June 2023
·
16 Reads
·
6 Citations
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
June 2023
·
16 Reads
·
6 Citations
June 2023
·
17 Reads
·
2 Citations
May 2023
·
6 Reads
April 2022
·
85 Reads
·
9 Citations
The astounding growth of the Internet has generated digital asset extensively. Users are concerned about asset management so that the asset can be conveyed successfully to the descendent posthumously. Very few works have addressed designing and modeling of digital asset inheritance (DAI) from a technical design perspective. They have several inherent limitations such as incorrect death confirmation, high participation of nominee, the possibility of failure to obtain recovery key, and are based on many unreasonable assumptions, thus inefficient to design in the real life. In this paper, we have formalized the different categories of digital assets and defined the various security goals, required functionalities, and necessary entities to build an asset inheritance model. We have also proposed a new protocol named digital asset inheritance protocol (DAIP) using certificateless encryption (CLE) and identity-based system (IBS) to convey the user’s online persona efficiently to the descendent after his death. DAIP allows the nominee to successfully retrieve the asset after the user’s demise, even if a nominee is uninformed regarding the asset. We, then, provide rigorous security proofs of various properties using real–ideal worlds paradigm. Finally, we have implemented DAIP model using PBC and pycryptodome library. The simulation results affirm that it can be practically efficient to implement.
May 2020
·
489 Reads
The Indian Personal Data Protection Bill 2019 provides a legal framework for protecting personal data. It is modeled after the European Union's General Data Protection Regulation(GDPR). We present a detailed description of the Bill, the differences with GDPR, the challenges and limitations in implementing it. We look at the technical aspects of the bill and suggest ways to address the different clauses of the bill. We mostly explore cryptographic solutions for implementing the bill. There are two broad outcomes of this study. Firstly, we show that better technical understanding of privacy is important to clearly define the clauses of the bill. Secondly, we also show how technical and legal solutions can be used together to enforce the bill.
May 2020
·
26 Reads
·
22 Citations
February 2020
·
128 Reads
Payment channel networks (PCN) are used in cryptocurrencies to enhance the performance and scalability of off-chain transactions. Except for opening and closing of a payment channel, no other transaction requests accepted by a PCN are recorded in the Blockchain. Only the parties which have opened the channel will know the exact amount of fund left at a given instant. In real scenarios, there might not exist a single path which can enable transfer of high value payments. For such cases, splitting up the transaction value across multiple paths is a better approach. While there exists several approaches which route transactions via several paths, such techniques are quite inefficient, as the decision on the number of splits must be taken at the initial phase of the routing algorithm (e.g., SpeedyMurmur [42]). Algorithms which do not consider the residual capacity of each channel in the network are susceptible to failure. Other approaches leak sensitive information, and are quite computationally expensive [28]. To the best of our knowledge, our proposed scheme HushRelay is an efficient privacy preserving routing algorithm, taking into account the funds left in each channel, while splitting the transaction value across several paths. Comparing the performance of our algorithm with existing routing schemes on real instances (e.g., Ripple Network), we observed that HushRelay attains a success ratio of 1, with an execution time of 2.4 sec. However, SpeedyMurmur [42] attains a success ratio of 0.98 and takes 4.74 sec when the number of landmarks is 6. On testing our proposed routing algorithm on the Lightning Network, a success ratio of 0.99 is observed, having an execution time of 0.15 sec, which is 12 times smaller than the time taken by SpeedyMurmur.
... The authors analyze the dangers connected with healthcare data breaches using a case study methodology, and they offer moral recommendations for AI applications in healthcare settings in an effort to reduce these risks. R. G. Singh et al [9] The writers discuss the problem of data breaches in the educational field, emphasizing the particular difficulties and weaknesses that apply only to educational establishments. The need for proactive defensive methods is emphasized as the paper presents a framework for integrating cutting-edge security measures specifically designed to meet the needs of the education sector in order to prevent data breaches. ...
June 2023
... Blockchain is one of the most investigated ways to increase transparency [4], [6], [8], [16], [25], [49], [60], [78], [82], [88], [98]. On the one hand, it might record the given consent and the purpose it was given for in two smart contracts. ...
June 2023
... Crypto assets, wallets, and private keys can be transferred to legal beneficiaries by storing this information in encrypted electronic storage based on blockchain technology. This technology enables this information on an owner's crypto assets to be passed to an assigned third party upon submission of a death certificate (Singh et al., 2022). ...
April 2022
... Different signature mechanisms were introduced to replace primitive HTLC. Malavolta et al. [13] proposed anonymous multi-hop locks (AMHL) using zero-knowledge protocols, ...
May 2020