Dissertations / Theses on the topic 'Merkle Trees'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 25 dissertations / theses for your research on the topic 'Merkle Trees.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Östersjö, Rasmus. "Sparse Merkle Trees: Definitions and Space-Time Trade-Offs with Applications for Balloon." Thesis, Karlstads universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-42913.
Full textSpik, Charlotta. "Using Hash Trees for Database Schema Inconsistency Detection." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254672.
Full textI detta arbete har två algoritmer utvecklats for att förbättra prestandan på processen att hitta skillnader mellan schemana genom att använda Merkle träd. Den första bygger ett hashträd från schemaversionen, och den andra jämför två hashträd för att hitta var förändringar har skett. Resultaten från prestandautvärderingen som gjorts på hashträdalgoritmen jämfört med nuvarande algoritm som används på Cisco där all data i schemat traverseras, visar att hashträdalgoritmen presterar signifikant bättre än algoritmen som traverserar all data i alla fall som testats, förutom då alla noder har ändrats i trädet. Förbättringsfaktorn är direkt kopplad till antalet noder som behöver traverseras för hashträdalgoritmen, vilket i sin tur beror på antalet förändringar som skett mellan versionerna och positioneringen i schemat av de noder som har förändrats. De exempelscenarior som har tagits från riktiga uppdateringar som har skett för existerande scheman visar att i genomsnitt behöver hashträdalgoritmen bara traversera 1,5% av noderna som den nuvarande algoritmen som används av Cisco måste traversera, och hashträdalgoritmen ger i genomsnitt en 200 gånger prestandaförbättring. Även i det värsta fallet för dessa uppdateringar tagna från verkliga scenarier presterade hashträdalgoritmen fem gånger bättre än algoritmen som traverserar all data i schemat.
Ouaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel." Thesis, Paris, ENST, 2016. http://www.theses.fr/2016ENST0046/document.
Full textDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Ouaarab, Salaheddine. "Protection du contenu des mémoires externes dans les systèmes embarqués, aspect matériel." Electronic Thesis or Diss., Paris, ENST, 2016. http://www.theses.fr/2016ENST0046.
Full textDuring the past few years, computer systems (Cloud Computing, embedded systems...) have become ubiquitous. Most of these systems use unreliable or untrusted storage (flash, RAM...)to store code or data. The confidentiality and integrity of these data can be threaten by hardware (spying on the communication bus between the processing component and the storage component) or software attacks. These attacks can disclose sensitive information to the adversary or disturb the behavior of the system. In this thesis, in the context of embedded systems, we focused on the attacks that threaten the confidentiality and integrity of data that are transmittedover the memory bus or that are stored inside the memory. Several primitives used to protect the confidentiality and integrity of data have been proposed in the literature, including Merkle trees, a data structure that can protect the integrity of data including against replay attacks. However, these trees have a large impact on the performances and the memory footprint of the system. In this thesis, we propose a solution based on variants of Merkle trees (hollow trees) and a modified cache management mechanism to greatly reduce the impact of the verification of the integrity. The performances of this solution have been evaluated both theoretically and in practice using simulations. In addition, a proof a security equivalence with regular Merkle treesis given. Finally, this solution has been implemented in the SecBus architecture which aims at protecting the integrity and confidentiality of the content of external memories in an embedded system. A prototype of this architecture has been developed and the results of its evaluation are given
Lindqvist, Anton. "Privacy Preserving Audit Proofs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210694.
Full textDen ökande avlastningen av kritisk funktionalitet till datorer ställer högre krav på loggning och möjlighet till övervakning. Loggen måste vara resistent mot manipulation och möjliggöra för andra parter att ställa frågor berörande en viss händelse i loggen utan att läcka känslig information. Eftersom loggen inte antas vara att lita på måste varje svar vara verifierbart med hjälp av ett bevis. Denna rapport presenterar ett protokoll kapabelt till att producera verifierbara och integritetsbevarande svar på frågor om en viss händelse i loggen genom användning av Merkle-träd. Vid avsaknad av den förfrågade händelsen används ny metod för att autentisera ett Bloom filter med hjälp av Merkle-träd. Eftersom Bloom filtren är en probabilistisk konstruktion presenteras även en metod för att hantera falsk positiva svar.
Kruber, Nico. "Approximate Distributed Set Reconciliation with Defined Accuracy." Doctoral thesis, Humboldt-Universität zu Berlin, 2020. http://dx.doi.org/10.18452/21294.
Full textThe objective comparison of approximate versioned set reconciliation algorithms is challenging. Each algorithm's behaviour can be tuned for a given use case, e.g. low bandwidth or computational overhead, using different sets of parameters. Changes of these parameters, however, often also influence the algorithm's accuracy in recognising differences between participating sets and thus hinder objective comparisons based on the same level of accuracy. We develop a method to fairly compare approximate set reconciliation algorithms by enforcing a fixed accuracy and deriving accuracy-influencing parameters accordingly. We show this method's universal applicability by adopting two trivial hash-based algorithms as well as set reconciliation with Bloom filters and Merkle trees. Compared to previous research on Merkle trees, we propose to use dynamic hash sizes to align the transfer overhead with the desired accuracy and create a new Merkle tree reconciliation algorithm with an adjustable accuracy target. An extensive evaluation of each algorithm under this accuracy model verifies its feasibility and ranks these four algorithms. Our results allow to easily choose an efficient algorithm for practical set reconciliation tasks based on the required level of accuracy. Our way to find configuration parameters for different, yet equally accurate, algorithms can also be adopted to other set reconciliation algorithms and allows to rate their respective performance in an objective manner. The resultant new approximate Merkle tree reconciliation broadens the applicability of Merkle trees and sheds some new light on its effectiveness.
Brown, Jordan Lee. "Verifiable and redactable medical documents." Thesis, Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44890.
Full textFredriksson, Bastian. "A Distributed Public Key Infrastructure for the Web Backed by a Blockchain." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210912.
Full textUppsatsen undersöker hur en blockkedja kan användas för att bygga en decentraliserad publik nyckel-infrastruktur för webben. Vi ger ett designförslag på en blockkedja som drivs av en pålitlig grupp av noder, där en majoritet antas vara ärliga. Vårt huvudsakliga bidrag är utformningen av ett Proof of Stake-protokoll baserat på ett staketräd, vilket bygger på en idé som kallas follow-the-satoshi omnämnd i tidigare publikationer. Digitala identiteter sparas i ett autentiserat, självbalanserande träd som underhålls av noder anslutna till blockkedjenätverket. Våra preliminära beräkningar baserade på storleken av DNS-systemet visar att blockstorleken måste sättas till åtminstone 5.2 MB, medan varje nod med en månads transaktionshistorik måste spara ungefär 243 GB. Webbläsare och andra resurssnåla klienter måste synkronisera 13.6 MB data per år, och ladda ner ytterligare 3.7 KB för varje användarcertifikat som skall valideras.
Saikia, Himangshu. "Comparison and Tracking Methods for Interactive Visualization of Topological Structures in Scalar Fields." Doctoral thesis, KTH, Beräkningsvetenskap och beräkningsteknik (CST), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-216375.
Full textQC 20171020
Kovář, Adam. "Bezpečná implementace technologie blockchain." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413104.
Full textSilvaroli, Antonio. "Design and Analysis of Erasure Correcting Codes in Blockchain Data Availability Problems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.
Find full textBauer, David Allen. "Preserving privacy with user-controlled sharing of verified information." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31676.
Full textCommittee Chair: Blough, Douglas; Committee Member: Ahamad, Mustaque; Committee Member: Liu, Ling; Committee Member: Riley, George; Committee Member: Yalamanchili, Sudha. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Apelqvist, Joakim. "Sorteringsalgoritmer för strömmad data : Algoritmer för sortering av spatio-temporal data i JSON-objekt." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-18698.
Full textTan, Heng Chuan. "Vers des communications de confiance et sécurisées dans un environnement véhiculaire." Thesis, Paris, ENST, 2017. http://www.theses.fr/2017ENST0063/document.
Full textRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Oesterling, Patrick. "Visual Analysis of High-Dimensional Point Clouds using Topological Abstraction." Doctoral thesis, Universitätsbibliothek Leipzig, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-203056.
Full textTan, Heng Chuan. "Vers des communications de confiance et sécurisées dans un environnement véhiculaire." Electronic Thesis or Diss., Paris, ENST, 2017. http://www.theses.fr/2017ENST0063.
Full textRouting and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays
Koessler, Denise Renee. "A Predictive Model for Secondary RNA Structure Using Graph Theory and a Neural Network." Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etd/1684.
Full textMahmoud, Mahmoud Yehia Ahmed. "Secure and efficient post-quantum cryptographic digital signature algorithms." Thesis, 2021. http://hdl.handle.net/1828/13307.
Full textGraduate
Wu, Hsin-Ming, and 吳欣明. "Authenticated Data Structure via Arithmetic Merkle Tree." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/63784926759173633571.
Full text元智大學
資訊工程學系
104
Due to the prosperous developing of network rate, various cloud storage systems, such as Google Drive, Dropbox, and SkyDrive, are rising rapidly and have been widely used. Nonetheless, how can we assure that the cloud will return the exactly correct information back to the querying user and never occupies the users' storage space with dummy data remain a challenging task. In this sense, it is necessary to construct protocols to protect and prevent users from being cheated by the untrusted cloud. Verifiable Data Streaming (VDS) protocol was proposed in 2012. In VDS scheme, the client outsources a growing array to the cloud server stored in DB. The stored data is verifiable so that the content and sequence of elements should not be modified by the server. The client can also retrieve the stored data and update them whenever they request. We present, Arithmetic Merkle Tree (AMT), having the ability to authenticate elements. Instead of using chameleon hash functions in previous work, our proposed Arithmetic Merkle Tree scheme has no need to calculate the collisions through trapdoors; instead, we adopt sum operation as hash function in Merkle tree. We instantiate our AMT using Paillier's Homomorphic Encryption to encrypt data and send to server. Consequently, after outsourcing, we retrieve encrypted data from server and decrypt it to verify the correctness of the data.
CHEN, YI-CHENG, and 陳奕呈. "An Image Authentication Scheme Using Merkle Tree Mechanism." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/pfkckr.
Full text亞洲大學
資訊工程學系
107
Research in the digital image processing field has received significant attention and has advanced rapidly in recent years. Image tampering and misattribution have become real concerns in the open environment of the worldwide web, and scholars have proposed various image verification mechanisms to detect and mitigate image tampering. Likewise, blockchain technology has become very popular in recent years. This study proposes a novel image verification mechanism based on the Merkle tree, a fundamental component of blockchains that underpin their functionality. The Merkle tree root in the blockchain mechanism provides a reliable environment for storage of image features. The verification of images to detect tampering can be performed by the Merkle tree mechanism to obtain the hash values of the Merkle tree nodes. In addition, the proposed method combined with the Inter-Planetary File System (IPFS) to improve the availability of images. The primary purpose of this study is to achieve the goal of image integrity verification. The proposed method can not only verify the integrity of an image, but can also repair the tampered area if the image has been altered. Because the proposed method employs the blockchain mechanism, third party is not needed for image verification. The verification method is performed by each node in the blockchain network. The experimental results demonstrate that the proposed method successfully achieves the goal of image authentication and tampered area restoration. Since the verification mechanism uses the hash values for change detection, it can recognize the slightest alterations in the image. However, the tampering of the rotation and translation is less obvious.
Huang, WeiSian, and 黃偉賢. "Instant Auditing of Cloud Storage Access by Cache Partial Merkle tree." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/22505799904029871228.
Full text國立臺灣師範大學
資訊工程學系
101
Nowadays cloud service is becoming more and more popular. One of the most important applications is the cloud storage. However, storing important data in cloud storage may suffer serious security risks. For example, the service provider can launch roll-back attack which is to restore lost files using a backup of an early version of them and their associated digital signatures. Then, the service provider can deny that the user’s latest version of files have been lost. Therefore, we need a scheme to have the client device be able to audit if a file obtained from the service provider is valid. In this paper, we first show that the intuitive solution of instant auditing by applying Merkle tree is inappropriate. Then, we propose an instant auditing communication protocol that can guarantee mutual nonrepudiation between the service provider and user and each client device only has to keep a partial Merkle tree of its account and its last attestation. All the client devices can audit if the obtained file is valid after every file writ operation without requiring broadcast their attestation to all other client devices. The experimental results demonstrate the feasibility of the proposed scheme. A service provider of cloud storage can use the proposed scheme to provide instant auditing guarantee in their service-level agreement.
Wilde, Evan. "Merge-Trees: Visualizing the integration of commits into Linux." Thesis, 2018. https://dspace.library.uvic.ca//handle/1828/10053.
Full textGraduate
Bouidani, Maher M. "Design and implementation of a blockchain shipping application." Thesis, 2019. https://dspace.library.uvic.ca//handle/1828/10568.
Full textGraduate
Подкорытов, Д. А., and D. A. Podkorytov. "Разработка «smart-контракта» для партнерской программы на основе блокчейн-технологии : магистерская диссертация." Master's thesis, 2018. http://hdl.handle.net/10995/64271.
Full textThe main objective is to develop the concept of effective system accounting and product tracking, based on using of blockchain system, due to changes in the labeling of tobacco products. Tasks of this research: - to examine principles of technology blockchain system - to examine principles of “Smart contract” technology - to consider the advantages and disadvantages of technology -to develop a smart contract - to examine the economical efficient of this project The object of this research is block-technology. The subject of the study is the process of labeling products. The first chapter provides an overview of theoretical material of blockchain technology. The second chapter is devoted to developing a methodology of using a "smart contract" for the labeling of tobacco products. The third chapter deals with the application of a smart contract for a particular business process The result of this Project: the practical result of the work is the concept of a smart contract, which will greatly simplify the process and will also allow to label products and control sales.
Oesterling, Patrick. "Visual Analysis of High-Dimensional Point Clouds using Topological Abstraction." Doctoral thesis, 2015. https://ul.qucosa.de/id/qucosa%3A14718.
Full text