Blockchain and Smart Contract for Digital Document Verification

 
 
 
  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract


    Every year lakhs of students graduating from different university, after passing from university different students have different plans. All students who graduated will have different certificate such as marksheets, degree certificate, best performance certificate and etc. Some students have plans to get employed in companies or to do higher studies. Wherever students go they need submit the certificate for important reference. Due to lack of anti-forge mechanism some started to forge the certificate to get the employed or for further steps. In the digital certificate verification based on blockchain done only for the degree certificates. In the proposing system along with the degree certificate entire personality and behaviour activities of the person using personal id will be uploaded in blockchain. Because of unmodifiable property it is stored in block chain. Initially the student request for the e-certificate by uploading certificate or personal id to electronic certificate system. If requesting for e-cert then the system will review certificate from the university or schools or from organization and get the assurance and store the serial number and e-certificate to the block chain. The system will be generating the QR code and send it to the user. when applying for company user will send only the certificate serial number and QR code received from the e-certificate company.

     

     

  • Keywords


    blockchain, Hyperledger, digital certificate, hashing

  • References


      [1] Xiuping Lin, “Semi-centralized Blockchain Smart Contracts: Centralized Verification and Smart Computing under Chains in the Ethereum Blockchain”, Department of Information Engineering, National Taiwan University, Taiwan, R.O.C., 2017.

      [2] Yong Shi, “Secure storage service of electronic ballot system based on block chain algorithm”, Department of Computer Science, Tsing Hua University, Taiwan, R.O.C., 2017.

      [3] Zhenzhi Qiu, “Digital certificate for a painting based on blockchain technology”, Department of Information and

      [4] Finance Management, National Taipei University of Technology, Taiwan, R.O.C., 2017.

      [5] Benyuan He, “An Empirical Study of Online Shopping Using Blockchain Technology”, Department of Distribution Management, Takming University of Science and Technology, Taiwan, R.O.C., 2017.

      [6] Yin-Jen Chiang, Pei-Yu Lin, Ran-Zan Wang, Yi-Hui

      [7] Chen,” Blind QR Code Steganographic Approach Based upon Error Correction Capability”, KSII Transactions on Internet and Information Systems.

      [8] Peter Kieseberg, Manuel Leithner, Martin Mulazzani, Lindsay Munroe, Sebastian Schrittwieser, Mayank Sinha, Edgar Weippl “QR Code Security “,2014.

      [9] S. Uma Maheswari, D. Jude Hemanth “Frequency domain QRcode based image steganography using Fresnelet transform”.

      [10] The KECCAK sponge function family, http://keccak.noekeon.org

      [11] Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak sponge function family main document. NIST (2009)

      [12] Certicom Research, Standards for efficient cryptography, SEC 1: Elliptic Curve Cryptography, Version 2.0, May 21, 2009

      [13] Ms. P. G. Rajeshwari and Dr. K. Thilagavathi, "An Efficient Authentication Protocol Based on Elliptic Curve Cryptography for Mobile Network," IJCSNS, Vol 9, feb 2009.

      [14] Johnson D, Menezes A, Vanstone S, The Elliptic Curve Digital Signature Algorithm (ECDSA). Certicom Corporation.

      [15] W. Zhanyi, Y. hanato, Z. huanguo, "Analysis of elliptic curve cryptosystem", comput Eng., vol. 28, pp. 161-163, 2002

      1. khalique, k. Singh, S. Sood, "Implementation of elliptic curve digital signature algorithm", International journal of computer applications, vol. 2, May 2010.

      [16] N. Koblitz , "Elliptic curve cryptosystems", Mathematics of Computation, vol. 48, pp. 203-209

      [17] Bin Chen, Wenliang Wu, Yao Zhang, "The Design and Implementation of Digital Signature System Based on Elliptic Curve", 2012 International Conference on Cybernetics and Informatics, vol. 163, pp. 2041-2047, 2014.

      [18] B. Glas, O. Sander, V. Stuckert, Klaus D. Müller-Glaser, J. Becker, "Prime Field ECDSA Signature Processing for Reconfigurable Embedded Systems", International Journal of Reconfigurable Computing, vol. 2011, pp. 12, February 2011.

      [19] Ms P.G.Rajeshwari and Dr K. Thilagavathi, “An Efficient Authentication protocol based on Elliptic Curve Cryptography for Mobile Network.

      [20] M. Ashok Mohammed and Dr S. Suresh babu , “Realisation of Elliptic curve cryptography based on ECDSA, Current Trends in Technologies and sciences” Vol1 issue2 sept 2012.

      [21] J.Kelly, A.Williams, “Forty Big bank theory Blockchain based Trading System , 2016.

      [22] https://www.blockchain-council.org/blockchain/how-does-blockchain-use-public-key-cryptography

      [23] https://www.blockchaincouncil.org/blockchain/howdoes-blockchain-use-public-key-cryptography

      [24] https://medium.com/@ganeshdipdumbare/use-of-asymmetric-encryption-in-blockchain-fb12ae1be83c


 

View

Download

Article ID: 28449
 
DOI: 10.14419/ijet.v7i4.6.28449




Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.