Oz Nathan's scientific contributions

Publications (2)

Article
A peer-to-peer network, enabling different parties to jointly store and run computations on data while keeping the data completely private. Enigma's computational model is based on a highly optimized version of secure multi-party computation, guaranteed by a verifiable secret-sharing scheme. For storage, we use a modified distributed hashtable for...

Citations

... These exchanges or transactions are called blocks and are encoded and linked with others (Böhme et al. 2015). Blockchain information is stored on participating devices and is open access (Zyskind et al. 2015), making the exchange process transparent and immune to modifications (unalterable) (Brandvold et al. 2015). Once the data are verified, they can no longer be edited without the community's consent. ...
... Blockchain-based solution techniques for facilitating trustworthy and authorized identity registration. (Friese et al., 2014) (Mahalle et al., 2010) (Otte et al., 2017) Management of access and control to data Immutable log of events and management of access control to data (Conoscenti et al., 2016) (Zyskind et al., 2015) Trading of IoT data Issues of trading of collected IoT-based information systems data (Zhang & Wen, 2015) (Worner & von Bomhard, 2014) IoT device identity management Technical issues of symmetric and asymmetric key management for IoT devices (Axon, 2015) (Formkecht et al., 2014 Industrial IoT application Cloud service and blockchain-based industrial IoT (IIoT) application. (Bahga & Madisetti, 2016) Smart contracts Industrial applications of blockchain smart contracts to IoT-based applications. ...