Secure degree attestation and traceability verification based on zero trust using QP-DSA and RD-ECC
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2024.15.spl-2.30Keywords:
Degree attestation, Blockchain, Data encryption, Smart contract, Hash-based message authentication code, Elliptic curve cryptography, Higher education credentials.Dimensions Badge
Issue
Section
License
Copyright (c) 2024 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The process of rendering authenticity to the Degree Certificate (DC) is known as Degree Attestation (DA). None of the prevailing works have focused on zero trust-based DA, verification, and traceability for secured DA. So, zero trust-based secured DA, verification, and traceability of degree credentials are presented in the paper. Primarily, to upload the DC of the student, the university registers and logs in to the Blockchain (BC). Subsequently, by utilizing radioactive decay-based elliptic curve cryptography (RD-ECC), the DC is secured. Next, by utilizing Glorot initialization-based Proof-of-Stake (GPoS), the data is stored in the BC. Further, to verify the traceability of the data, a Smart Contract (SC) is created. In the meantime, the student registers and logs in to the BC and gives attestation requests to the university. By utilizing rail fence cipher (RFC) RD-ECC hash-based message authentication code (RFCR-HMAC), the university authenticates the request. By utilizing a quadratic probing-based digital signature algorithm (QP-DSA), the university attests the DC after authentication. Lastly, by utilizing RD-ECC, the attested certificate is encrypted and sent to the student. Hence, the certificate is secured with an encryption time (ET) of 5971ms and DA is performed with a Signature Generation Time (SGT) of 6637ms.Abstract
How to Cite
Downloads
Similar Articles
- Shivani Tank, Isolation, Characterization and Exploring the Biotechnological Potential of Halophiles , The Scientific Temper: Vol. 16 No. Spl-1 (2025): The Scientific Temper
- Pratibha Mehetre, A correlational study of identity status in relation to Parenting style among adolescents , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Nalini. S, Ritha. W, Sasitharan Nagapan, Optimal Inventory Policies for Perishable Products Under Demand and Lead Time Uncertainty , The Scientific Temper: Vol. 16 No. 09 (2025): The Scientific Temper
- P.N. Tripathi, N.P. Singh, Ved Prakash, STUDIES ON LENGTH-WEIGHT RELATIONSHIPS OF THE FRESH WATER CATFISH MYSTUS VITTATUS (BLOCH) IN GHAGHRA BELT OF EASTERN U.P. INDIA. , The Scientific Temper: Vol. 1 No. 01 (2010): The Scientific Temper
- NAVEEN KUMAR SHARMA, KAPIL KUMAR, A REVIEW OF HIMALAYAN BIODIVERSITY WITH REFERENCE TO UTTARAKHAND , The Scientific Temper: Vol. 10 No. 1&2 (2019): The Scientific Temper
- Hardik N Talsania, Kirit Modi, Interpretable Cardiovascular Diagnosis using Multi-dimensional Feature Fusion and Deep Learning , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Kumbhlesh Kamal Rana, Rajesh Rayal, K.P. Chamoli, Pankaj Bahuguna, Pratibha Baluni, The Riparian Vegetation has Effects on the Faunal Diversity , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Bajeesh Balakrishnan, Swetha A. Parivara, E-HRM: Learning approaches, applications and the role of artificial intelligence , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Aditi Malik, Rishi Chaudhry, Mohit, Urvashi Suryavanshi, Mapping the landscape of political advertising research: A comprehensive bibliometric analysis , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
<< < 38 39 40 41 42 43 44 45 46 47 > >>
You may also start an advanced similarity search for this article.

