Abstract
Approaching decentralized non-repudiation
Highlights
The basic requirements of Information Security, are generally referred to as the “CIA triad” [1], comprising Confidentiality, Integrity and Availability
This paper presents a cryptographic approach to securing communications, which allows for Nonrepudiation and Authentication in addition to Confidentiality, Integrity and Availability, and which can readily be implemented in decentralized networks, as well as overlaid on existing infrastructure
The present work proposes a novel system for securing decentralized communications, in mesh networks or overlay networks implemented atop existing infrastructure, in a way which ensures Irrefutability, Confidentiality, Integrity and Availability
Summary
The basic requirements of Information Security, are generally referred to as the “CIA triad” [1], comprising Confidentiality (ensuring that information is not disclosed to non-authorized third-parties), Integrity (ensuring that information is not altered during transit) and Availability (ensuring that information reaches the correct recipients). This paper presents a cryptographic approach to securing communications, which allows for Nonrepudiation and Authentication in addition to Confidentiality, Integrity and Availability, and which can readily be implemented in decentralized networks, as well as overlaid on existing infrastructure. It starts out with a brief overview of the existing literature, and presents the proposed communication model, before discussing the principle and results of an experimental implementation, and goes on to discuss the pertinence of the said model as an alternative to blockchain in scenarios with little computing resources before ending with concluding remarks
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have