Please use this identifier to cite or link to this item:
https://hdl.handle.net/20.500.11851/12735| Title: | A Collusion-Resistant Deco-Based Attestation Protocol for Practical Applications | Authors: | Sen, Ugur Osmanoǧulu, Murat Selçuk, Ali Aydın |
Keywords: | Attestation Interoperability Oracles Smart Contracts Transport Layer Security Authentication Blockchain Decoding Internet Protocols Network Security Smart Contract Attestation Block-Chain Collusion Attack Collusion Resistant Decentralised Oracle Threshold Signature Schemes Transport Layer Security Verifiable Random Function WEB Data Interoperability |
Publisher: | Institute of Electrical and Electronics Engineers Inc. | Abstract: | Accessing off-chain web data is crucial for expanding blockchain functionality and enabling a broader range of decentralized applications. Oracle protocols with designated verifiers such as DECO, enable this access while preserving data integrity, but they are open to collusion attacks for direct smart contract interactions, particularly when a single verifier is responsible for proof validation. A recent proposal introduced verifier multiplexing, transitioning from a single verifier to a t-out-of-n model using Distributed Verifiable Random Functions (DVRFs) to minimize the risk of collusion. However, this approach relies on trusted storage, limiting its practicality. In this paper, we enhance this approach by integrating Threshold Signature Schemes (TSS), enabling consensus among t-out-of-n verifiers to establish a practical protocol preserving the security against the collusion attack. Furthermore, we demonstrate the seamless integration of DVRF and TSS through a single Distributed Key Generation (DKG) process, improving network efficiency. This proposed protocol not only strengthens the security of blockchain oracles but also serves as an independent, modular solution that can be integrated into various integrity-preserving mechanisms to mitigate collusion threats effectively. Finally, we present a usecase example demonstrating how the proposed protocol can be applied to develop a real-world application. © 2025 Elsevier B.V., All rights reserved. | Description: | IEEE; IEEE Systems, Man, and Cybernetics (SMC) Society; LOGOS Research and Innovation (RI) | URI: | https://doi.org/10.1109/CSR64739.2025.11130173 https://hdl.handle.net/20.500.11851/12735 |
ISBN: | 9798331535919 |
| Appears in Collections: | Scopus İndeksli Yayınlar Koleksiyonu / Scopus Indexed Publications Collection |
Show full item record
CORE Recommender
Items in GCRIS Repository are protected by copyright, with all rights reserved, unless otherwise indicated.