
Network Virtualization Incorporation and Projection System Technologies Using Block Chaining
Author(s) -
Vijayalakshmi Srinivasan,
C. Viswanathan,
P. Sailaja,
G. Manimala
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1964/4/042054
Subject(s) - computer science , key (lock) , timestamp , scheme (mathematics) , virtualization , chaining , distributed computing , probabilistic logic , block (permutation group theory) , encryption , cloud computing , the internet , computer security , computer network , theoretical computer science , operating system , psychology , mathematical analysis , geometry , mathematics , artificial intelligence , psychotherapist
With the proposed time-lock encryption method, mutually untrustworthy users will create a shared public key for the implementation in a completely distributed and asyncratic setting like internet or blockchain networks with time-critical privacy conservation applications such as e-voting or online auction. A “putting puzzles inside another puzzle” construction mechanism was proposed to resolve the probabilistic characteristics of the predicted key crack time. Experimental findings indicate that the solution proposed will deliver a more precise main break time, which would make it faster and more exact to reach the expected time limit. As described above, we can further estimate computing power by combining our scheme and the blockchain, to decode time-sensitive message. Miners are ready to supply under the updated PoW scheme.