events or hash references where the raw data is not
available will downgrade the reputation of an issuer.
A timeout for reading data from the DHT and a limit
for the number of events which are allowed to be se-
aled within one transaction can be used to protect the
platform from such attacks.
6 CONCLUSION
In this paper, a platform for managing digital docu-
ments has been presented. The paper proposes the ar-
chitectural building blocks and a protocol for issuing,
receiving and verifying digital documents. A block-
chain is used to seal hashes of data stored in a Dis-
tributed Hash Table and a Hierarchical Deterministic
Wallet is employed for key management. This allows
for features such as completeness, i.e., the ability to
prevent receivers from hiding certain documents. The
platform additionally sets up a Web of Trust of is-
suers and thus provides integrated issuer verification.
In summary, the management of documents is fully
decentralized, permissionless and transparent. Future
work will focus on evaluation of the prototypical im-
plementation and explore the abilities of the propo-
sed scheme for other fields of application. Attribute-
based identification for receivers will be integrated by
extending the SPROOF protocol.
ACKNOWLEDGMENTS
The overall support of Rainer B
¨
ohme from the Uni-
versity of Innsbruck as the supervisor of (Brunner,
2017) and especially the initial idea of using HD wal-
lets to build pseudonym trees to enable the complete-
ness feature is gratefully acknowledged. The authors
also like to acknowledge Michael Fr
¨
owis and Pascal
Sch
¨
ottle for discussions about this topic. The finan-
cial support by the Federal State of Salzburg is grate-
fully acknowledged. Funding by the Austrian Rese-
arch Promotion Agency (FFG) under project number
865082 (ProChain) is gratefully acknowledged.
REFERENCES
Benet, J. (2014). IPFS - Content Addressed, Versioned, P2P
File System (DRAFT 3). Technical report, IPFS.
Brunner, C. (2017). Eduthereum: A System for Storing Edu-
cational Certificates in a Public Blockchain. Master’s
thesis, Universit
¨
at Innsbruck.
Caronni, G. (2000). Walking the Web of Trust. In 9th
International Workshops on Enabling Technologies:
Infrastructure for Collaborative Enterprises (WET
ICE 2000), pages 153–158, Gaithersburg, MD, USA.
IEEE.
Christidis, K. and Devetsikiotis, M. (2016). Blockchains
and Smart Contracts for the Internet of Things. IEEE
Access, 4:2292–2303.
Croman, K., Decker, C., Eyal, I., Gencer, A. E., Juels, A.,
Kosba, A., Miller, A., Saxena, P., Shi, E., G
¨
un Sirer,
E., Song, D., and Wattenhofer, R. (2016). On Scaling
Decentralized Blockchains. In International Confe-
rence on Financial Cryptography and Data Security,
pages 106–125, Christ Church, Barbados. Springer.
Damg
˚
ard, I. B. (1988). Collision Free Hash Functions and
Public Key Signature Schemes. Advances in Crypto-
logy — EUROCRYPT’ 87, pages 203–216.
Diffie, W. and Hellman, M. (1976). New Directions in
Cryptography. IEEE Transactions on Information
Theory, 22(6):644–654.
Durumeric, Z., Kasten, J., Bailey, M., and Halderman, J. A.
(2013). Analysis of the HTTPS Certificate Ecosy-
stem. In Proceedings of the 2013 conference on Inter-
net measurement conference (IMC ’13), pages 291–
304, Barcelona, Spain. ACM.
Eyal, I., Gencer, A. E., Sirer, E. G., and van Renesse, R.
(2016). Bitcoin-NG: A Scalable Blockchain Proto-
col. In Proceedings of the 13th Usenix Conference
on Networked Systems Design and Implementation,
NSDI’16, pages 45–59, Santa Clara, CA. USENIX
Association.
Gauravaram, P. (2012). Security analysis of salt||password
hashes. In International Conference on Advan-
ced Computer Science Applications and Technolo-
gies (ACSAT), pages 25–30, Kuala Lumpur, Malaysia.
IEEE.
Gr
¨
ather, W., Augustin, S., Sch
¨
utte, J., Kolvenbach, S., Au-
gustin, S., Ruland, R., Augustin, S., and Wendland,
F. (2018). Blockchain for Education: Lifelong Lear-
ning Passport. In Proceedings of 1st ERCIM Block-
chain Workshop 2018, Amsterdam. European Society
for Socially Embedded Technologies (EUSSET).
Gutoski, G. and Stebila, D. (2015). Hierarchical determi-
nistic Bitcoin wallets that tolerate key leakage. In 19th
International Conference on Financial Cryptography
and Data Security (FC 2015), San Juan, Puerto Rico.
Springer.
Johnson, D., Menezes, A., and Vanstone, S. (2001).
The Elliptic Curve Digital Signature Algorithm
(ECDSA). International Journal of Information Se-
curity, 1(1):36–63.
Knirsch, F., Unterweger, A., and Engel, D. (2018). Privacy-
preserving Blockchain-based Electric Vehicle Char-
ging with Dynamic Tariff Decisions. Journal on Com-
puter Science - Research and Development (CSRD),
33(1):71–79.
Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou,
C. (2016). Hawk: The Blockchain Model of Cryp-
tography and Privacy-Preserving Smart Contracts. In
2016 IEEE Symposium on Security and Privacy (SP),
pages 839–858, San Jose, CA, USA. IEEE.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
24