Implementing Blockchain For Publishing and Verifying Digital Certificates On EduTech
This study investigates the application of blockchain technology in enhancing the security and authenticity of digital certificates. Addressing key challenges such as fraud and the lack of a standardized verification process, the paper proposes a comprehensive framework aimed at fortifying the integrity of digital credentials. This framework is the utilization of blockchain as a distributed ledger, serving as a tamper-proof repository for recording certification transactions. Through this decentralized ledger, each certification issuance and verification action is securely recorded, enhancing trust and transparency in the certification process. The methodology includes the integration of a decentralized ledger for immutable record-keeping and implementation of smart contracts for automated authenticity checks, and the use of cryptographic measures to ensure data security. This approach promises significant implications for various sectors reliant on credential verification, advocating for a broader adoption of blockchain in digital certificates systems.
- Conference Article
5
- 10.1109/icccn.1999.805526
- Oct 11, 1999
Nested certificates are used to certify their subject certificates. In this way, the subject certificates can be verified via their nested certificates without using signature verification methods based on public key cryptosystems. Such a verification method is called subject certificate verification. In this paper, a subject certificate verification method will be introduced. It will be shown that subject certificate verification has the same confidence as the cryptographic certificate verification. Moreover, subject certificate verification is faster than cryptographic certificate verification. It will also be shown that a classical certificate can be verified via a sequence of nested certificates-called nested certificate path-and such verification has the same confidence as the cryptographic verification of the same certificate. Nested certificate path verification is faster than the classical certificate path verification also. Moreover in this paper, simulation results will be presented for efficiency improvement in the nested certificate path verification method over the cryptographic classical certificate path verification method.
- Research Article
- 10.5194/isprs-archives-xli-b1-179-2016
- Jun 3, 2016
- The International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Abstract. Digital camera systems are a key component in the production of reliable, geometrically accurate, high-resolution geospatial products. These systems have replaced film imaging in photogrammetric data capturing. Today, we see a proliferation of imaging sensors collecting photographs in different ground resolutions, spectral bands, swath sizes, radiometric characteristics, accuracies and carried on different mobile platforms. In addition, these imaging sensors are combined with navigational tools (such as GPS and IMU), active sensors such as laser scanning and powerful processing tools to obtain high quality geospatial products. The quality (accuracy, completeness, consistency, etc.) of these geospatial products is based on the use of calibrated, high-quality digital camera systems. The new survey regulations of the state of Israel specify the quality requirements for each geospatial product including: maps at different scales and for different purposes, elevation models, orthophotographs, three-dimensional models at different levels of details (LOD) and more. In addition, the regulations require that digital camera systems used for mapping purposes should be certified using a rigorous mapping systems certification and validation process which is specified in the Director General Instructions. The Director General Instructions for digital camera systems certification specify a two-step process as follows: 1. Theoretical analysis of system components that includes: study of the accuracy of each component and an integrative error propagation evaluation, examination of the radiometric and spectral response curves for the imaging sensors, the calibration requirements, and the working procedures. 2. Empirical study of the digital mapping system that examines a typical project (product scale, flight height, number and configuration of ground control points and process). The study examine all the aspects of the final product including; its accuracy, the product pixels size on the ground (spatial resolution), its completeness (missing pixels and striping affect), its radiometric properties (e.g., relative edge response) and its spectral characteristics (e.g., histogram spread, bands misalignment). This methodology was tested on a number of medium to large format digital cameras. The certification process is a basic stage in the mapping chain in Israel. This article provides the details of the Director General Instructions for digital camera systems certification, the methodology for certification and the tests that were carried out.
- Research Article
- 10.5194/isprsarchives-xli-b1-179-2016
- Jun 3, 2016
- ISPRS - International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences
Digital camera systems are a key component in the production of reliable, geometrically accurate, high-resolution geospatial products. These systems have replaced film imaging in photogrammetric data capturing. Today, we see a proliferation of imaging sensors collecting photographs in different ground resolutions, spectral bands, swath sizes, radiometric characteristics, accuracies and carried on different mobile platforms. In addition, these imaging sensors are combined with navigational tools (such as GPS and IMU), active sensors such as laser scanning and powerful processing tools to obtain high quality geospatial products. The quality (accuracy, completeness, consistency, etc.) of these geospatial products is based on the use of calibrated, high-quality digital camera systems. <br><br> The new survey regulations of the state of Israel specify the quality requirements for each geospatial product including: maps at different scales and for different purposes, elevation models, orthophotographs, three-dimensional models at different levels of details (LOD) and more. In addition, the regulations require that digital camera systems used for mapping purposes should be certified using a rigorous mapping systems certification and validation process which is specified in the Director General Instructions. The Director General Instructions for digital camera systems certification specify a two-step process as follows: <br><br> 1. Theoretical analysis of system components that includes: study of the accuracy of each component and an integrative error propagation evaluation, examination of the radiometric and spectral response curves for the imaging sensors, the calibration requirements, and the working procedures. <br><br> 2. Empirical study of the digital mapping system that examines a typical project (product scale, flight height, number and configuration of ground control points and process). The study examine all the aspects of the final product including; its accuracy, the product pixels size on the ground (spatial resolution), its completeness (missing pixels and striping affect), its radiometric properties (e.g., relative edge response) and its spectral characteristics (e.g., histogram spread, bands misalignment). <br><br> This methodology was tested on a number of medium to large format digital cameras. The certification process is a basic stage in the mapping chain in Israel. This article provides the details of the Director General Instructions for digital camera systems certification, the methodology for certification and the tests that were carried out.
- Book Chapter
- 10.4018/979-8-3373-5077-6.ch003
- Jun 20, 2025
Online learning platforms have reshaped higher education, with digital certificates becoming a key qualification method. However, these certificates are vulnerable to forgery and falsification. This chapter examines the use of blockchain frameworks to enhance the security and verification of digital certificates at Universiti Teknologi MARA (UiTM), Malaysia. Blockchain technology, with its secure and decentralized nature, utilizes a distributed ledger to prevent tampering and unauthorized changes. By employing cryptographic hashes and interconnected blocks, the framework ensures transparency and tamper resistance. This decentralized approach revolutionizes certificate issuance and verification, securely recording transactions across a network of computers and enhancing the integrity of the process. The proposed framework offers a reliable solution for stakeholders to verify certificate authenticity confidently. This blockchain framework aims to instill trust in the certification process, making digital certificates symbols of security and transparency in online education.
- Book Chapter
15
- 10.1007/978-981-15-9213-3_36
- Jan 1, 2020
Distance education has become an important learning method for students. Nevertheless, online teaching is difficult to ensure the traceability of student activities. The difficulty in managing the non-instantaneous diploma verification and digital/paper files have always been severe problems in education management. The education information stored within the current centralized system is simply leaked and cannot be guaranteed in terms of impartiality and authenticity. In the present paper, a digital education certificate prototype is designed utilizing the permissioned blockchain of PKI-CA, digest algorithm, and interactive data authentication by digital signatures. The digital certificates can be issued by the system realizing the instant certificate verification between students and third parties via QR codes or dynamic authorization codes. The test results indicated that 100% correct work of the prototype, with the significant throughputs of getting and creating transactions are respectively 1982.6 tps and 263.9 tps on-chain during the test cycle.KeywordsPermissioned blockchainSmart contractCertificates authenticationData verification
- Research Article
- 10.54216/ijaiet.010202
- Jan 1, 2022
- International Journal of Artificial Intelligence and Education Technology
This study aims to present the basic principles of blockchain technology that has received the attention of various sectors, including the higher education sector, which studies the application of these technologies to improve information traceability, accountability, and integrity, while ensuring privacy, transparency, durability, trustworthiness, and authenticity. Various interesting proposals and projects launched and being developed, including verification of digital certificates. Through this study, we are building a digital certificate validation system that overcomes the limitations of paper-based digital certificates and non-blockchain-based digital certificates. It explains how to verify a certificate and gives a new idea to create a certificate in the most secure and tamper-resistant way using blockchain technology.
- Book Chapter
1
- 10.1201/9781003269144-4
- Nov 22, 2022
The main objective of this research is to explore the possibility of using blockchain and smart contracts to provide a digital certificate for secure communication on the internet, which is currently provided by the certificate authority (CA) using Transport Layer Security (TLS) protocol based on the X.509 Public Key Infrastructure (PKI) standard. A digital certificate is a trusted certificate that is used to establish a secure connection between a client and a server through the internet. The digital certificates issued by CAs are having security problems, vulnerabilities, double spending, and so on. Blockchains are still in their infancy as far as the digital certificate in the web environment is concerned. This research study analyses the current PKI framework, examines the TLS protocol, checks the functioning of CAs, and explores the possibilities of using blockchain. This research also probes the implementation of smart contract to issue a digital certificate, verify the identity, validate the certificate, and manage the certificate without any third party's approval or intervention.
- Conference Article
3
- 10.1109/icce.2017.7889229
- Jan 1, 2017
This paper presents a digital Quran certification framework by utilizing modern digital authentication and certification techniques to certify and authenticate digital Quran applications available in multimedia format. A certification authority and a religious panel scrutinize the certification process and upon fulfillment of all the requirements, a digital certificate is issued to the digital Quran application. A general consumer of the service can easily verify the issued digital certificate in an online manner. The presented framework aims at diminishing the chances of modifying digital contents of the holy book for its consumer's belief and trust.
- Research Article
- 10.31292/jm.v1i1.7
- Nov 9, 2021
- Marcapada: Jurnal Kebijakan Pertanahan
In an effort to realize good and equitable services to all communities, the Ministry of ATR/BPN seeks to become a transparent and accountable institution or known as Good Governance. As an effort to realize this, digital land certification services are one of the steps towards good governance. This study aims to find out the problems faced in realizing digital certificates. The research method was carried out qualitatively, data was presented descriptively, while data collection was carried out through interviews with several respondents, namely the community and employees in the Kerawang Regency Land Office. The results of the study show that several obstacles in digital certificates are caused by internal factors including those related to human resources who are not entirely able to use technology/information, limited office infrastructure, data that has not been integrated and the need for definite checks related to documents in land certificates. While some external factors are related to the community and other agencies, namely not all people have the ability to use information technology, not all people have digital equipment, besides the problem with other agencies, namely the unavailability or integration of data in one system. Some of these problems have caused the digital land certification process to take a long time and do not meet the expected standards.
- Research Article
1
- 10.36994/2707-4110-2020-1-28-17
- Jan 1, 2020
- Visnyk Universytetu “Ukraina”
The article is devoted to the implementation of its own approach to the verification of digital certificates using Blockchain direction to protect the Windows operating system. The methods of increasing the level of protection of the Windows operating system that can be used for certificate verification are analyzed and proposed. A new direction of Blockchain is proposed for the implementation of verification, due to the introduction of various verifications, which allows for a qualitative assessment of the authenticity of digital certificates. Today, Blockchain technology is perfect for checking, exchanging and protecting digital certificates. The list of the issuer and the recipient, the signature of the document in an open database, which is the same as in the computers on the open network, is stored. Compared to conventional digital certificates, certificates generated using blockchain technology has the following advantages: no need for intermediaries; certificate verification will be performed by an open source program; you can be sure exactly who and to whom the certificate was issued; the confidentiality of the document being signed is preserved. As you can see, this technology is able to create a powerful, secure, trusted and reliable structure that does not require any intermediaries or regular inspections. Due to the variety of inspection methods, the resources that this area provides, you can achieve maximum validation of both individual certificates and entire chain.Blockchain network is a guarantee of reliability and validity of data, but if someone still wants to confirm the validity of the certificate, you must obtain the public key of the person who signed it. Due to the lack of constant confirmation of certificates, this approach simplifies the administration of the network. The practical value of the study is as follows: the authors have proposed their own approach, which allows you to check single certificates and certificate chains thanks to the Blockchain direction, which allows you to establish a secure connection and reliable data transmission. Because the proposed approach allows multiple certificate checks, it can be further integrated into the Windows operating system and can be used to protect a personal computer or used in corporate structures.
- Conference Article
- 10.1145/3327960.3332379
- Jul 2, 2019
Transport Layer Security (TLS) is a de facto standard for secure communication over the Internet and other critical infrastructures. The trust model deployed in the TLS is based on digital certificates which contain signed assertions on bindings between identities and their public key. Such a certificate is issued by a trusted certification authority (CA) that verifies an identity-key binding during a certificate validation process. As different applications require different grades of security, CAs have introduced different types of certificates and validations. So-called, extended validation (EV) certificates are believed to be the most secure, as to issue such a certificate a CA has to conduct a rigorous identity verification procedure. However, it turns out that in practice such certificates may not provide any additional security, as it is challenging to check whether a CA indeed has verified an identity according to the procedure. In this paper, we consider how to add value to the security of EV certificates. We propose Extended-Validation Certificates with Location Assurance (EVLA), a blockchain-based system that increases the security of EV certificates through checking and asserting that a CA and a given entity indeed have met during the certification process. We discuss possible ways of realizing EVLA and their implications.
- Conference Article
1
- 10.1109/iccis.2012.341
- Aug 1, 2012
This article discussed several types of authentication and mainly introduced the authentication system based on digital certificates. As the authentication system integrated with gateway introduced in this article, we described the design of the authentication mechanism based on digital certificates, the certification process as well as specifics.
- Research Article
7
- 10.1108/09685229610114222
- Mar 1, 1996
- Information Management & Computer Security
There is a growing trend to delivering more efficient and more effective products and services with fewer and fewer resources. This trend is reflected in both the commercial and government sectors. The Internet is being viewed as the vehicle that could resolve many of these business delivery challenges. With the advent of public key security and certification, the transition from current business delivery to future Internet‐based systems is now possible. Deals with how public key cryptography may be used for business applications in the future, and also considers the theoretical applications of public key technology and certification processes. Examples of current technical solutions will be addressed in a future paper.
- Research Article
7
- 10.1108/10662249610798982
- Jun 1, 1996
- Internet Research
Points out that there is a growing trend to delivering more efficient and more effective products and services with fewer and fewer resources. This trend is reflected in both the commercial and government sectors. The Internet is being viewed as the vehicle that could resolve many of these business delivery challenges. With the advent of public key security and certification, the transition from current business delivery to future Internet‐based systems is now possible. Deals with how public key cryptography may be used for business applications in the future, and also considers the theoretical applications of public key technology and certification processes. Examples of current technical solutions will be addressed in a future paper.
- Research Article
92
- 10.1007/s11042-019-08059-1
- Sep 3, 2019
- Multimedia Tools and Applications
Nowadays, various online education platforms (such as MOOCs, Coursera, XuetangX and so on) not only provide a broad Internet environment for sharing multimedia learning resources, but also bring a series of challenges in digital rights management, such as the infringement of digital copyrights of multimedia learning resources, the insecurity of digital education certificates, and the low degree of openness of multimedia learning resources. To sovle these issues, we propose a blockchain-enabled digital rights management system, which includes an entirely new network architecture for sharing and managing multimedia resources of online education on the basis of the combination of the public and private blockchains, as well as three specific smart contract schemes for the realization of the recording of multimedia digital rights, the secure storage and the unmediated verification of digital certificates, respectively. The proposed blockchain-enabled digital rights management system has been demonstrated as a promising candidate solution to the blockchain-based multimedia data protection in an online education environment.
- Supplementary Content
- 10.26877/asset.v7i3.1872
- May 1, 2025
- Advance Sustainable Science, Engineering and Technology
- Research Article
1
- 10.26877/asset.v6i2.18435
- Apr 30, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18610
- Apr 30, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18284
- Apr 30, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18502
- Apr 26, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18798
- Apr 26, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18727
- Apr 26, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18636
- Apr 25, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18701
- Apr 25, 2024
- Advance Sustainable Science, Engineering and Technology
- Research Article
- 10.26877/asset.v6i2.18623
- Apr 25, 2024
- Advance Sustainable Science, Engineering and Technology
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.