Blockchain Research Beyond Cryptocurrencies

One of the key requirements of a properly functioning digital society is the implementation of a decentralized identity management scheme through which the identity of every citizen can be uniquely determined. Specifically, we believe what is required is for a PKI to be deployed at a global scale. A PKI consists of a collection of digital certificates that cryptographically bind an individual's identity to their public key. In this article, we present an overview of our recent work in the areas of identity management and privacy, with specific emphasis on the deployment of a blockchain backed PKI. Once a PKI is in place, we are in a position to perform a number of common network tasks much more securely and efficiently than we can do currently.

[1]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[2]  Hitesh Tewari,et al.  Netcoin: A Traceable P2P Electronic Cash System , 2015, 2015 IEEE International Conference on Web Services.

[3]  D. O'Mahony,et al.  Electronic payment systems for e-commerce , 2001 .

[4]  Hitesh Tewari,et al.  Blockchain Backed DNSSEC , 2018, BIS.

[5]  Hitesh Tewari,et al.  Managing Lifetime Healthcare Data on the Blockchain , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[6]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[7]  Hitesh Tewari,et al.  The Future of E-Voting , 2017 .

[8]  Hitesh Tewari,et al.  Internet Voting Using Zcash , 2017, IACR Cryptol. ePrint Arch..

[9]  Hitesh Tewari,et al.  An Efficient Peer-to-Peer Bitcoin Protocol with Probabilistic Flooding , 2019, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering.

[10]  David Cooper,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.

[11]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[12]  Alan O. Freier,et al.  Internet Engineering Task Force (ietf) the Secure Sockets Layer (ssl) Protocol Version 3.0 , 2022 .

[13]  Hitesh Tewari,et al.  X509Cloud — Framework for a ubiquitous PKI , 2017, MILCOM 2017 - 2017 IEEE Military Communications Conference (MILCOM).

[14]  Russ Housley,et al.  Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.

[15]  Hitesh Tewari,et al.  Alt-PoW: An Alternative Proof-of-Work Mechanism , 2019, 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON).