Essays about: "Merkle träd"

Showing result 1 - 5 of 6 essays containing the words Merkle träd.

  1. 1. LF-PKI: Practical, Secure, and High-Performance Design and Implementation of a Lite Flexible PKI

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Yongzhe Xu; [2022]
    Keywords : Web Public Key Infrastructure PKI ; Certificate Transparency CT ; trust heterogeneity; Sparse Merkle Tree SMT ; Web Public Key Infrastructure PKI ; Certificate Transparency CT ; trust heterogenity; Sparse Merkle Träd SMT ;

    Abstract : Today’s Web Public Key Infrastructure (PKI) builds on a homogeneous trust model. All Certificate Authorities (CAs) are equally trusted once they are marked as trusted CAs on the client side. As a result, the security of the Web PKI depends on the weakest CA. READ MORE

  2. 2. Keeping an Indefinitely Growing Audit Log

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Måns Andersson; [2022]
    Keywords : Cryptography; Audit Log; Tamper-evident; Merkle tree; Kryptografi; Granskningslogg; Manipuleringsupptäckbarhet; Merkle träd;

    Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE

  3. 3. Design and Implementation of A Smart Grid System Based on Blockchain Smart Contract Technology

    University essay from Mittuniversitetet/Institutionen för informationssystem och –teknologi

    Author : Xueyuan Foo; [2020]
    Keywords : Blockchain; Ethereum; Smart contracts; Smart Grid; Hash Algorithm; Blockchain; Ethereum; Smarta kontrakt; Smarta elnät; Hash-algoritm;

    Abstract : Under de senaste åren har blockchain-tekniken fått mer och mer uppmärksamhet. Det har visat speciella fördelar i digital valuta, eftersom det distribueras och dess data inte kan ändras. Med fler länder som presenterar idén om kraftsysteminnovationen har ett stort antal distribuerade kraftkällor dykt upp. READ MORE

  4. 4. Using Hash Trees for Database Schema Inconsistency Detection

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Charlotta Spik; [2019]
    Keywords : Merkle Tree; Hash Tree; inconsistency detection; Anti-Entropy Repair; replica synchronization; Merkle träd; Hashträd; detektion av inkonsekvenser; Anti-Entropi Reparation; Synkronisering av replikor;

    Abstract : For this work, two algorithms have been developed to improve the performance of the inconsistency detection by using Merkle trees. The first builds a hash tree from a database schema version, and the second compares two hash trees to find where changes have occurred. READ MORE

  5. 5. Privacy Preserving Audit Proofs

    University essay from KTH/Skolan för datavetenskap och kommunikation (CSC)

    Author : Anton Lindqvist; [2017]
    Keywords : privacy; audit; logging; security; bloom filter; merkle tree;

    Abstract : The increased dependence on computers for critical tasks demands sufficient and transparent methods to audit its execution. This is commonly solved using logging where the log must not only be resilient against tampering and rewrites in hindsight but also be able to answer queries concerning (non)-membership of events in the log while preserving privacy. READ MORE