Speaker: | Yücel Aydın |
Date: | 13-12-2018 |
Time: | 10:30-11:30 |
Abstract: Most of the authentication schemes include one claimer and one verifier. But this conventional method is not applicable for mobile, resource and computational limited environments as Internet of Things (IoT). If n participants in a communication want to authenticate each other, conventional one-to-one authentication scheme will be used (n-1) times. Many-to-many authentication schemes are getting proposed by scientists nowadays in order to authenticate n participants at once.
In seminar, the authentication algorithms and cryptographic fundamentals used in studies will be presented. Conventional authentication schemes and the use of Elliptic Curve, Pairing-based Cryptography in Group Authentication will be presented in the first part of the seminar. Shamir Secret Sharing, Harn proposal for synchronous and asynchronous communications and Chien proposal developed against Harn algorithms will be explained later.
Speaker: | Baris Celiktas |
Date: | October 25th,2018(Thursday) |
Time: | 10:30-11:30 |
Location: | UHEM |
Advisor: | Enver Özdemir |
Abstract
Shamir’s Secret Sharing Algorithm is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part. To gain the original secret, a minimum number of parts, in other words, the threshold is required. What are the basic terms of this algorithm, how it works, how share computation and secret reconstruction are done, and also how can it be used in the implementation of Redundant Array of Independent Disks (RAID) will be main goals of our work.
Speaker | | Nasim Tavakkoli |
Date | | October 11th, 2018(Thursday) |
Time | | 10:30-11:30 |
Location | | UHeM |
Abstract
The first generation of blockchain stems from the Bitcoin blockchain, a peer-to-peer cryptocurrency that has gone from Slashdot miscellanea to a mainstream topic. But over the past years it has been evolving fast from the original Bitcoin protocol, and popular discussion on mainstream media recently is often to separate blockchain technology from Bitcoin. This week we will discuss the past, present and future of blockchain technology.