202011007)
• Ashish Gupta (202011013)
• Avichal Bansal (202011015)
• Hrishubh Bhandari (202011026)
• Sanskar Patel (202011054)
• PKI
• Decentralization and Problem Statement
• Implementation
• Limitations
• Crtitical analysis and future work.
Source: https://www.tutorialspoint.com/cryptography/public_key_infrastructure.htm
• There are a few existing decentralized solutions like Instant Karma PKI and
NameCoin BlockChain that have tried to resolve this issue.
• There are a few existing decentralized solutions like Instant Karma PKI and
NameCoin BlockChain that have tried to resolve this issue.
• The current system only enables one user to issue one certificate in their
name.
• The system in its current form is only compatible with RSA type key pairs.
• The contracts nonce would still be deducted even if the certificate is not
generated.
• The current system only enables one user to issue one certificate in their
name.
• The system in its current form is only compatible with RSA type key pairs.
• The contracts nonce would still be deducted even if the certificate is not
generated.
• The current system only enables one user to issue one certificate in their
name.
• The system in its current form is only compatible with RSA type key pairs.
• The contracts nonce would still be deducted even if the certificate is not
generated.
• 51% Attack
• A 51% attack is when a cryptocurrency miner or group of miners gains
control of more than 50% of a network’s blockchain.
• The 51% attack scenario is rare especially for more established
cryptocurrencies.
• 51% Attack
• A 51% attack is when a cryptocurrency miner or group of miners gains
control of more than 50% of a network’s blockchain.
• The 51% attack scenario is rare especially for more established
cryptocurrencies.
[1] Matsumoto, S. and Reischuk, R.M., 2017, May. IKP: turning a PKI around with
decentralized automated incentives. In 2017 IEEE Symposium on Security and
Privacy (SP) (pp. 410-426). IEEE.
[2] Cheng, J.C., Lee, N.Y., Chi, C. and Chen, Y.H., 2018, April. Blockchain and smart
contract for a digital certificate. In 2018 IEEE international conference on applied
system invention (ICASI) (pp. 1046-1051). IEEE.
[3] L. coronado garc ́ıa, “On the security and the eciency of the merkle signature
scheme,” IACR Cryptology ePrint Archive, vol. 2005, p. 192, 01 2005.
[4] http://www.diva-portal.org/smash/get/diva2:1121040/FULLTEXT01.pdf
[5] www.tutorialspoint.com/cryptography/public_key_infrastructure.htm