Please use this identifier to cite or link to this item: https://hdl.handle.net/20.500.11851/12142
Full metadata record
DC FieldValueLanguage
dc.contributor.authorSen, U.-
dc.contributor.authorOsmanoglu, M.-
dc.contributor.authorSelcuk, A.A.-
dc.date.accessioned2025-03-22T20:56:05Z-
dc.date.available2025-03-22T20:56:05Z-
dc.date.issued2024-
dc.identifier.isbn9798331533649-
dc.identifier.urihttps://doi.org/10.1109/ISCTrkiye64784.2024.10779230-
dc.identifier.urihttps://hdl.handle.net/20.500.11851/12142-
dc.description.abstractDECO is one of the state-of-The-Art TLS evidence protocols that enables privacy-preserving verification without necessitating server-side modifications. It allows applications to extract verifiable data from websites. However, DECO is vulnerable to collusion attacks, where the prover and verifier may secretly conspire, even if DECO itself remains secure. This vulnerability limits DECO's ability to transfer data to smart contracts. To address the collusion issue, decentralized oracle networks have been integrated with DECO, involving multiple executions for the same attestation and relying on majority consensus to determine the correct outcome. While this approach mitigates collusion risk, it is inefficient. In this paper, we address the collusion vulnerability in DECO by proposing an enhanced approach that expands the verifier's role to a set of n verifiers within a single DECO execution, utilizing a Distributed Verifiable Random Function (DVRF). This method requires the prover to obtain consensus from all n verifiers, thereby increasing the difficulty of collusion and enhancing the security of the system. Furthermore, the proposed solution is more efficient than executing n separate DECO protocols and provides verifiable features that facilitate integration with slashing and reward mechanisms, thereby improving its applicability in decentralized systems. © 2024 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.relation.ispartof17th International Conference on Information Security and Cryptology, ISCTurkiye 2024 - Proceedings -- 17th International Conference on Information Security and Cryptology, ISCTurkiye 2024 -- 16 October 2024 through 17 October 2024 -- Ankara -- 205031en_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectAttestationen_US
dc.subjectInteroperabilityen_US
dc.subjectOraclesen_US
dc.subjectSmart Contractsen_US
dc.subjectTransport Layer Securityen_US
dc.titleAn Efficient Solution for the Collusion Problem of Decoen_US
dc.typeConference Objecten_US
dc.departmentTOBB University of Economics and Technologyen_US
dc.identifier.scopus2-s2.0-85216598271-
dc.identifier.doi10.1109/ISCTrkiye64784.2024.10779230-
dc.authorscopusid59536898800-
dc.authorscopusid55683728100-
dc.authorscopusid7004457288-
dc.relation.publicationcategoryKonferans Öğesi - Uluslararası - Kurum Öğretim Elemanıen_US
dc.identifier.scopusqualityN/A-
dc.identifier.wosqualityN/A-
item.languageiso639-1en-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
item.cerifentitytypePublications-
item.fulltextNo Fulltext-
item.openairetypeConference Object-
item.grantfulltextnone-
Appears in Collections:Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection
Show simple item record



CORE Recommender
Sorry the service is unavailable at the moment. Please try again later.

Page view(s)

2
checked on Apr 7, 2025

Google ScholarTM

Check





Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.