A secure, distributed and scalable infrastructure for remote generation and use of cryptographic keys

被引:0
|
作者
Bareato, Claudio
Palmieri, Paolo [1 ]
Regazzoni, Francesco [2 ]
Venier, Oreste
机构
[1] Univ Coll Cork, Sch Comp Sci, Cork T12 YN60, Ireland
[2] Univ Lugano, ALaRI, CH-6900 Lugano, Switzerland
关键词
Blockchain; Crypto Assets; Physical Security;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper outlines an ad-hoc architectural design and a practical implementation of a secure, distributed, fault tolerant and scalable infrastructure comprised of a distributed network of electronics hardware systems that remotely generate cryptographic keys, store them, digitally sign cryptographic transactions based on such keys, and record the transactions on a blockchain. The proposed solution is suitable to service both crypto-finance and non-finance applications, and the physical infrastructure is designed to be implemented using off-the-shelf industrial electronics, which further sustains the already scalable-by-design infrastructure architecture.
引用
收藏
页码:102 / 106
页数:5
相关论文
共 50 条
  • [1] The Use of Genetic Algorithms for Cryptographic Keys Generation
    Turčaník M.
    Javurek M.
    Studies in Big Data, 2021, 84 : 315 - 324
  • [2] A scalable and secure cryptographic service
    Xu, Shouhuai
    Sandhu, Ravi
    DATA AND APPLICATIONS SECURITY XXI, PROCEEDINGS, 2007, 4602 : 144 - +
  • [3] Controlling the use of cryptographic keys
    Holloway, CJ
    COMPUTERS & SECURITY, 1995, 14 (07) : 587 - 598
  • [4] Cryptographic keys generation using FingerCodes
    Ramírez-Ruiz, José A.
    Pfeiffer, Carlos F.
    Nolazco-Flores, Juan A.
    Lect. Notes Comput. Sci., (178-187):
  • [5] GENERATION, DISTRIBUTION, AND INSTALLATION OF CRYPTOGRAPHIC KEYS
    MATYAS, SM
    MEYER, CH
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 126 - 137
  • [6] Cryptographic keys generation using FingerCodes
    Ramirez-Ruiz, Jose A.
    Pfeiffer, Carlos F.
    Nolazco-Flores, Juan A.
    ADVANCES IN ARTIFICIAL INTELLIGENCE - IBERAMIA-SBIA 2006, PROCEEDINGS, 2006, 4140 : 178 - 187
  • [7] NOCRY: No More Secure Encryption Keys for Cryptographic Ransomware
    Genc, Ziya Alper
    Lenzini, Gabriele
    Ryan, Peter Y. A.
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2019, 2020, 11967 : 69 - 85
  • [8] A Cryptographic Keys Transfer Protocol for Secure Communicating Systems
    Atighehchi, Kevin
    Muntean, Traian
    Parlanti, Sylvain
    Rolland, Robert
    Vallet, Laurent
    12TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND NUMERIC ALGORITHMS FOR SCIENTIFIC COMPUTING (SYNASC 2010), 2011, : 339 - 343
  • [9] Secure Synthesis of Distributed Cryptographic Applications
    Acay, Cosku
    Gancher, Joshua
    Recto, Rolph
    Myers, Andrew C.
    2024 IEEE 37TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM, CSF 2024, 2024, : 433 - 448
  • [10] Realising time limitation for cryptographic keys in secure multimedia distribution
    Dunte, Markus
    Ruland, Christoph
    SECURITY AND COMMUNICATION NETWORKS, 2008, 1 (06) : 451 - 459