Javascript must be enabled to continue!
Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC
View through CrossRef
The process of rendering authenticity to the Degree Certificate (DC) is known as Degree Attestation (DA). None of the prevailing works have focused on zero trust-based DA, verification, and traceability for secured DA. So, zero trust-based secured DA, verification, and traceability of degree credentials are presented in the paper. Primarily, to upload the DC of the student, the university registers and logs in to the Blockchain (BC). Subsequently, by utilizing radioactive decay-based elliptic curve cryptography (RD-ECC), the DC is secured. Next, by utilizing Glorot initialization-based Proof-of-Stake (GPoS), the data is stored in the BC. Further, to verify the traceability of the data, a Smart Contract (SC) is created. In the meantime, the student registers and logs in to the BC and gives attestation requests to the university. By utilizing rail fence cipher (RFC) RD-ECC hash-based message authentication code (RFCR-HMAC), the university authenticates the request. By utilizing a quadratic probing-based digital signature algorithm (QP-DSA), the university attests the DC after authentication. Lastly, by utilizing RD-ECC, the attested certificate is encrypted and sent to the student. Hence, the certificate is secured with an encryption time (ET) of 5971ms and DA is performed with a Signature Generation Time (SGT) of 6637ms.
Title: Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC
Description:
The process of rendering authenticity to the Degree Certificate (DC) is known as Degree Attestation (DA).
None of the prevailing works have focused on zero trust-based DA, verification, and traceability for secured DA.
So, zero trust-based secured DA, verification, and traceability of degree credentials are presented in the paper.
Primarily, to upload the DC of the student, the university registers and logs in to the Blockchain (BC).
Subsequently, by utilizing radioactive decay-based elliptic curve cryptography (RD-ECC), the DC is secured.
Next, by utilizing Glorot initialization-based Proof-of-Stake (GPoS), the data is stored in the BC.
Further, to verify the traceability of the data, a Smart Contract (SC) is created.
In the meantime, the student registers and logs in to the BC and gives attestation requests to the university.
By utilizing rail fence cipher (RFC) RD-ECC hash-based message authentication code (RFCR-HMAC), the university authenticates the request.
By utilizing a quadratic probing-based digital signature algorithm (QP-DSA), the university attests the DC after authentication.
Lastly, by utilizing RD-ECC, the attested certificate is encrypted and sent to the student.
Hence, the certificate is secured with an encryption time (ET) of 5971ms and DA is performed with a Signature Generation Time (SGT) of 6637ms.
Related Results
Application of intravascular ultrasound in diagnosis and therapy of peripheral artery stenosis
Application of intravascular ultrasound in diagnosis and therapy of peripheral artery stenosis
Objective
To evaluate the merits of intravascular ultrasound (IVUS) in the diagnosis and therapy (vascular Interventions) of peripheral artery stenosis.
...
Additional role of ECC in the detection and treatment of cervical HSIL
Additional role of ECC in the detection and treatment of cervical HSIL
ObjectiveTo probe into the additional role of ECC in the detection of cervical HSIL. The primary objective was to risk-stratify HSIL patients according to ECC so as to provide clin...
Autonomy on Trial
Autonomy on Trial
Photo by CHUTTERSNAP on Unsplash
Abstract
This paper critically examines how US bioethics and health law conceptualize patient autonomy, contrasting the rights-based, individualist...
A Comparative Study of Magnetic Resonance Angiography & Digital Subtraction Angiography in Diagnosis of Cerebral Arteriovenous Malformation
A Comparative Study of Magnetic Resonance Angiography & Digital Subtraction Angiography in Diagnosis of Cerebral Arteriovenous Malformation
Background and purpose: Although phase-contrast MR angiography (MRA) provides some information regarding hemodynamics of cerebral arteriovenous malformations (AVMs), but mos t Conv...
Electronic signature and attestation in conveyancing practice: A Malaysian legal perspective
Electronic signature and attestation in conveyancing practice: A Malaysian legal perspective
Background The Corona Virus Disease 2019 (COVID-19) pandemic brought about an unprecedented disruption to global business activities. Physical face-to-face activities must be rest...
Electronic signature and attestation in conveyancing practice: A Malaysian legal perspective
Electronic signature and attestation in conveyancing practice: A Malaysian legal perspective
Background The Corona Virus Disease 2019 (COVID-19) pandemic brought about an unprecedented disruption to global business activities. Physical face-to-face activities must be rest...
Layer-specific regional circumferential strain as prognostic marker of cardiovascular events
Layer-specific regional circumferential strain as prognostic marker of cardiovascular events
Abstract
Funding Acknowledgements
Type of funding sources: None.
BACKGROUND
...
Digital Subtraction Angiography Versus RealTime Fluoroscopy for Detection of Intravascular
Penetration Prior to Epidural Steroid Injections:
Meta-Analysis of Prospective Studies
Digital Subtraction Angiography Versus RealTime Fluoroscopy for Detection of Intravascular
Penetration Prior to Epidural Steroid Injections:
Meta-Analysis of Prospective Studies
Background: Neurological injury is a rare but devastating complication of epidural steroid
injections (ESIs) generally thought to arise from neurovascular compromise. The use of re...

