• Title/Summary/Keyword: Transaction Proof

Search Result 34, Processing Time 0.02 seconds

PoW-BC: A PoW Consensus Protocol Based on Block Compression

  • Yu, Bin;Li, Xiaofeng;Zhao, He
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.4
    • /
    • pp.1389-1408
    • /
    • 2021
  • Proof-of-Work (PoW) is the first and still most common consensus protocol in blockchain. But it is costly and energy intensive, aiming at addressing these problems, we propose a consensus algorithm named Proof-of-Work-and-Block-Compression (PoW-BC). PoW-BC is an improvement of PoW to compress blocks and adjust consensus parameters. The algorithm is designed to encourage the reduction of block size, which improves transmission efficiency and reduces disk space for storing blocks. The transaction optimization model and block compression model are proposed to compress block data with a smaller compression ratio and less compression/ decompression duration. Block compression ratio is used to adjust mining difficulty and transaction count of PoW-BC consensus protocol according to the consensus parameters adjustment model. Through experiment and analysis, it shows that PoW-BC improves transaction throughput, and reduces block interval and energy consumption.

Who is responsible for the onus of proof on online fraud transactions? In perspectives of the eCommerce Law and Privacy Investment (온라인 거래에서 사고 발생시 누가 이의 입증책임을 질 것인가?)

  • Chun, Se-Hak;Cho, Woo-Je;Kim, Jae-Cheol
    • 한국경영정보학회:학술대회논문집
    • /
    • 2007.06a
    • /
    • pp.699-704
    • /
    • 2007
  • In this study, we examine why there exist different legal systems in electronic commerce or online financial trading. When a fraud online transaction occurs and the online customer disputes the transaction, the online customer takes responsibility for the proof of her/his argument in many European countries while in the U.S., the burden of proof lays on the firm. This paper analyzes how these two different legal systems exist and how these can be applied to electronic commerce law. In particular, this paper intends to find the optimal level of e-commerce firms' investment on security and analyzes how security investments can be related to firm's profits and consumer's welfare depending on IT infrastructure and social trust environment. More on, this paper can be contributed to provide guidelines for regulatory framework on ecommerce online transactions and discuss social welfare implications.

  • PDF

Simulated Dynamic C&C Server Based Activated Evidence Aggregation of Evasive Server-Side Polymorphic Mobile Malware on Android

  • Lee, Han Seong;Lee, Hyung-Woo
    • International journal of advanced smart convergence
    • /
    • v.6 no.1
    • /
    • pp.1-8
    • /
    • 2017
  • Diverse types of malicious code such as evasive Server-side Polymorphic are developed and distributed in third party open markets. The suspicious new type of polymorphic malware has the ability to actively change and morph its internal data dynamically. As a result, it is very hard to detect this type of suspicious transaction as an evidence of Server-side polymorphic mobile malware because its C&C server was shut downed or an IP address of remote controlling C&C server was changed irregularly. Therefore, we implemented Simulated C&C Server to aggregate activated events perfectly from various Server-side polymorphic mobile malware. Using proposed Simulated C&C Server, we can proof completely and classify veiled server-side polymorphic malicious code more clearly.

A Study of Zero-Knowledge Proof for Transaction Improvement based Blockchain (블록체인 기반의 트랜잭션 향상을 위한 영지식 증명 연구)

  • Ahn, Byeongtae
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.233-238
    • /
    • 2021
  • Recently, blockchain technology accumulates and stores all transactions. Therefore, in order to verify the contents of all transactions, the data itself is compressed, but the scalability is limited. In addition, since a separate verification algorithm is used for each type of transaction, the verification burden increases as the size of the transaction increases. Existing blockchain cannot participate in the network because it does not become a block sink by using a server with a low specification. Due to this problem, as the time passes, the data size of the blockchain network becomes larger and it becomes impossible to participate in the network except for users with abundant resources. Therefore, in this paper, we are improved transaction as studied the zero knowledge proof algorithm for general operation verification. In this system, the design of zero-knowledge circuit generator capable of general operation verification and optimization of verifier and prover were also conducted.

A DID-Based Transaction Model that Guarantees the Reliability of Used Car Data (중고자동차 데이터의 신뢰성을 보장하는 DID기반 거래 모델)

  • Kim, Ho-Yoon;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.103-110
    • /
    • 2022
  • Online transactions are more familiar in various fields due to the development of the ICT and the increase in trading platforms. In particular, the amount of transactions is increasing due to the increase in used transaction platforms and users, and reliability is very important due to the nature of used transactions. Among them, the used car market is very active because automobiles are operated over a long period of time. However, used car transactions are a representative market to which information asymmetry is applied. In this paper presents a DID-based transaction model that guarantees reliability to solve problems with false advertisements and false sales in used car transactions. In the used car transaction model, sellers only register data issued by the issuing agency to prevent false sales at the time of initial sales registration. It is authenticated with DID Auth in the issuance process, it is safe from attacks such as sniping and middleman attacks. In the presented transaction model, integrity is verified with VP's Proof item to increase reliability and solve information asymmetry. Also, through direct transactions between buyers and sellers, there is no third-party intervention, which has the effect of reducing fees.

Key Efficiency Evaluation of Blockchain Based Cloud Proxy Server (블록체인 기반 클라우드 프락시 서버의 키 효율성 연구)

  • Soon-hwa Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.289-299
    • /
    • 2024
  • Blockchains are not efficient for real-time processing because the growing number of transactions and users delays many computations and network communications. This study proposes a cloud proxy server, so that legitimate users can use blockchain as well as reduce network latency. To proceed with a blockchain transaction, the blockchain copy server verifies all transaction-related data, but the cloud proxy server verifies legitimate users with a simple zero-knowledge proof algorithm, enabling efficient blockchain real-time processing. The cloud proxy server can support blockchain anonymity, security, and scalability that can verify legitimate users with the proposed zero-knowledge proof by receiving the registered key pair of the blockchain user. In the proposed research analysis, blockchain-based cloud proxy server reduces network latency compared to previous studies and key processing on cloud proxy servers reduces the cost of key computation compared to previous studies.

A Study on the M2M Energy Trading System Using Proof of Location Blockchain Network (위치증명기반 블록체인 네트워크를 활용한 사물 간 에너지 직거래 시스템에 관한 연구)

  • Kim, Young-Gon;Heo, Keol;Choi, Jung-In
    • Journal of Energy Engineering
    • /
    • v.29 no.3
    • /
    • pp.86-90
    • /
    • 2020
  • This paper examines a blockchain network-based transaction system using location proofing in power direct transactions between networked energy clouds, energy communities, and prosumer machines participating in smart cities. It utilizes location-based blockchain network technology, which enables long-distance travel with recharging by power purchases during autonomous movements, autonomous electric vehicles that can purchase and sell electricity, and solar street lights that can be produced and sold in fixed form. In addition, it is possible to provide optimum power transaction matching and settlement reliability between machines without human intervention in power transactions between electric chargers. It also introduces a business-to-object business model between autonomous machines that exist in multiple and different spaces and through energy clouds that are expected to be scattered with various transaction prices, policies, and incentives.

Differences between the Bank Payment Obligation and Letter of Credit in Global Settlement Method

  • Jon Mo Yoon;Bong-Soo Lee
    • Journal of Korea Trade
    • /
    • v.27 no.2
    • /
    • pp.1-21
    • /
    • 2023
  • Purpose - The bank payment obligation is a transaction method that combines the certainty of L/C transactions with the speed of remittance payments, so the main purpose of this study is to highlight the superiority of bank payment obligation, noting the difference between bank payment obligation and L/C transactions. In addition, we would like to examine how bank payment obligations can actually be applied to support various valuable proposals such as post-shipment and post-shipment finance according to the payment process.. Design/methodology - This study focused on literature based on data from ICC and SWIFT along with previous domestic and international studies. In terms of a research method, a literature review was adopted with electronic trade-related books and journals and policy-related reports from international trade-related agencies. Findings - Unlike L/C transaction, BPO transaction verify the data inquiry process based only on the combination result of the established baseline and dataset. Accordingly, it is superior to L/C transaction in that there is no confrontation between the parties over the results of the inquiry, and clear transactions are possible according to the principle of proof after prepayment. In addition, unlike credit transactions, data inconsistency acceptance procedures confirm payment obligations in consideration of importers' intentions. As a result, as long as trade documents are in the hands of exporting countries, flexible document disposition is possible in response to the situation after payment, which is more advantageous than L/C transaction. Originality/value - Specifically, from the importer's point of view, BPO transactions have the advantage of reducing the manpower required to prepare and review trade documents and processing transaction negotiations with exporters advantageously due to the strength of payment obligations. From the perspective of the exporter, it has the advantage of enabling rapid recovery of trade payments and reducing the risk of importer's cancellation of transactions or content change. From the perspective of participating banks, it is possible to strengthen relations with importer and obtain high commission income by increasing the role of bank reduced by reducing L/C transaction.

Success Factors of Digital Contents Distribution Websites (디지털콘텐츠 유통 웹사이트의 성공요인(에 관한 연구))

  • Choi, Yong-Soek;Kwon, Hyeog-In
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.4
    • /
    • pp.215-235
    • /
    • 2006
  • Recently, Development of IT and digital-tech, and this is becoming factor of digital contents industry development. But, problem that is more suitable e-business model's necessity and quality enemy of distribution web-site to digital contents as transaction this firm dispute by transaction special quality and Payment-system increase of digital contents increases rapidly was risen. In this study, Digital Contents qualify estimation very important persons of digital contents as sequence of study that investigate from target's viewpoint which is serviced through web-site that digital contents is not factors of web-site service method whether digital contents distribution web-site factors effect that is some in customer satisfaction from general viewpoint of actuality digital contents distribution and is the actual proof enemy. This paper's goal that these study finding leads as digital contents industry discusses individual enterprise's success and failure as field of business in quickening period yet but domestic digital contents industry field will be roared and may can have competitive power by enterprises which wish to already started business or inaugurate an enterprise enter in field with successful beginning and direction and develop continuously.

  • PDF

A Study on An Enhancement Scheme of Privacy and Anonymity through Convergence of Security Mechanisms in Blockchain Environments (블록체인 환경에서 보안 기법들의 융합을 통한 프라이버시 및 익명성 강화 기법에 대한 연구)

  • Kang, Yong-Hyeog
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.75-81
    • /
    • 2018
  • Anonymity and privacy issues are becoming important as all transactions in the blockchain are open to users. Public blockchains appear to guarantee anonymity by using public-key addresses on behalf of users, but they can weaken anonymity by tracking with various analytic techniques based on transaction graph. In this paper, we propose a scheme to protect anonymity and privacy by converging various security techniques such as k-anonymity, mixing, blind signature, multi-phase processing, random selection, and zero-knowledge proof techniques with incentive mechanism and contributor participation. Through performance analysis, our proposed scheme shows that it is difficult to invade privacy and anonymity through collusion attacks if the number of contributors is larger than that of conspirators.