Skip to main content

BCGV: Blockchain Enabled Certificate Generation, Verification and Storage

  • Conference paper
  • First Online:
ICDSMLA 2019

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 601))

  • 108 Accesses

Abstract

Citizens all over the world require certificates to prove their identity, qualifications, and achievements. Issuing, verifying and maintaining these certificates remained a problem, as most certificates were available only as hard copy, until the advent of computers. Digitization of important certificates and documents can lead to potential security risks. Firstly, digitization makes it possible to easily forge counterfeit certificates, and further risks the privacy of documents. Moreover, individuals still have to be physically present at issuing offices to get hold of new certificates. This paper proposes a solution to these problems by employing cryptography and blockchain technology to securely issue, store and verify important certificates.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Huynh TT, Pham DK, Ngo AK (2018) Issuing and verifying digital certificates with blockchain. In: International conference on advanced technologies for communications (ATC). https://doi.org/10.1109/ATC.2018.8587428

  2. Yao S, Chen J, He K, Du R, Zhu T, Chen X (2018) PBCert: privacy-preserving blockchain-based certificate status validation toward mass storage management. IEEE Access (Early Access). Med. https://doi.org/10.1109/ACCESS.2018.2889898

  3. Zyskind G, Nathan O, Pentland AS (2015) Decentralizing privacy: using blockchain to protect personal data. In: IEEE security and privacy workshops. https://doi.org/10.1109/SPW.2015.27

  4. Malik N, Nanda P, Arora A, He X, Puthal D (2018) Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks. In: 17th IEEE international conference on trust, security and privacy in computing and communications/12th IEEE international conference on big data science and engineering (TrustCom/BigDataSE). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00099

  5. Cheng JC, Lee NY, Chi C, Chen YH (2018) Blockchain and smart contract for digital certificate. In: IEEE international conference on applied system invention (ICASI). https://doi.org/10.1109/ICASI.2018.8394455

  6. Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling blockchain: a data processing view of blockchain systems. IEEE Trans Knowl Data Eng 30:1366–1385. https://doi.org/10.1109/TKDE.2017.2781227

    Article  Google Scholar 

  7. Sankar LS, Sindhu M, Sethumadhavan M (2017) Survey of consensus protocols on blockchain applications. In: 4th international conference on advanced computing and communication systems (ICACCS). https://doi.org/10.1109/ICACCS.2017.8014672

  8. Hasan R, Anwar Z, Yurcik W, Brumbaugh L, Campbell R (2005) A survey of peer-to-peer storage techniques for distributed file systems. In: International conference on information technology: coding and computing (ITCC’05), vol II. https://doi.org/10.1109/ITCC.2005.42

  9. Benet J (2014) IPFS - content addressed, versioned, P2P file system. arXiv:1407.3561

  10. Shah N, Desai N, Vashi V (2014) Efficient cryptography for data security. In: International conference on computing for sustainable global development (INDIACom). https://doi.org/10.1109/IndiaCom.2014.6828095

  11. Wang D, Bai H, Liu Q, Tong Z (2008) A public-key cryptography and a entity authentication scheme based on improved hyperbolic function. In: IEEE International conference on service operations and logistics, and informatics. https://doi.org/10.1109/SOLI.2008.4686452

  12. Putro PAW (2017) Physical document validation with perceptual hash. In: 3rd international conference on science in information technology (ICSITech). https://doi.org/10.1109/ICSITech.2017.8257180

  13. Gueron S, Johnson S, Walker J (2011) SHA-512/256. In: Eighth international conference on information technology: new generations. https://doi.org/10.1109/ITNG.2011.69

  14. Hamburger C (1995) Learning path. Blockchain developer’s guide. Packt, pp 291–293. 978-1-78995-472-2

    Google Scholar 

  15. Merkle RC (2001) A certified digital signature, vol 435. Lecture notes in computer science. Springer, New York

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amal C Saji .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saji, A.C., Nandakishore, V.V., Vijayan, A., Joseph, J.P. (2020). BCGV: Blockchain Enabled Certificate Generation, Verification and Storage. In: Kumar, A., Paprzycki, M., Gunjan, V. (eds) ICDSMLA 2019. Lecture Notes in Electrical Engineering, vol 601. Springer, Singapore. https://doi.org/10.1007/978-981-15-1420-3_36

Download citation

Publish with us

Policies and ethics