Datasets:
lang
stringclasses 1
value | s2FieldsOfStudy
listlengths 0
8
| url
stringlengths 78
78
| fieldsOfStudy
listlengths 0
5
| lang_conf
float64 0.8
0.98
| title
stringlengths 4
300
| paperId
stringlengths 40
40
| venue
stringlengths 0
300
| authors
listlengths 0
105
| publicationVenue
dict | abstract
stringlengths 1
10k
⌀ | text
stringlengths 1.94k
184k
| tok_len
int64 509
40k
| openAccessPdf
dict | year
int64 1.98k
2.03k
⌀ | publicationTypes
listlengths 0
4
| isOpenAccess
bool 2
classes | publicationDate
timestamp[us]date 1978-02-01 00:00:00
2025-04-23 00:00:00
⌀ | references
listlengths 0
958
| total_tokens
int64 509
40k
|
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
en
|
[
{
"category": "Medicine",
"source": "external"
},
{
"category": "Computer Science",
"source": "external"
},
{
"category": "Physics",
"source": "external"
},
{
"category": "Computer Science",
"source": "s2-fos-model"
},
{
"category": "Physics",
"source": "s2-fos-model"
}
] |
https://www.semanticscholar.org/paper/0000c2f981838f81c47759242ea123b6121401a9
|
[
"Medicine",
"Computer Science",
"Physics"
] | 0.909939
|
Memory attacks on device-independent quantum cryptography.
|
0000c2f981838f81c47759242ea123b6121401a9
|
Physical Review Letters
|
[
{
"authorId": "144583853",
"name": "J. Barrett"
},
{
"authorId": "145439738",
"name": "R. Colbeck"
},
{
"authorId": "143622798",
"name": "A. Kent"
}
] |
{
"alternate_issns": null,
"alternate_names": [
"Phys Rev Lett"
],
"alternate_urls": [
"http://journals.aps.org/prl/",
"http://prl.aps.org/"
],
"id": "16c9f9d4-bee1-435d-8c85-22a3deba109d",
"issn": "0031-9007",
"name": "Physical Review Letters",
"type": "journal",
"url": "https://journals.aps.org/prl/"
}
|
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).
|
## Memory Attacks on Device-Independent Quantum Cryptography
Jonathan Barrett,[1, 2,][ ∗] Roger Colbeck,[3, 4,][ †] and Adrian Kent[5, 4,][ ‡]
1Department of Computer Science, University of Oxford,
Wolfson Building, Parks Road, Oxford OX1 3QD, U.K.
2Department of Mathematics, Royal Holloway, University of London, Egham Hill, Egham, TW20 0EX, U.K.
3Institute for Theoretical Physics, ETH Zurich, 8093 Zurich, Switzerland.
4Perimeter Institute for Theoretical Physics, 31 Caroline Street North, Waterloo, ON N2L 2Y5, Canada.
5Centre for Quantum Information and Foundations, DAMTP, Centre for Mathematical Sciences,
University of Cambridge, Wilberforce Road, Cambridge, CB3 0WA, U.K.
(Dated: 5[th] August 2013)
Device-independent quantum cryptographic schemes aim to guarantee security to users based
only on the output statistics of any components used, and without the need to verify their internal
functionality. Since this would protect users against untrustworthy or incompetent manufacturers,
sabotage or device degradation, this idea has excited much interest, and many device-independent
schemes have been proposed. Here we identify a critical weakness of device-independent protocols
that rely on public communication between secure laboratories. Untrusted devices may record their
inputs and outputs and reveal information about them via publicly discussed outputs during later
runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data.
Possible defences include securely destroying or isolating used devices. However, these are costly
and often impractical. We propose other more practical partial defences as well as a new protocol
structure for device-independent quantum key distribution that aims to achieve composable security
in the case of two parties using a small number of devices to repeatedly share keys with each another
(and no other party).
Quantum cryptography aims to exploit the properties
of quantum systems to ensure the security of various
tasks. The best known example is quantum key distribution (QKD), which can enable two parties to share a
secret random string and thus exchange messages secure
against eavesdropping, and we mostly focus on this task
for concreteness. While all classical key distribution protocols rely for their security on assumed limitations on
an eavesdropper’s computational power, the advantage
of quantum key distribution protocols (e.g. [1, 2]) is that
they are provably secure against an arbitrarily powerful
eavesdropper, even in the presence of realistic levels of
losses and errors [3]. However, the security proofs require
that quantum devices function according to particular
specifications. Any deviation – which might arise from a
malicious or incompetent manufacturer, or through sabotage or degradation – can introduce exploitable security
flaws (see e.g. [4] for practical illustrations).
The possibility of quantum devices with deliberately
concealed flaws, introduced by an untrustworthy manufacturer or saboteur, is particularly concerning, since
(i) it is easy to design quantum devices that appear to
be following a secure protocol but are actually completely
insecure[1], and (ii) there is no general technique for identifying all possible security loopholes in standard quan
[∗Electronic address: [email protected]](mailto:[email protected])
[†Electronic address: [email protected]](mailto:[email protected])
[‡Electronic address: [email protected]](mailto:[email protected])
1 In BB84 [1], for example, a malicious state creation device could
be programmed to secretly send the basis used for the encoding
in an additional degree of freedom.
tum cryptography devices. This has led to much interest
in device-independent quantum protocols, which aim to
guarantee security on the fly by testing the device outputs [5–15]: no specification of their internal functionality is required.
Known provably secure schemes for deviceindependent quantum key distribution are inefficient,
as they require either independent isolated devices
for each entangled pair to ensure device-independent
security [6, 10–12, 16], or a large number of entangled
pairs to generate a short key [6, 16, 17]. Finding
an efficient secure device-independent quantum key
distribution scheme using two (or few) devices has
remained an open theoretical challenge. Nonetheless,
in the absence of tight theoretical bounds on the scope
for device-independent quantum cryptography, progress
to date has encouraged optimism (e.g. [18]) about the
prospects for device-independent QKD as a practical
technology, as well as for device-independent quantum
randomness expansion [13–15] and other applications of
device-independent quantum cryptography (e.g. [19]).
However, one key question has been generally neglected in work to date on device-independent quantum
cryptography, namely what happens if and when devices
are reused. Specifically, are device-reusing protocols composable – i.e. do individually secure protocols of this type
remain secure when combined? It is clear that reuse of
untrusted devices cannot be universally composable, i.e.
such devices cannot be securely reused for completely
general purposes (in particular, if they have memory,
they must be kept secure after the protocol). However,
for device-independent quantum cryptography to have
significant practical value, one would hope that devices
-----
can at least be reused for the same purpose. For example one would like to be able to implement a QKD
protocol many times, perhaps with different parties each
time, with a guarantee that all the generated keys can
be securely used in an arbitrary environment so long as
the devices are kept secure. We focus on this type of
composability here.
We describe a new type of attack that highlights pitfalls in producing protocols that are composable (in
the above sense) with device-independent security for
reusable devices, and show that for all known protocols
such composability fails in the strong sense that purportedly secret data become completely insecure. The leaks
do not exploit new side channels (which proficient users
are assumed to block), but instead occur through the
device choosing its outputs as part of a later protocol.
To illustrate this, consider a device-independent
scheme that allows two users (Alice and Bob) to generate and share a purportedly secure cryptographic key.
A malicious manufacturer (Eve) can design devices so
that they record and store all their inputs and outputs.
A well designed device-independent protocol can prevent
the devices from leaking information about the generated
key during that protocol. However, when they are reused,
the devices can make their outputs in later runs depend
on the inputs and outputs of earlier runs, and, if the protocol requires Alice and Bob to publicly exchange at least
some information about these later outputs (as all existing protocols do), this can leak information about the
original key to Eve. Moreover, in many existing protocols, such leaks can be surreptitiously hidden in the noise,
hence allowing the devices to operate indefinitely like hidden spies, apparently complying with security tests, and
producing only data in the form the protocols require,
but nonetheless actually eventually leaking all the purportedly secure data.
We stress that our results certainly do not imply that
quantum key distribution per se is insecure or impractical. In particular, our attacks do not apply to standard
QKD protocols in which the devices’ properties are fully
trusted, nor if the devices are trusted to be memoryless
(but otherwise untrusted), nor necessarily to protocols
relying on some other type of partially trusted devices.
Our target is the possibility of (full) device-independent
quantum cryptographic security, applicable to users who
purchase devices from a potentially sophisticated adversarial supplier and rely on no assumption about the devices’ internal workings.
The attacks we present raise new issues of composability and point towards the need for new protocol designs.
We discuss some countermeasures to our attacks that appear effective in the restricted but relevant scenario where
two users only ever use their devices for QKD exchanges
with one another, and propose a new type of protocol
that aims to achieve security in this scenario while allowing device reuse. Even with these countermeasures,
however, we show that security of a key generated with
Bob can be compromised if Alice uses the same device for
key generation with an additional party. This appears to
be a generic problem against which we see no complete
defence.
Although we focus on device-independent QKD for
most of this work, our attacks also apply to other deviceindependent quantum cryptographic tasks. The case of
randomness expansion is detailed in Appendix E.
Cryptographic scenario.—We use the standard cryptographic scenario for key distribution between Alice and
Bob, each of whom has a secure laboratory. These laboratories may be partitioned into secure sub-laboratories,
and we assume Alice and Bob can prevent communication between their sub-laboratories as well as between
their labs and the outside world, except as authorized by
the protocol. The setup of these laboratories is as follows.
Each party has a trusted private random string, a trusted
classical computer and access to two channels connecting
them. The first channel is an insecure quantum channel.
Any data sent down this can be intercepted and modified by Eve, who is assumed to know the protocol. The
second is an authenticated classical channel which Eve
can listen to but cannot impersonate; in efficient QKD
protocols this is typically implemented by using some
key bits to authenticate communications over a public
channel. Each party also uses a sub-laboratory to isolate
each of the untrusted devices being used for today’s protocol. They can connect them to the insecure quantum
channel, as desired, and this connection can be closed
thereafter. They can also interact with each device classically, supplying inputs (chosen using the trusted private
string) and receiving outputs, without any other information flowing into or out of the secure sub-laboratory.
As mentioned before, existing device-independent
QKD protocols that have been proven unconditionally
secure [6, 11, 12] require separate devices for each measurement performed by Alice and Bob with no possibility
of signalling between these devices[2], or are inefficient [17]
(in terms of the amount of key per entangled pair). For
practical device-independent QKD, we would like to remove both of these disadvantages and have an efficient
scheme needing a small number of devices.
Since the protocols in [11, 12] can tolerate reasonable
levels of noise and are reasonably efficient, we look first
at implementations of protocols taking the form of those
in [11, 12], except that Alice and Bob use one measurement device each, i.e., Alice (Bob) uses the same device to perform each of her (his) measurements. We call
these two-device protocols (Bob also has a separate isolated source device: see below). The memory of a device
can then act as a signal from earlier to later measurements, hence the security proofs of [11, 12] do not apply
(see also [20] where a different two-device setup is dis
2 Within the scenario described above, this could be achieved by
placing each device in its own sub-laboratory.
-----
1. Entangled quantum states used in the protocol are generated by a device Bob holds (which is separate and
kept isolated from his measurement device) and then
shared over an insecure quantum channel with Alice’s
device. Bob feeds his half of each state to his measurement device. Once the states are received, the quantum
channel is closed.
2. Alice and Bob each pick a random input Ai and Bi to
their device, ensuring they receive an output bit (Xi
and Yi respectively) before making the next input (so
that the i-th output cannot depend on future inputs).
They repeat this M times.
3. Either Alice or Bob (or both) publicly announces their
measurement choices, and the relevant party checks
that they had a sufficient number of suitable input combinations for the protocol. If not, they abort.
4. (Sifting.) Some output pairs may be discarded according to some public protocol.
5. (Parameter estimation.) Alice randomly and independently decides whether to announce each remaining bit
to Bob, doing so with probability µ (where Mµ ≫ 1).
Bob uses the communicated bits and his corresponding
outputs to compute some test function, and aborts if it
lies outside a desired range. (For example, Bob might
compute the CHSH value [21] of the announced data,
and abort if it is below 2.5.)
6. (Error correction.) Alice and Bob perform error correction using public discussion, in order to (with high
probability) generate identical strings. Eve learns the
error correction function Alice applies to her string.
7. (Privacy amplification.) Alice and Bob publicly perform privacy amplification [22], producing a shorter
shared string about which Eve has virtually no information. Eve similarly learns the privacy amplification
function they apply to their error-corrected strings.
TABLE I: Generic structure of the protocols we consider. Although this structure is potentially restrictive, most
protocols to date are of this form (we discuss modifications
later). Note that we do not need to specify the precise subprotocols used for error correction or privacy amplification.
For an additional remark, see Part I of the Appendix
cussed). It is an open question whether a secure key can
be efficiently generated by a protocol of this type in this
scenario. Here we demonstrate that, even if a key can be
securely generated, repeat implementations of the protocol using the same devices can render an earlier generated
key insecure.
Attacks on two-device protocols.—Consider a QKD protocol with the standard structure shown in Table I. We
imagine a scenario in which a protocol of this type is
run on day 1, generating a secure key for Alice and Bob,
while informing Eve of the functions used by Alice for error correction and privacy amplification (for simplicity we
assume the protocol has no sifting procedure (Step 4)).
The protocol is then rerun on day 2, to generate a second
key, using the same devices. Eve can instruct the devices
to proceed as follows. On day 1, they follow the protocol
honestly. However, they keep hidden records of all the
raw bits they generate during the protocol. At the end
of day 1, Eve knows the error correction and privacy amplification functions used by Alice and Bob to generate
the secure key.
On day 2, since Eve has access to the insecure quantum channel over which the new quantum states are distributed, she can surreptitiously modulate these quantum states to carry new classical instructions to the device in Alice’s lab, for example using additional degrees of
freedom in the states. These instructions tell the device
the error correction and privacy amplification functions
used on day 1, allowing it to compute the secret key generated on day 1. They also tell the device to deviate
from the honest protocol for randomly selected inputs,
by producing as outputs specified bits from this secret
key. (For example, “for input 17, give day 1’s key bit 5
as output”.) If any of these selected outputs are among
those announced in Step 5, Eve learns the corresponding
bits of day 1’s secret key. We call this type of attack, in
which Eve attempts to gain information from the classical
messages sent in Step 5, a parameter estimation attack.
If she follows this cheating strategy for Nµ[−][1] < M input bits, Eve is likely to learn roughly N bits of day 1’s
secret key. Moreover, only the roughly N output pairs
from this set that are publicly compared give Alice and
Bob statistical information about Eve’s cheating. Alice
and Bob cannot a priori identify these cheating output
pairs among the ≈ µM they compare. Thus, if the tolerable noise level is comparable to Nµ[−][1]M [−][1], Eve can (with
high probability) mask her cheating as noise. (Note that
in unconditional security proofs it is generally assumed
that eavesdropping is the cause of all noise. Even if in
practice Eve cannot reduce the noise to zero, she can
supply less noisy components than she claims and use
the extra tolerable noise to cheat).
In addition, Alice and Bob’s devices each separately
have the power to cause the protocol to abort on any
day of their choice. Thus – if she is willing to wait long
enough – Eve can program them to communicate some
or all information about their day 1 key, for instance
by encoding the relevant bits as a binary integer N =
b1 . . . bm and choosing to abort on day (N + 2)[3]. We call
this type of attack an abort attack. Note that it cannot
be detected until it is too late.
As mentioned above, some well known protocols use
many independent and isolated measurement devices.
These protocols are also vulnerable to memory attacks,
as explained in Appendix D.
3 In practice, Eve might infer a day (N +2) abort from the fact that
Alice and Bob have no secret key available on day (N +2), which
in many scenarios might detectably affect their behaviour then
or subsequently. Note too that she might alternatively program
the devices to abort on every day from (N + 2) onwards if this
made N more easily inferable in practice.
-----
Modified protocols.—We now discuss ways in which these
attacks can be partly defended against.
Countermeasure 1.—All quantum data and all public
communication of output data in the protocol come from
one party, say Bob. Thus, the entangled states used in
the protocol are generated by a separate isolated device
held by Bob (as in the protocol in Table 1) and Bob
(rather than Alice) sends selected output data over a
public channel in Step 5. If Bob’s device is forever kept
isolated from incoming communication, Eve has no way
of sending it instructions to calculate and leak secret key
bits from day 1 (or any later day).
Existing protocols modified in this way are still insecure if reused, however. For example, in a modified parameter estimation attack, Eve can pre-program Bob’s
device to leak raw key data from day 1 via output data
on subsequent days, at a low enough rate (compared to
the background noise level) that this cheating is unlikely
to be detected. If the actual noise level is lower than the
level tolerated in the protocol, and Eve knows both (a
possibility Alice and Bob must allow for), she can thereby
eventually obtain all Bob’s raw key data from day 1, and
hence the secret key.
In addition, Eve can still communicate with Alice’s
device, and Alice needs to be able to make some public
communication to Bob, if only to abort the protocol. Eve
can thus obtain secret key bits from day 1 on a later day
using an abort attack.
Countermeasure 2. [23] —Encrypt the parameter estimation information sent in Step 5 with some initial preshared seed randomness. Provided the seed required
is small compared to the size of final string generated
(which is the case in efficient QKD protocols [11, 12]),
the protocol then performs key expansion[4]. Furthermore,
even if they have insufficient initial shared key to encrypt the parameter estimation information, Alice and
Bob could communicate the parameter estimation information unencrypted on day 1, but encrypt it on subsequent days using generated key.
Note that this countermeasure is not effective against
abort attacks, which can now be used to convey all or
part of their day 1 raw key. This type of attack seems
unavoidable in any standard cryptographic model requiring composability and allowing arbitrarily many device
reuses if either Alice or Bob has only a single measurement device.
This countermeasure is also not effective in general cryptographic environments involving communication with multiple users who may not all be trustworthy. Suppose that Alice wants to share key with Bob on
day 1, but with Charlie on day 2. If Charlie becomes
corrupted by Eve, then, for example by hiding data in
4 QKD is often referred to as quantum key expansion in any case,
taking into account that a common method of authenticating the
classical channel uses pre-shared randomness.
the parameter estimation, Eve can learn about day 1’s
key (we call this an impostor attack ). This attack applies in many scenarios in which users might wish to use
device-independent QKD. For example, suppose Alice is
a merchant and Bob is a customer who needs to communicate his credit card number to Alice via QKD to
complete the sale. The next day, Eve can pose as a customer, carry out her own QKD exchange with Alice, and
extract information about Bob’s card number without
being detected.
Countermeasure 3.—Alternative protocols using additional measurement devices. Suppose Alice and Bob
each have m measurement devices, for some small integer
m ≥ 2. They perform Steps 1–6 of a protocol that takes
the form given in Table I but with Countermeasures 1
and 2 applied. They repeat these steps for each of their
devices in turn, ensuring no communication between any
of them (i.e., they place each in its own sub-laboratory).
This yields m error-corrected strings. Alice and Bob concatenate their strings before performing privacy amplification as in Step 7. However, they further shorten the
final string such that it would (with near certainty) remain secure if one of the m error-corrected strings were
to become known to Eve through an abort attack. (See
Table 2, and Appendix C for more details).
This countermeasure doesn’t avoid impostor attacks.
Instead, the idea is to prevent useful abort attacks (as
well as parameter estimation attacks due to Countermeasure 2), and hence give us a secure and composable
protocol, provided the keys produced on successive days
are always between the same two users. The information
each device has about day 1’s key is limited to the raw
key it produced. Thus, if each device is programmed to
abort on a particular day that encodes their day 1 raw
key, after an abort, Eve knows one of the devices’ raw
keys and has some information on the others (since she
can exclude certain possibilities based on the lack of abort
by those devices so far). After an abort, Alice and Bob
should cease to use any of their devices unless and until
such time that they no longer require that their keys remain secret. Intuitively, provided the set of m keys was
sufficiently shortened in the privacy amplification step,
Eve has essentially no information about the day 1 secret key, which thus (we conjecture) remains secure.
Countermeasure 4.—Alice and Bob share a small initial
secret key and use part of it to choose the privacy amplification function in Step 7 of the protocol, which may
then never become known to Eve.
Even in this case, Eve can pre-program Bob’s measurement device to leak raw data from day 1 on subsequent
days, either via a parameter estimation attack or via an
abort attack. While Eve cannot obtain bits of the secret key so directly in this case, provided the protocol
is composed sufficiently many times, she can eventually
obtain all the raw key. This means that Alice and Bob’s
residual security ultimately derives only from the initial
shared secret key: their QKD protocol produces no extra
permanently secure data.
-----
In summary, we have shown how a malicious manufacturer who wishes to mislead users or obtain data
from them can equip devices with a memory and use
it in programming them. The full scope of this threat
seems to have been overlooked in the literature on deviceindependent quantum cryptography to date. A task is
potentially vulnerable to our attacks if it involves secret
data generated by devices and if Eve can learn some function of the device outputs in a subsequent protocol. Since
even causing a protocol to abort communicates some information to Eve, the class of tasks potentially affected is
large indeed. In particular, for one of the most important
applications, QKD, none of the protocols so far proposed
remain composably secure in the case that the devices
are supplied by a malicious adversary.
One can think of the problems our attacks raise as
a new issue of cryptographic composability. One way
of thinking of standard composability is that a secure
output from a protocol must still have all the properties of an ideal secure output when combined with other
outputs from the same or other protocols. The deviceindependent key distribution protocols we have examined
fail this test because the reuse of devices can cause later
outputs to depend on earlier ones. In a sense, the underlying problem is that the usage of devices is not composably secure. This applies too, of course, for devices
used in different protocols: devices used for secure randomness expansion cannot then securely be used for key
distribution without potentially compromising the generated randomness, for example.
It is worth reiterating that our attacks do not apply
against protocols where the devices are trusted to be
memoryless. Indeed, there are schemes that are composably secure for memoryless devices [11, 12]. We also
stress that our attacks do not apply to all protocols for
device-independent quantum tasks related to cryptography. For example, even devices with memories cannot
mimic nonlocal correlations in the absence of shared entanglement [24, 25]. In addition, in applications that
require only short-lived secrets, devices may be reused
once such secrets are no longer required. Partially secure device-independent protocols for bit commitment
and coin tossing [19], in which the committer supplies
devices to the recipient, are also immune from our attacks, so long as the only data entering the devices come
from the committer.
Note too that, in practice the number of uses required
to apply the attacks may be very large, for example, in
the case of some of the abort attacks we described. One
can imagine a scenario in which Alice and Bob want to
carry out device-independent QKD no more than n times
for some fixed number n, each is confident in the other’s
trustworthiness throughout, the devices are used for no
other purpose and are destroyed after n rounds, and key
generation is suspended and the devices destroyed if a
single abort occurs. If the only relevant information con
veyed to Eve is that an abort occurs on one of the n days,
she can only learn at most log n bits of information about
the raw key via an abort attack. Hence one idea is that,
using suitable additional privacy amplification, Alice and
Bob could produce a device-independent protocol using
two measurement devices that is provably secure when
restricted to no more than n bilateral uses. It would be
interesting to analyse this possibility, which, along with
the protocol presented in Table 2, leads us to hold out
the hope of useful security for fully device-independent
QKD, albeit in restricted scenarios.
We have also discussed some possible defences and
countermeasures against our attacks. A theoretically
simple one is to dispose of – i.e. securely destroy or isolate
– untrusted devices after a single use (see Appendix B).
While this would restore universal composability, it is
clearly costly and would severely limit the practicality
of device-independent quantum cryptography. Another
interesting possibility is to design protocols for composable device-independent QKD guaranteed secure in more
restricted scenarios. However, the impostor attacks described above appear to exclude the possibility of composably secure device-independent QKD when the devices are used to exchange key with several parties.
Many interesting questions remain open. Nonetheless,
the attacks we have described merit a serious reappraisal
of current protocol designs and, in our view, of the practical scope of universally composable quantum cryptography using completely untrusted devices.
Added Remark: Since the first version of this paper,
there has been new work in this area that, in part, explores countermeasure 2 in more detail [26]. In addition,
two new works on device-independent QKD with only
two devices have appeared [27, 28]. Note that these do
not evade the attacks we present, but apply to the scenario where used devices are discarded.
Acknowledgements.—We thank Anthony Leverrier and
Gonzalo de la Torre for [23], Llu´ıs Masanes, Serge Massar and Stefano Pironio for helpful comments. JB was
supported by the EPSRC, and the CHIST-ERA DIQIP
project. RC acknowledges support from the Swiss National Science Foundation (grants PP00P2-128455 and
20CH21-138799) and the National Centre of Competence
in Research ‘Quantum Science and Technology’. AK was
partially supported by a Leverhulme Research Fellowship, a grant from the John Templeton Foundation, and
the EU Quantum Computer Science project (contract
255961). This research is supported in part by Perimeter
Institute for Theoretical Physics. Research at Perimeter Institute is supported by the Government of Canada
through Industry Canada and by the Province of Ontario
through the Ministry of Research and Innovation.
-----
[1] Bennett, C. H. & Brassard, G. Quantum cryptography:
Public key distribution and coin tossing. In Proceedings
of IEEE International Conference on Computers, Systems, and Signal Processing, 175–179. IEEE (New York,
1984).
[2] Ekert, A. K. Quantum cryptography based on Bell’s theorem. Physical Review Letters 67, 661–663 (1991).
[3] Renner, R. Security of Quantum Key Distribution. Ph.D.
thesis, Swiss Federal Institute of Technology, Zurich
(2005). Also available as quant-ph/0512258.
[4] Gerhardt, I. et al. Full-field implementation of a perfect
eavesdropper on a quantum cryptography system. Nature
Communications 2, 349 (2011).
[5] Mayers, D. & Yao, A. Quantum cryptography with imperfect apparatus. In Proceedings of the 39th Annual
Symposium on Foundations of Computer Science (FOCS98), 503–509 (IEEE Computer Society, Los Alamitos,
CA, USA, 1998).
[6] Barrett, J., Hardy, L. & Kent, A. No signalling and
quantum key distribution. Physical Review Letters 95,
010503 (2005).
[7] Acin, A., Gisin, N. & Masanes, L. From Bell’s theorem to
secure quantum key distribution. Physical Review Letters
97, 120405 (2006).
[8] Scarani, V. et al. Secrecy extraction from no-signaling
correlations. Physical Review A 74, 042339 (2006).
[9] Acin, A. et al. Device-independent security of quantum
cryptography against collective attacks. Physical Review
Letters 98, 230501 (2007).
[10] Masanes, L., Renner, R., Christandl, M., Winter, A. &
Barrett, J. Unconditional security of key distribution
from causality constraints. e-print quant-ph/0606049v4
(2009).
[11] H¨anggi, E. & Renner, R. Device-independent quantum
key distribution with commuting measurements. e-print
[arXiv:1009.1833 (2010).](arXiv:1009.1833)
[12] Masanes, L., Pironio, S. & Ac´ın, A. Secure deviceindependent quantum key distribution with causally independent measurement devices. Nature Communications 2, 238 (2011).
[13] Colbeck, R. Quantum and Relativistic Protocols For Secure Multi-Party Computation. Ph.D. thesis, University
[of Cambridge (2007). Also available as arXiv:0911.3814.](arXiv:0911.3814)
[14] Pironio, S. et al. Random numbers certified by Bell’s
theorem. Nature 464, 1021–1024 (2010).
[15] Colbeck, R. & Kent, A. Private randomness expansion
with untrusted devices. Journal of Physics A 44, 095305
(2011).
[16] Barrett, J., Kent, A. & Pironio, S. Maximally non-local
and monogamous quantum correlations. Physical Review
Letters 97, 170409 (2006).
[17] Barrett, J., Colbeck, R. & Kent, A. Unconditionally secure device-independent quantum key distribution with
[only two devices. e-print arXiv:1209.0435 (2012).](arXiv:1209.0435)
[18] Ekert, A. Less reality, more security. Physics World
(September 2009).
[19] Silman, J. et al. Fully distrustful quantum bit commitment and coin flipping. Physical Review Letters 106,
220501 (2011).
[20] H¨anggi, E., Renner, R. & Wolf, S. The impossibility of non-signalling privacy amplification. e-print
[arXiv:0906.4760 (2009).](arXiv:0906.4760)
[21] Clauser, J. F., Horne, M. A., Shimony, A. & Holt, R. A.
Proposed experiment to test local hidden-variable theories. Physical Review Letters 23, 880–884 (1969).
[22] Bennett, C. H., Brassard, G. & Robert, J.-M. Privacy
amplification by public discussion. SIAM Journal on
Computing 17, 210–229 (1988).
[23] de la Torre, G. & Leverrier, A. (2012). Personal communication.
[24] Barrett, J., Collins, D., Hardy, L., Kent, A. & Popescu, S.
Quantum nonlocality, Bell inequalities, and the memory
loophole. Physical Review A 66, 042111 (2002).
[25] Gill, R. D. Accardi contra Bell (cum mundi): The impossible coupling. In Moore, M., Froda, S. & L´eger, C. (eds.)
Mathematical Statistics and Applications: Festschrift for
Constance van Eeden, vol. 42 of IMS Lecture Notes –
Monograph Series, 133–154 (2003).
[26] McKague, M. & Sheridan, L. Reusing devices with memory in device independent quantum key distribution. e[print arXiv:1209.4696 (2012).](arXiv:1209.4696)
[27] Reichardt, B. W., Unger, F. & Vazirani, U. Classical command of quantum systems via rigidity of CHSH
[games. e-print arXiv:1209.0449 (2012).](arXiv:1209.0449)
[28] Vazirani, U. & Vidick, T. Fully device independent quan[tum key distribution. e-print arXiv:1210.1810 (2012).](arXiv:1210.1810)
[29] Carter, J. L. & Wegman, M. N. Universal classes of hash
functions. Journal of Computer and System Sciences 18,
143–154 (1979).
[30] Wegman, M. N. & Carter, J. L. New hash functions and
their use in authentication and set equality. Journal of
Computer and System Sciences 22, 265–279 (1981).
[31] Tomamichel, M., Renner, R., Schaffner, C. & Smith, A.
Leftover hashing against quantum side information. In
Proceedings of the 2010 IEEE Symposium on Information
Theory (ISIT10), 2703–2707 (2010).
[32] Trevisan, L. Extractors and pseudorandom generators.
Journal of the ACM 48, 860–879 (2001).
[33] De, A., Portmann, C., Vidick, T. & Renner, R. Trevisan’s
extractor in the presence of quantum side information. e[print arXiv:0912.5514 (2009).](arXiv:0912.5514)
[34] Tomamichel, M., Colbeck, R. & Renner, R. Duality between smooth min- and max-entropies. IEEE Transactions on information theory 56, 4674–4681 (2010).
[35] Fehr, S., Gelles, R. & Schaffner, C. Security and composability of randomness expansion from Bell inequalities.
[e-print arXiv:1111.6052 (2011).](arXiv:1111.6052)
[36] Vazirani, U. & Vidick, T. Certifiable quantum dice
or, testable exponential randomness expansion. e-print
[arXiv:1111.6054 (2011).](arXiv:1111.6054)
[37] Pironio, S. & Massar, S. Device-independent randomness
expansion secure against quantum adversaries. e-print
[arXiv:1111.6056 (2011).](arXiv:1111.6056)
Appendix A: Separation of sources and
measurement devices
We add here one important comment about the general structure of the generic protocol given in Table 1 of
the main text. There it was crucial that in Step 1, in the
-----
case where Bob (rather than Eve) supplies the states, he
does so using a device that is isolated from his measurement device. If, on the other hand, Bob had only a single
device that both supplies states and performs measurements, then his device can hide information about day 1’s
raw key in the states he sends on day 2. (This can be
done using states of the form specified in the protocol,
masking the errors as noise as above. Alternatively, the
data could be encoded in the timings of the signals or in
quantum degrees of freedom not used in the protocol.)
Appendix B: Toxic device disposal
As noted in the main text, standard cryptographic
models postulate that the parties can create secure
laboratories, within which all operations are shielded
from eavesdropping. Device-independent quantum cryptographic models also necessarily assume that devices
within these laboratories cannot signal to the outside
– otherwise security is clearly impossible. Multi-device
protocols assume that the laboratories can be divided
into effectively isolated sub-laboratories, and that devices in separate sub-laboratories cannot communicate.
In other words, Alice and Bob must be able to build arbitrary configurations of screening walls, which prevent
communication among Eve and any of her devices, and
allow only communications specified by Alice and Bob.
Given this, there is no problem in principle in defining
protocols which prescribe that devices must be permanently isolated: the devices simply need to be left indefinitely in a screened sub-laboratory. While this could be
detached from the main working laboratory, it must be
protected indefinitely: screening wall material and secure
space thus become consumed resources. And indeed in
some situations, it may be more efficient to isolate devices, rather than securely destroy them, since devices
can be reused once the secrets they know have become
public by other means. For example, one may wish to
securely communicate the result of an election before announcing it, but once it is public, the devices used for
this secure communication could be safely reused.
The alternative, securely destroying devices and then
eliminating them from the laboratory, preserves laboratory space but raises new security issues: consider, for example, the problems in disposing of a device programmed
to change its chemical composition depending on its output bit.
That said, no doubt there are pretty secure ways of
destroying devices, and no doubt devices could be securely isolated for long periods. However, the costs and
problems involved, together with the costs of renewing
devices, make us query whether these are really viable
paths for practical device-independent quantum cryptography.
Appendix C: Privacy Amplification
Here we briefly outline the important features of privacy amplification, which is a key step in the protocol. As
explained in the main text, the idea is to compress the
string such that (with high probability) an eavesdropper’s knowledge is reduced to nearly zero. This usually
works as follows. Suppose Alice and Bob share some random string, X, which may be correlated with a quantum
system, E, held by the eavesdropper. Alice also holds
some private randomness, R. The state held by Alice
and Eve then takes the form
�
ρXRE = PX (x)PR(r)|x⟩⟨x|X ⊗|r⟩⟨r|R ⊗ ρ[x]E[,]
x,r
where {ρ[x]E[}][x][ are normalized density operators, and]
PR(r) = 1/|R|. The randomness R is used to choose
a function fR ∈F, where F is some suitably chosen
set, to apply to X such that, even if she learns R, the
eavesdropper’s knowledge about the final string is close
to zero. If we call the final string S = fR(X), then Eve
has no knowledge about it if the final state takes the form
τS ⊗ ρRE, where τS is maximally mixed on S. However,
we cannot usually attain such a state, and instead measure the success of a protocol by its variation from this
ideal, measured using the trace distance, D. Denoting
the final state (after applying the function) by ρSRE, we
are interested in D(ρSRE, τS ⊗ ρRE).
Fortunately, several sets of function are known for
which the above distance can be made arbitrarily small.
Two common constructions are those based on twouniversal hash functions [3, 29–31] and Trevisan’s extractor [32, 33]. The precise details of these is not very important for the present work (we refer the interested reader
to the references), nor is it important which we choose.
However, it is worth noting that for two-universal hash
functions, the size of the seed needs to be roughly equal
to that of the final string, while for Trevisan’s extractor, this can be reduced to roughly the logarithm of the
length of the initial string (in the latter case, this may
allow it to be sent privately, if desired).
For both, the amount that the string should be compressed is quantified by the smooth conditional minentropy, which we now define. For a state ρAB, the nonsmooth conditional min-entropy is defined as
Hmin(A|B)ρ := max
σB [sup][{][λ][ ∈] [R][ : 2][−][λ][1][1][A][ ⊗] [σ][B][ ≥] [ρ][AB][}][,]
in terms of which the smooth min entropy is given by
Hmin[ε] [(][A][|][B][)][ρ][ := max]ρ¯AB [H][min][(][A][|][B][)][ρ][¯][.]
The maximization over ¯ρ is over a set of states that are
close to ρAB according to some distance measure (see,
for example, [34] for a discussion).
The significance for privacy amplification can be seen
as follows. In [3], it is shown that if f is chosen randomly
from a set of two-universal hash functions, and applied
-----
1. Entangled quantum states used in the protocol are generated by a device Bob holds (which is separate and
kept isolated from his measurement devices) and then
shared over an insecure quantum channel with Alice’s
first device. Bob feeds his half of each state to his first
measurement device. Once the states are received, the
quantum channel is closed.
2. Alice and Bob each pick a random input Ai and Bi
to their first device, ensuring they receive an output
bit (Xi and Yi respectively) before making the next
input (so that the i-th output cannot depend on future
inputs). They repeat this M times.
3. Bob publicly announces his measurement choices, and
Alice checks that for a sufficient number of suitable input combinations for the protocol. If not, Alice aborts.
4. (Sifting.) Some output pairs may be discarded according to some protocol.
5. (Parameter estimation.) Alice and Bob use their preshared key to randomly select some output pairs (they
select only a small fraction, hence the amount of key
required for this is small). For each of the selected
pairs, Bob encrypts his output and sends it to Alice.
Alice uses the communicated bits and her corresponding outputs to compute some test function, and aborts
if it lies outside a desired range.
6. (Error correction.) Alice and Bob perform error correction using public discussion, in order to (with high
probability) generate identical strings. Eve learns the
error correction function Alice applies to her string.
7. Alice and Bob repeat Steps 1–6 for each of their
m devices (ensuring the devices cannot communicate
throughout)
8. (Privacy amplification.) Alice and Bob concatenate
their m strings and publicly perform privacy amplification [22], producing a shorter shared string about
which Eve has virtually no information. In this step,
the size of their final string is chosen such that (with
high probability) it will remain secure even if one of
the raw strings or its error corrected version becomes
known.
TABLE 2: Structure of the protocol from the main
text with modifications as in Countermeasure 3. For
this protocol Alice and Bob each have m ≥ 2 measurement
devices, and Bob has one device for creating states. They are
all kept isolated from one another.
to the raw string X, as above, then for |S| = 2[t] and any
ε ≥ 0,
D(ρSRE, τS ⊗ ρRE) ≤ ε + [1] 2 [(][H]min[ε] [(][X][|][E][)][−][t][)].
2 [2][−] [1]
(An analogous statement can be made for Trevisan’s extractor [33].) Thus, if Alice compresses her string to
length t = Hmin[ε] [(][X][|][E][)][ −] [ℓ][, then the final state after ap-]
plying the hash function has distance ε + [1]2 [2][−][ℓ/][2][ to a]
state about which Eve has no knowledge.
Turning to the QKD protocol in Table 1 of the main
text, in the case of hashing the privacy amplification procedure consists of Alice selecting t depending on the test
function computed in the parameter estimation step. She
then uses local randomness to choose a hash function to
apply to her string, and announces this to Bob, who applies the same function to his string (since we have already performed error correction, this string should be
identical to Alice’s). The idea is that, if t is chosen appropriately, it is virtually impossible that the parameter
estimation tests pass and the final state at the end of
the protocol is not close to one for which Eve has no
knowledge about the final string.
In the modified protocol in Table 2, we expect each
pair of devices to contribute roughly the same amount of
smooth min entropy to the concatenated string. Thus,
since there are m devices, in order to tolerate the potential revelation of one of the error-corrected strings
through an abort attack, Alice should choose t to be
roughly (m − 1)/m shorter than she would otherwise.
Appendix D: Memory attacks on multi-device QKD
protocols
To illustrate further the generality of our attacks, we
now turn to multi-device protocols, and show how to
break iterated versions of two well known protocols.
Attacks on compositions of the BHK protocol
The Barrett-Hardy-Kent (BHK) protocol [6] requires
Alice and Bob to share MN [2] pairs of systems (where
M and N are both large with M ≪ N ), in such a
way that no measurements on any subset can effectively
signal to the others. In a device-independent scenario,
we can think of these as black box devices supplied by
Eve, containing states also supplied by Eve. Each device is isolated within its own sub-laboratory of Alice’s
and Bob’s, so that Alice and Bob have MN [2] secure sublaboratories each. The devices accept integer inputs in
the range {0, . . ., N − 1} and produce integer outputs in
the range {0, 1}. Alice and Bob choose random independent inputs, which they make public after obtaining all
the outputs. They also publicly compare all their outputs
except for those corresponding to one pair randomly chosen from among those in which the inputs differ by ±1
or 0 modulo N . If the publicly declared outputs agree
with quantum statistics for specified measurement basis
choices (corresponding to the inputs) on a singlet state,
then they accept the protocol as secure, and take the
final undeclared outputs (which are almost certainly anticorrelated) to define their shared secret bit.
The BHK protocol produces (with high probability)
precisely one secret bit: evidently, it is extremely inefficient in terms of the number of devices required. It
also requires essentially noise-free channels and errorfree measurements. Despite these impracticalities it il
-----
lustrates our theoretical point well. Suppose that Alice
and Bob successfully complete a run of the BHK protocol
and then (unauthorised by BHK) decide to use the same
2MN [2] devices to generate a second secret bit, and ask
Eve to supply a second batch of states to allow them to
do this.
Eve — aware in advance that the devices may be
reused — can design them to function as follows. In
the first run of the protocol, she supplies a singlet pair
to each pair of devices and the devices function honestly,
carrying out the appropriate quantum measurements on
their singlets and reporting the outcomes as their outputs. However, they also store in memory their inputs
and outputs. In the second run, Eve supplies a fresh
batch of singlet pairs. However, she also supplies a hidden classical signal identifying the particular pair of devices that generated the first secret bit. (This signal need
go to just one of this pair of devices, and no others.) On
the second run, the identified device produces as output
the same output that it produced on the first run (i.e. the
secret bit generated, up to a sign convention known to
Eve). All other devices function honestly on the second
run.
With probability [MN]MN[ 2][−][2][, the output from the cheating][1]
device on the second run will be made public, thus revealing the first secret bit to Eve. Moreover, with probability
1 − 23N [+][ O][(][N][ −][2][), this cheating will not be detected by]
Alice and Bob’s tests, so that Eve learns the first secret
bit without her cheating even being noticed.
There are defences against this specific attack. First,
the BHK protocol [6] can be modified so that only outputs corresponding to inputs differing by ±1 or 0 are
publicly shared.[5] While this causes Eve to wait many
rounds for the secret bit to be leaked, and increases the
risk her cheating will be detected, it leaves the iterated
protocol insecure. Second, Alice and Bob could securely
destroy or isolate the devices producing the secret key
bit outputs, and reuse all their other devices in a second
implementation. Since only the devices generating the
secret key bit have information about it, this prevents it
from being later leaked. While effective, this last defence
really reflects the inefficiency of the BHK protocol: to illustrate this, we turn next to a more efficient multi-device
protocol.
Attacks on compositions of the HR protocol
H¨anggi and Renner (HR) [11] consider a multi-device
QKD protocol related to the Ekert [2] protocol, in which
Alice and Bob randomly and independently choose one of
5 As originally presented, the BHK protocol requires public exchange of all outputs except those defining the secret key bit.
This is unnecessary, and makes iterated implementations much
more vulnerable to the attacks discussed here.
two or three inputs respectively for each of their devices.
If the devices are functioning honestly, these correspond
to measurements of a shared singlet in the bases U0, U1
(Alice) and V0, V1, V2 (Bob), defined by the following vectors and their orthogonal complements
U1 ↔|0⟩,
V0 ↔ cos(π/8)|0⟩ + sin(π/8)|1⟩,
U0, V2 ↔ cos(π/4)|0⟩ + sin(π/4)|1⟩,
V1 ↔ cos(3π/8)|0⟩ + sin(3π/8)|1⟩ .
The raw key on any given run is defined by the ≈ 1/6
of the cases in which U0 and V2 are chosen. Information
reconciliation and privacy amplification proceed according to protocols of the type described in the main text
(in which the functions used are released publicly).
Evidently, our attacks apply here too if (unauthorised
by HR) the devices are reused to generate further secret
keys. Eve can identify the devices that generate the raw
key on day 1, and request them to release their key as
cheating outputs on later days, gradually enough that the
cheating will be lost in the noise. Since the information
reconciliation and privacy amplification functions were
made public by Alice, she can then obtain the secret key.
Even if she is unable to communicate directly with the
devices for a long time (because they were pre-installed
with a very large reservoir of singlets), she can program
all devices to gradually release their day 1 outputs over
subsequent days, and so can still deduce the raw and
secret keys.
Alice and Bob could counter these attacks by securely
destroying or isolating all the devices that generated raw
key on day 1 — but this costs them 1/6 of their devices,
and they have to apply this strategy each time they generate a key, leaving (5/6)[N] of the devices after N runs,
and leaving them able to generate shorter and shorter
keys. As the length of secure key generated scales by
(5/6)[N] (or worse, allowing for fluctuations due to noise)
on each run, the total secret key generated is bounded
by ≈ 6M, where M is the secret key length generated on
day 1.
Note that, as in the case of the iterated BHK protocol, all devices that generate secret key become toxic and
cannot be reused. While the relative efficiency of the HR
protocol ensures a (much) faster secret key rate, it also
requires an equally fast device depletion rate. This example shows that our attacks pose a generic problem for
device-independent QKD protocols of the types considered to date.
Appendix E: Device-independent randomness
expansion protocols: attacks and defences
Device-independent quantum randomness expansion
(DVI QRE) protocols were introduced by two of us [13,
15], developed further by [14, 35–37], and there now exist schemes with unconditional security proofs [36]. The
-----
cryptographic scenario here is slightly different from that
of key distribution in that there is only one honest party,
Alice.
Alice’s aim is to expand an initial secret random string
to a longer one that is guaranteed secret from an eavesdropper, Eve, even if the quantum devices and states
used are supplied by Eve. The essential idea is that seed
randomness can be used to carry out nonlocality tests on
the devices and states, within one or more secure laboratories, in a way that guarantees (with numerical bounds)
that the outcomes generate a partially secret and random string. Privacy amplification can then be used to
generate an essentially fully secret random string, which
(provided the tests are passed) is significantly longer than
the initial seed.
There are already known pitfalls in designing such protocols. For example, although one might think that carrying out a protocol in a single secure laboratory guarantees that the initially secure seed string remains secure,
and so guarantees randomness expansion if any new secret random data is generated, this is not the case [15].
Eve’s devices may be programmed to produce outputs depending on the random seed in such a way that the length
of the final secret random string depends on the initial
seed. Protocols with this vulnerability are not composably secure. (To see this can be a practical problem, note
that Eve may infer the length of the generated secret random string from its use.)
A corollary of our results is that, if one wants to reuse
the devices to generate further randomness, it is crucial
to carry out DVI QRE protocols with devices permanently held within a single secure laboratory, avoiding
any public communication of device output data at any
stage. It is crucial too that the devices themselves are securely isolated from classical communications and computations within the laboratory, to prevent them from
learning details of the reconciliation and privacy amplification.
Even under these stringent conditions, our attacks still
apply in principle. For example, consider a noise-tolerant
protocol that produces a secret random output string of
variable length, depending on the values of test functions
of the device outputs (the analogue of QKD parameter
estimation for QRE) that measure how far the device
outputs deviate from ideal honest outputs. This might
seem natural for any single run, since – if the devices are
never reused – the length of the provably secret random
string that can be generated does indeed depend on the
value of a suitable test function. However, iterating such
a protocol allows the devices to leak information about
(at least) their raw outputs on the first run by generating
artificial noise in later rounds, with the level of extra
noise chosen to depend suitably on the output values.
Such noise statistically affects the length of the output
random strings on later rounds.
In this way, suitably programmed devices could ultimately allow Eve to infer all the raw outputs from the
first round, given observation of the key string lengths
created in later rounds. This makes the round one QRE
insecure, since given the raw outputs for round one, and
knowing the protocol, Eve knows all information about
the output random string for round one, except that determined by the secret random seed.
One defence against this would be to fix a length L for
the random string generated corresponding to a maximum acceptable noise level, and then to employ the Procrustean tactic of always reducing the string generated
to length L, regardless of the measured noise level.
Even then, though, unless some restriction is placed on
the number of uses, the abort attack on QKD protocols
described in the main text also applies here. The devices
have the power to cause the protocol to abort on any
round of their choice, and so – if she is willing to wait
long enough – Eve can program them to communicate
any or all information about their round 1 raw outputs
by choosing the round on which they cause an abort.
We also described in the main text a moderately costly
but apparently effective defence against abort attacks
on QKD protocols, in which Alice and Bob each have
several isolated devices that independently generate raw
sub-keys, which are concatenated and privacy amplified so that exposing a single sub-key does not significantly compromise the final secret key. This defence appears equally effective against abort attacks on deviceindependent quantum randomness expansion protocols.
Since quantum randomness expansion generally involves
only a single party, these protocols are not vulnerable to
the impostor attacks described in the main text. It thus
appears that it may be possible in principle to completely
defend them against memory attacks, albeit at some cost.
It is also worth noting that there are many scenarios in which one only needs short-lived randomness, for
example, in many gambling applications, bets are often
placed about random data that are later made public.
In such scenarios, once such random data have been revealed, the devices could be reused without our attacks
presenting any problem.
-----
| 13,355
|
{
"disclaimer": "Notice: Paper or abstract available at https://arxiv.org/abs/1201.4407, which is subject to the license by the author or copyright owner provided with this content. Please go to the source to verify the license and copyright information for your use.",
"license": null,
"status": "GREEN",
"url": "http://arxiv.org/pdf/1201.4407"
}
| 2,012
|
[
"JournalArticle"
] | true
| 2012-01-20T00:00:00
|
[
{
"paperId": "17c16c133ab46e66ea0a08f40d19b3308733c348",
"title": "Quantum cryptography: Public key distribution and coin tossing"
},
{
"paperId": "da3de28bfd3019d84c3c5fb54922cfa36b683484",
"title": "Reusing devices with memory in device independent quantum key distribution"
},
{
"paperId": "9c4c1da0698b78dd664d144b813b595480641f1e",
"title": "Unconditionally secure device-independent quantum key distribution with only two devices"
},
{
"paperId": "e1469396f6ff2eb3ebd592e27db829306ba8b712",
"title": "Classical command of quantum systems via rigidity of CHSH games"
},
{
"paperId": "050b4e393f4629c1869d8b39b5c1904cf36540c0",
"title": "Security and Composability of Randomness Expansion from Bell Inequalities"
},
{
"paperId": "c6d2abf4806ba7a7c45251be8e27d8b6d916a014",
"title": "Certifiable Quantum Dice - Or, testable exponential randomness expansion"
},
{
"paperId": "fa16254cda21e31d45a9920983f65a8eab1201da",
"title": "Device-independent randomness expansion secure against quantum adversaries"
},
{
"paperId": "c0a216cc6060649ff7dbd8c6816f44ce02e31caa",
"title": "Fully distrustful quantum bit commitment and coin flipping."
},
{
"paperId": "aae169e6f13726343cf569b627a6ff958135b511",
"title": "Private randomness expansion with untrusted devices"
},
{
"paperId": "7fcb2d74ecde9506138d1835c7da51a1f010e1e5",
"title": "Full-field implementation of a perfect eavesdropper on a quantum cryptography system."
},
{
"paperId": "f3208f01ccfe7b5a89f53815faf7a37e2cb671e5",
"title": "Device-Independent Quantum Key Distribution with Commuting Measurements"
},
{
"paperId": "34c35806d493709645bbec0f400c72bf208d2c36",
"title": "Secure device-independent quantum key distribution with causally independent measurement devices."
},
{
"paperId": "0460303f7bac4fc8eae01482b31b2fb98bf9e95e",
"title": "Leftover Hashing Against Quantum Side Information"
},
{
"paperId": "34b71802dac3b478504b34d23483bd43fd558040",
"title": "Trevisan's Extractor in the Presence of Quantum Side Information"
},
{
"paperId": "14fdbdc3a57c072a8332826ab3291b6a8e664f3b",
"title": "Quantum And Relativistic Protocols For Secure Multi-Party Computation"
},
{
"paperId": "29dd7297102a2f248323aa5450ea7b3980180091",
"title": "Random numbers certified by Bell’s theorem"
},
{
"paperId": "edbd126301d391bc917add68527eede51260bd9f",
"title": "Less reality, more security"
},
{
"paperId": "d9745d2a4d5fa96fcfd44e6111c6129bd8c836ab",
"title": "Duality Between Smooth Min- and Max-Entropies"
},
{
"paperId": "be2e91a735e4084ea92439f517f4d31713472b0a",
"title": "Device-independent security of quantum cryptography against collective attacks."
},
{
"paperId": "e76bb6dec7591c18ddddc4a18e60574aaac07f9f",
"title": "Secrecy extraction from no-signaling correlations"
},
{
"paperId": "dea44b39d8b8d8cbf16730a53c2c00365a19a29b",
"title": "Maximally Non-Local and Monogamous Quantum Correlations"
},
{
"paperId": "022f4ca76b07470a6ef1824fa546e5b093a9fbf2",
"title": "Security of quantum key distribution"
},
{
"paperId": "57afbbf50de42a137c1ae2d815db3f65bd7f79b2",
"title": "From Bell's theorem to secure quantum key distribution."
},
{
"paperId": "fc5b6f804af3f5937de217e2064e0a00f4b31d79",
"title": "No signaling and quantum key distribution."
},
{
"paperId": "4d9f0580409beb76d3576cadce59168686d49b3a",
"title": "Quantum nonlocality, Bell inequalities, and the memory loophole"
},
{
"paperId": "95ea3854f3e6bbb72d914e12e7e85b34b89518f1",
"title": "Appendix to \"Accardi contra Bell (cum mundi) : The Impossible Coupling\""
},
{
"paperId": "142e66fa3d21519838d7a4907303b562ed2a2f71",
"title": "Quantum cryptography with imperfect apparatus"
},
{
"paperId": "f8dcc3047eef8da135bca13b926b1e6cf50e7f3a",
"title": "Quantum cryptography based on Bell's theorem."
},
{
"paperId": "47cd50eec7f3d5ba6e4db9afdd9ea83545674236",
"title": "A personal communication"
},
{
"paperId": "594dfbdf3e3ba9df94a31ab9cb1e23912773b98a",
"title": "Privacy Amplification by Public Discussion"
},
{
"paperId": "345e83dd58f26f51d75e2fef330c02c9aa01e61b",
"title": "New Hash Functions and Their Use in Authentication and Set Equality"
},
{
"paperId": "feb061b699a2249f803baf159a991d63c64f9c99",
"title": "Universal Classes of Hash Functions"
},
{
"paperId": "8864c5214a30a7acd8d186f53e8991cd8bc88f84",
"title": "Proposed Experiment to Test Local Hidden Variable Theories."
},
{
"paperId": null,
"title": "The impossibility of non-signalling privacy amplification"
},
{
"paperId": "ca73bec3f9b1a483c64ccb51e8dd154fe87fbd42",
"title": "Extractors and pseudorandom generators"
},
{
"paperId": "374837e783a61f5b716bf8fe39476c25e1546362",
"title": "Parameter estimation"
},
{
"paperId": null,
"title": "No Signalling and Quantum Key Distribution a Quantum Protocol for Secret Bit Distribution"
},
{
"paperId": "fc60c0f724eb8436b9f10a530c27484b1c8be321",
"title": "Ju n 20 06 Unconditional security of key distribution from causality constraints"
},
{
"paperId": null,
"title": "Bob publicly announces his measurement choices, and Alice checks that for a sufficient number of suitable input combinations for the protocol. If not"
},
{
"paperId": null,
"title": "Alice or Bob (or both"
}
] | 13,355
|
en
|
[
{
"category": "Computer Science",
"source": "s2-fos-model"
}
] |
https://www.semanticscholar.org/paper/0002c60ed10a8868930b8f971af29e62b498f6b8
|
[] | 0.87827
|
Problems of evaluation of digital evidence based on blockchain technologies
|
0002c60ed10a8868930b8f971af29e62b498f6b8
|
JANUS NET e-journal of International Relation
|
[
{
"authorId": "1686911565",
"name": "Otabek Pirmatov"
}
] |
{
"alternate_issns": null,
"alternate_names": null,
"alternate_urls": null,
"id": null,
"issn": null,
"name": null,
"type": null,
"url": null
}
| null |
OBSERVARE
Universidade Autónoma de Lisboa
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023)
# NOTES AND REFLECTIONS
PROBLEMS OF EVALUATION OF DIGITAL EVIDENCE BASED ON
BLOCKCHAIN TECHNOLOGIES[1]
**OTABEK PIRMATOV**
[[email protected]](mailto:[email protected])
Assistant Professor of the Department of Civil Procedural and Economic Procedural Law,
Tashkent State University of Law (Uzbekistan), Doctor of Philosophy in Law (PhD)
## Introduction
Digital evidence is fundamentally different from physical evidence and written evidence.
Securing physical evidence is primarily to prevent it from being lost or difficult to obtain
in the future.
Compared to traditional evidence, electronic evidence is fragile, easy to change and
delete, and difficult to guarantee its authenticity. For example, data on a personal
computer may be lost due to misuse, virus attack, etc. During the preparation of the
case, the video can be deleted in order to hide the facts. In fact, most electronic evidence
is stored in a central database. If the database is unreliable, the validity of the data is
not guaranteed. Obviously, how to ensure the authenticity and integrity of digital
evidence is very important when storing it.
Because digital evidence is created by special high-tech, it is easier to change it in
practice. More attention should be paid to its authenticity. Digital evidence is more likely
to be tampered with in practice.
The main methods of digital evidence storage (pre-trial provision) in civil court
proceedings are as follows:
1) sealing or closing the means of keeping the original of evidence;
2) printing, photographing and sound or visual recording;
1 This text is devoted the issues of evaluation of digital evidence based on blockchain technologies in civil
court proceedings. The article states that since it is not possible to change and delete evidence based on
block-chain technology, contracts based on blockchain technology and documents issued by government
bodies are considered acceptable evidence by the courts. It is highlighted that the usage of evidence based
on block-chain technology in conducting civil court cases will prevent the need for notarization of digital
evidence by the parties in the future.
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
3) drawing up reports;
4) authentication;
5) provision through a notary office;
6) storage through block-chain;
7) casting a time stamp (time stamp).
Block-chain is a database where data is securely stored. This is achieved by connecting
each new record with the previous one, resulting in a chain consisting of data blocks
("block chain" in English)—hence the name. Physically, the blockchain database is
distributed, allowing authorized users to independently add data. It is impossible to make
changes to previously stored data, as this action will break the chain, and it is
"immutability" that makes the block-chain a safe and reliable means of storing digital
records in public databases[2].
Officially, the history of “blocks and chains” begins on October 31, 2008, when someone
under the pseudonym Satoshi Nakamoto mentioned the blockchain in a white paper (base
document) about the network of the first cryptocurrency - bitcoin. The fundamental
principles for applying decentralization and immutability to document accounting were
laid down as early as the 1960s and 1970s, but the closest to them are the works of
scientists Stuart Haber and W. Scott Stornett, who in 1991 described a scheme for
sequentially creating blocks in which a hash is located. The technology was even
patented, but for its time it became a Da Vinci helicopter - there was no technical
possibility to implement the idea, and interest in it disappeared. The patent expired in
2004, just four years before Satoshi and his white paper appeared[3].
## 1. Literature review
S.S. Gulyamov defines block-chain as follows: blockchain (chain of blocks) is a distributed
set of data, in which data storage devices are not connected to a common server. These
data sets are called blocks and are stored in an ever-growing list of ordered records. Each
block will have a timestamp and a reference to the previous block. The use of encryption
ensures that users cannot write to the file without them, while the presence of private
keys can only modify a certain part of the blockchains.
In addition, encryption ensures synchronization of all users' copies of the distributed
chain of blocks (Gulyamov, 2019: 114).
Primavera De Filippi and Aaron Wright (2018) point out that block-chain technology is
different from other electronic evidence because it cannot be forgotten. The technology
itself has evidential value for the judicial system.
_Markus Kaulartz, Jonas Gross, Constantin Lichti, Philipp Sandner_ define block-chain
technology is getting increasingly renowned, as more and more companies develop
blockchain-based prototypes, e.g., in the context of payments, digital identities, and the
2 [https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/](https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/)
3 [https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii](https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
supply chain. One use case of blockchain is often seen in the tamper-proof storage of
information and documentation of facts. This is due to the fact that records on a blockchain are “practically resistant” to manipulation as a consequence of the underlying
cryptography and the consensus mechanism.
If a block-chain is used for storing information, the question arises whether the data stored
on a block-chain can be used as evidence in court. In the following article, we will analyze
this question[4].
According to Alexey Sereda, the correct usage of blockchain technologies will eliminate
the need for lawyers to perform certain mechanical tasks to a significant extent: checking
counterparties, contacting other experts (bodies), the need for notarization, etc. All this
allows lawyers to focus their efforts on solving other more important tasks[5].
Vivien Chan and Anna Mae Koo define blockchain is a decentralized and open distributed
ledger technology. Electronic data (e.g. in a transaction on an e-shopping platform, the
transaction time, purchase amount, currency and participants, etc.) will be uploaded to
a network of computers in “blocks”. Since the data saved in a blockchain is stored in a
network of computers in a specific form and is publicly available for anyone to view, the
data is irreversible and difficult to be manipulated.
Anyone who has handled an online infringement case knows the race against time in
preserving evidence. However, screenshots saved in PDF formats are easy to be
tampered with and are of scant probative value before the Chinese courts, unless
notarized. Making an appointment with, and appearing before a notary is another timeconsuming and expensive process.
With blockchain, these procedures can be simplified and improved in the following ways:
1. E-evidence can be saved as blockchain online instantaneously without a notary
public;
2. Cost for generating blockchain evidence is lower than traditional notarization;
3. Admissibility of block-chain evidence has been confirmed by statute and many courts
in China because of the tamper-free nature of block-chain technology;
4. Possible combination of online monitoring and evidence collection process: with
blockchain technology and collaboration with different prominent online platforms
(e.g. Weixin), it is possible to automate online monitoring of your intellectual
property—blockchain evidence is saved automatically when potential infringing
contents are found[6].
According to Matej Michalko, in the previous trials of dispute cases, evidence preservation
usually requires the involvement of a third-party authority such as a notary office, and
relevant persons are required to fix the evidence under the witness of the notary. With
the more frequent use of electronic evidence, most of the third-party electronic data
preservation platforms have investigated the pattern of “block-chain + evidence
4 [www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5)
[court-704ab7255cf5](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5)
5 [https://blockchain24.pro/blokcheyn-i-yurisprudentsiya](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya)
6 [https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb](https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
collection and preservation”, which is applying blockchain technology to the traditional
electronic evidence preservation practice (i.e., uploading the preserved evidence to a
block-chain platform). If it is necessary, you can apply online for an expert opinion from
the judicial expertise center. (Michalko, 2019: 7).
Today, the task of providing electronic evidence before the court is carried out by
notaries.
Data recorded on a blockchain is in essence a chronological chain of digitally signed
transactions. Thus, admissibility of block-chain evidence is highly correlated to
acceptance of electronic signatures in a legal setting. Not all electronic signatures provide
the same level of assurance. (Murray, 2016: 517-519).
The usage of this technology when concluding transactions or receiving any official
documents from the state greatly simplifies the process of proof, as it allows to track the
entire history of changes made to the information stored in the blockchain. It also reliably
protects them from illegal attempts to tamper or forge. Such evidence will be nearly
impossible to challenge, although the risk of hacking or fraudulent activity remains.
Second, if the court session is conducted using video conferencing, the blockchain can
be easily used by the participants in the court session. Given the development of remote
technologies caused by the coronavirus pandemic, this situation must be taken into
account. Thus, thanks to the use of blockchain, it is possible to significantly reduce the
time for consideration of cases in courts, increase the transparency of court proceedings
and ensure the necessary confidentiality of information.
If the contracts concluded by the parties are based on the blockchain technology or if the
state authorities draw up their documents based on the blockchain technology, then it
would be possible to evaluate the blockchain technology as evidence by the courts. Now
in our country, government bodies are signing their documents with Q-code.
According to Boris Glushenkov, the successful implementation of the blockchain will also
change the courts: firstly, there will be no need to make decisions for concrete things.
Second, evidence changes: electronic evidence is viewed with skepticism in courts.
Maybe blockchain can change that[7].
In civil litigation, evidence was evaluated as evidence only if it met each of the criteria of
relevance, admissibility, and reliability. Likewise, numerical evidence must meet the
requirements of relevance, acceptability, and reliability of evidence evaluation criteria.
Failure to evaluate digital evidence with one of the evidentiary evaluation criteria may
result in its inadmissibility as evidence in court.
According to Yuhei Okakita, In civil litigation, any form of evidence can generally be
submitted to the court. That is, the court accepts not only physical documents but also
digital data as evidence. Of course, civil procedure laws vary from country to country,
but electronic evidence is recognized in many legislations such as the EU, the United
States, or Japan. Since it can be said that blockchain certificates are a kind of digital
data, it should be accepted in most courts as admissible evidence.
7 [https://blockchain24.pro/blokcheyn-i-yurisprudentsiya](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
So, you can submit the certificate to the court. However, the question is how judges
evaluate the evidence. Let's to through an example relevant for e.g. the German or
Japanese system: in these systems, it is up to the discretion of the judge to decide
whether the certificate will be taken into consideration. If the judge believes the
authenticity of the certificate, it will become the basis of the judgment.
Let's suppose that the claim of a defendant in a dispute could be validated with the data
certified with a blockchain transaction. The judge decides on the authenticity of the
submitted evidence based on the opinions of both parties. The defendant will explain the
concept of blockchain immutability achieved with the consensus mechanism, and the
other party will argue the possibility that the information on the blockchain has been
tampered with. After the judge considers both stories and takes a position regarding the
authenticity of the information, s/he will make a decision accordingly[8].
According to Zihui (Katt) Gu, For the blockchain evidence to be admissible, the
authenticity of the source of the electronic data must first be confirmed, whether through
examination of the original or comprehensive consideration of all the evidence at hand[9].
The admissibility of digital evidence is one of the problems of judicial evaluation of
evidence in civil litigation.
In ensuring the admissibility of electronic evidence in foreign countries, transferring it to
the blockchain software or evaluating the evidence in the blockchain software as
admissible evidence is of great importance.
According to Van Yojun, if blockchain technology can be applied to any digital evidence,
regardless of whether it is a criminal or civil trial, the general expected benefits can be
achieved, including: ensuring the integrity and accuracy of data, preventing the
tampering of data or evidence, increasing the transparency of legal proceedings, Court
proceedings are easy to follow, accelerated and simplified[10].
## 2. Issues of application of blockchain technology in the legislation of
foreign countries
The Federal Government of the United States has not exercised its constitutional power
to implement legislation regulating the admissibility of blockchain evidence in court.
Thus, states enjoy residual power to implement their own legislation. The Federal Rules
of Evidence establish a minimum requirement in what is referred to as the ‘best evidence
rule which establishes that the best evidence must be used at trial. Rule 1002 of the
Federal Rules of Evidence states “An original writing, recording, or photograph is required
in order to prove its content unless these rules or a federal statute provides otherwise”.
Several states have regulated blockchain through introducing their own legislation and
rules, particularly with regard to the regulation of cryptocurrency – or as termed by
various legislators, virtual currencies. New York kickstarted legislative developments in
8 [https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation)
[ip-litigation](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation)
9 [http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/](http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/)
10
[https://www.ithome.com.tw/news/130752](https://www.ithome.com.tw/news/130752)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
the USA through the regulation of virtual currency companie, and eventually several
states followed suit, with 32 states implementing their own rules and regulations. The
states of Illinois, Vermont, Virginia, Washington, Arizona, New York and Ohio have
passed or introduced legislation which specifically regulates the admissibility of
blockchain evidence in court[11].
In April 2018, 1 22 member states signed the Declaration for a European Blockchain
Partnership (EBP) in order to “cooperate on the development of a European Blockchain
Services Infrastructure.”2 With its ambitious goal of identifying initial use cases and
developing functional specifications by the end of the year, the EBP should be an
important catalyst for the use of blockchain technology by European government
agencies[12].
In October 2018, discussions were underway among the Azerbaijani Internet Forum (AIF)
for the Ministry of Justice to implement blockchain technology in several departments
within its remit. Currently, the Ministry provides more than 30 electronic services and 15
information systems and registries, including “electronic notary, electronic courts,
penitentiary service, information systems of non-governmental organizations”, and the
register of the population, among others. Part of the AIF’s plans is to introduce a “mobile
notary office” which would involve the notarization of electronic documents. Through this
process, the registry’s entries will be stored on blockchain which parties will be able to
access but not change, thus preventing falsification. Future plans also include employing
smart contracts in public utility services such as water, gas and electricity[13].
Blockchain technology is a new way to build a network. Today, almost all service systems
in the Internet system work on the basis of a centralized network, that is, the data
warehouse is located on a central server, and users receive data by connecting to this
server. The main difference of blockchain technology is that there is no need for a central
server and all network participants have equal rights. The network database is kept by
each user.
One of the main reasons why evidence based on blockchain technology is considered
admissible by courts is that blockchain technology is transparent, that is, it is not affected
by the human factor.
According to the Decision of the President of the Republic of Uzbekistan dated July 3,
2018, "On measures to develop the digital economy in the Republic of Uzbekistan":
− basic concepts in the field of "blockchain" technologies and principles of its operation;
− powers of state bodies, as well as process participants in the field of "blockchain"
technologies;
− measures of responsibility for using "blockchain" technologies for illegal purposes.
The State Services Agency of the Republic of Uzbekistan has decided that starting from
December 2020, the country's registry offices will operate based on blockchain
technology. However, as of today, this system has not yet been launched. It would be
11 [https://blog.bcas.io/blockchain_court_evidence](https://blog.bcas.io/blockchain_court_evidence)
12 [https://www.eublockchainforum.eu/reports](https://www.eublockchainforum.eu/reports)
13 [https://blog.bcas.io/blockchain_court_evidence](https://blog.bcas.io/blockchain_court_evidence)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
appropriate if the documents issued not only by registry authorities, but also by tax
authorities, cadastral departments, transactions concluded by notary offices, and most
importantly, decisions of district and city mayors and reports issued by electronic auction,
e-active, would be accepted based on blockchain technology.
Agreements concluded by notary offices in civil courts, decisions of district and city
mayors, and reports issued by electronic auction serve as the main written evidence
confirming ownership rights.
Due to the widespread involvement of information technologies in all spheres of social
life in our country, the above bodies are also moving to receive documents in electronic
form.
Also, distribution of electricity based on blockchain technology is being carried out in
Uzbekistan based on South Korean technology. Perhaps, in the future, electricity
contracts in our country may be concluded on the basis of blockchain technology.
## 3. Discussion
With the development of the Internet and information technology, digital data has
gradually become an important part of the evidence system in civil court cases, which
cannot be ignored. Among all types of digital data, blockchain evidence is a relatively
new type.
A proper blockchain is not a proof itself, but a technical implementation method of
storing, transporting and correcting digital data.
Blockchain is just a storage technology, the purpose of which is to ensure the authenticity
and reliability of digital data. The most important thing is to determine the authenticity
of the digital data.
Improvements in blockchain technology can make electronic documents flow more
quickly and improve the efficiency of their assessment in courts. However, compared to
the traditional notarization method of securing electronic evidence, blockchain-based
evidence storage lags behind. That is, there are not enough normative legal documents
on the implementation of blockchain technologies in the field of justice. Notarization,
which has become a means of preventing falsification of electronic documents, is rarely
used in legal practice, because notarization of electronic evidence requires excessive time
and money for the parties.
It includes digital signatures, reliable time stamps and hash value verification to prove
the authenticity of the submitted data using blockchain technology. Parties must be able
to demonstrate how blockchain technology has been used to collect and store evidence.
Due to the decentralization of information in the blockchain network, it is very difficult
for hackers to exploit. Additionally, since each block contains the hash of the previous
block, any transaction within the blockchain is done by changing it.
Check Hash Value: After computing any electronic file using hash algorithm, only one
hash value can be obtained. If the content of the electronic file changes, the resulting
hash value will also change. The uniqueness and non-repeatability of the hash value
ensures the immutability of electronic files.
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
The verifier can use the hash value written to the blockchain to verify the original data
to verify that the data is valid and has not been tampered with.
Encrypting evidence can also ensure its safe storage. At a basic level, encryption uses a
secret key to ensure that only those with access can read the file by encrypting the file's
contents.
It is possible to prepare documents based on blockchain technology in applications such
as SharpShark, SynPat, WordProof, Waves, EUCD, DMCA.
The main reason why evidence based on blockchain technology is considered acceptable
evidence in foreign countries is its technological structure. We can see the following
unique features of it:
- at the discretion of one of the parties, it is not possible to change and add (falsify
and destroy) documents based on blockchain technology;
- documents based on blockchain technology are a technology resistant to hacker
attacks, which means that electronic evidence based on blockchain technology
cannot be tampered with by third parties;
- in blockchain technology, there is no need for a central server, and all network
participants have equal rights. A network database stores every user in it.
The lack of possibility of falsification and alteration of the evidence based on blockchain
technology makes it considered acceptable evidence by the courts.
According to the civil procedural law, the admissibility of the evidence must be confirmed
by certain means of proof according to this law.
In order to ensure the admissibility of electronic evidence, it is appropriate to create
electronic documents, electronic transactions using blockchain technology, and to
improve the legislation in this regard.
The following features of blockchain evidence should be considered:
1. To review the authenticity of the blockchain evidence. Specifically, it means that the
court should examine whether the blockchain evidence is likely to be tampered with
in the process of formation, transmission, extraction and display, and to the extent
of such possibility.
2. To review the legitimacy of the blockchain evidence. Specifically, it means that the
court should examine whether the collection, storage and extraction methods of
blockchain evidence comply with the law, and whether they infringe on the legitimate
rights and interests of others.
3. To review the relevance of blockchain evidence. Specifically, it means that the court
should examine whether there is a substantial connection between the blockchain
evidence and the facts to be proved[14].
14 [https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts)
[courts](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
## Conclusion
Blockchain storage solves the problem of securely storing digital data. In a sense,
blockchain storage is an authentication or auxiliary storage method. Currently,
blockchain storage is a more indirect authentication method.
One of the peculiarities of blockchain technology in legal science is that the use of this
technology when concluding transactions or obtaining any official documents from
government authorities greatly simplifies the process of proof. Due to this, the blockchain
allows to track the entire history of changes made to the data stored in the "data" and
reliably protects against illegal attempts to tamper with or falsify the data. Such evidence
would be nearly impossible to challenge, but the risk of hacking or fraudulent activity
remains, albeit partially. Second, if court hearings are held online, the possibility of
blockchain use by court hearing participants will increase even more. Thus, due to the
use of blockchain, it is possible to significantly reduce the time of consideration of cases
in civil courts and to increase the transparency of judicial processes and ensure the
necessary confidentiality of information.
Because public offering of goods and services on social networks has become popular in
our country. Purchase of goods and services on social networks is carried out through
mutual correspondence. Correspondence in the social network can be deleted or
changed. This creates problems in evaluating social network correspondence as evidence
in civil courts.
The adoption of blockchain technologies by social networks may also lead to the use of
social media correspondence as evidence in courts in the future.
## References
Blockchain 24, consulted online, available at [https://blockchain24.pro/blokcheyn-i-](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya)
[yurisprudentsiya](https://blockchain24.pro/blokcheyn-i-yurisprudentsiya)
Chan, Viviene (2020). Blockchain Evidence in Internet Courts in China: The Fast Track
for Evidence Collection for Online Disputes. Consulted online, available at
[https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-](https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb)
[5260a2e4b9bb](https://www.lexology.com/library/detail.aspx?g=1631e87b-155a-40b4-a6aa-5260a2e4b9bb)
De Filippi, Primavera and Wright, Aaron (2018). _Blockchain and the Law: The Rule of_
_Code. Harvard University Press._
Du, Guodong and Yu, Meng (2021). “When Blockchain Meets Electronic Evidence in
China's Internet Courts”, China Justice Observer Consulted online, available at
[https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts)
[in-china-s-internet-courts](https://www.chinajusticeobserver.com/a/when-blockchain-meets-electronic-evidence-in-china-s-internet-courts)
European Union blockchain observatory & forum, blockchain for government and public
[services (Dec. 7, 2018), https://www.eublockchainforum.eu/reports](https://www.eublockchainforum.eu/reports)
-----
JANUS.NET, e journal of International Relations
e-ISSN: 1647-7251
Vol. 14, Nº. 1 (May-October 2023), pp. 279-288
_Notes and Reflections_
_Problems of evaluation of digital evidence based on blockchain technologies_
Otabek Pirmatov
Fedorov, Pavel (2022). “What is blockchain: everything you need to know about the
technology”, Forbes, consulted online, available at
[https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-](https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii)
[tehnologii](https://www.forbes.ru/mneniya/456381-cto-takoe-blokcejn-vse-cto-nuzno-znat-o-tehnologii)
Gazeta.uz (2022). Blockchain technology is not a problem, but it is a problem that has
_to_ _be_ _solved._ Consulted online, available at
[https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/](https://www.gazeta.uz/uz/2022/08/26/blockchain-technology/)
# Gross, Jonas (2020). Legal aspects of blockchain technology. Consulted online, availabe at
[www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5)
[blockchain-as-evidence-in-court-704ab7255cf5](http://www.jonasgross.medium.com/legal-aspects-of-blockchain-technology-part-1-blockchain-as-evidence-in-court-704ab7255cf5)
Gulyamov, S. (2019). Blockchain technologies in the digital economy. Textbook, p. 114.
iThome (2022). Taiwan Takes the Lead in Judicial Blockchain Applications] An Inventory
_of_ _Global_ _Judicial_ _Blockchain_ _Applications,_ consulted online, available at
[https://www.ithome.com.tw/news/130752](https://www.ithome.com.tw/news/130752)
Michalko, Matej (2019). “Blockchain ‘witness’: a new evidence model in consumer
disputes”. International journal on consumer law and practice. V.7., p.7.
Murray, Andrew (2016). Information Technology Law, p. 517-519.
Okakita, Yuhei (2020). _Can digital data stored on Blockchain be valid evidence in IP_
_litigation?. Consulted online, available at_ [https://www.bernstein.io/blog/2020/1/17/can-](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation)
[digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation](https://www.bernstein.io/blog/2020/1/17/can-digital-data-stored-on-blockchain-be-a-valid-evidence-in-ip-litigation)
Pollacco, Alexia (2020). _The Interaction between Blockchain Evidence and Courts – A_
_cross-jurisdictional_ _analysis._ _Consulted_ _online,_ _available_ _at_
[https://blog.bcas.io/blockchain_court_evidence](https://blog.bcas.io/blockchain_court_evidence)
_The Illinois Journal of Law, Technology & Policy, consulted online, available at_
[http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-](http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/)
[opportunities-and-concerns/](http://illinoisjltp.com/timelytech/blockchain-based-evidence-preservation-opportunities-and-concerns/)
**How to cite this note**
Pirmatov, Otabek (2023). Problems of evaluation of digital evidence based on blockchain
technologies. Notes and Reflections in Janus.net, e-journal of international relations. Vol. 14, Nº
1, May-October 2023. Consulted [online] on date of last visit, [https://doi.org/10.26619/1647-](https://doi.org/10.26619/1647-7251.14.1.01)
[7251.14.1.01](https://doi.org/10.26619/1647-7251.14.1.01)
-----
| 8,425
|
{
"disclaimer": "Notice: Paper or abstract available at https://api.unpaywall.org/v2/10.26619/1647-7251.14.1.01?email=<INSERT_YOUR_EMAIL> or https://doi.org/10.26619/1647-7251.14.1.01, which is subject to the license by the author or copyright owner provided with this content. Please go to the source to verify the license and copyright information for your use.",
"license": "CCBY",
"status": "GOLD",
"url": "https://janusnet-ojs.autonoma.pt/index.php/janus/article/download/27/107"
}
| 2,023
|
[
"JournalArticle"
] | true
| null |
[] | 8,425
|
en
| [{"category":"Medicine","source":"external"},{"category":"Environmental Science","source":"s2-fos-mo(...TRUNCATED)
|
https://www.semanticscholar.org/paper/000523657fe1a5879d72c099f619ea0de4424bff
|
[
"Medicine"
] | 0.840286
|
Plastic waste recycling: existing Indian scenario and future opportunities
|
000523657fe1a5879d72c099f619ea0de4424bff
|
International Journal of Environmental Science and Technology
| [{"authorId":"143784002","name":"R. Shanker"},{"authorId":"102022907","name":"D. Khan"},{"authorId":(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":["Int J Environ Sci Technol"],"alternate_urls":["http://ww(...TRUNCATED)
| "This review article aims to suggest recycling technological options in India and illustrates plasti(...TRUNCATED)
| "https://doi.org/10.1007/s13762 022 04079 x\n\n**REVIEW**\n\n# Plastic waste recycling: existing Ind(...TRUNCATED)
| 24,818
| {"disclaimer":"Notice: Paper or abstract available at https://pmc.ncbi.nlm.nih.gov/articles/PMC89762(...TRUNCATED)
| 2,022
|
[
"Review",
"JournalArticle"
] | true
| 2022-04-02T00:00:00
| [{"paperId":"b939a479ff3ec6cf01a209b4c12fd78a4c971227","title":"Life cycle assessment of plastic was(...TRUNCATED)
| 24,818
|
en
| [{"category":"Computer Science","source":"external"},{"category":"Medicine","source":"external"},{"c(...TRUNCATED)
|
https://www.semanticscholar.org/paper/000548b90449dad8f1aaa3207fa6b77503c1d2a3
|
[
"Computer Science",
"Medicine"
] | 0.893853
|
A Distributed and Secure Self-Sovereign-Based Framework for Systems of Systems
|
000548b90449dad8f1aaa3207fa6b77503c1d2a3
|
Italian National Conference on Sensors
| [{"authorId":"1401654761","name":"D. E. D. I. Abou-Tair"},{"authorId":"2227684617","name":"Raad Hadd(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":["SENSORS","IEEE Sens","Ital National Conf Sens","IEEE Sen(...TRUNCATED)
| "Security and privacy are among the main challenges in the systems of systems. The distributed ledge(...TRUNCATED)
| "# sensors\n\n_Article_\n## A Distributed and Secure Self-Sovereign-Based Framework for Systems of S(...TRUNCATED)
| 12,885
| {"disclaimer":"Notice: Paper or abstract available at https://pmc.ncbi.nlm.nih.gov/articles/PMC10490(...TRUNCATED)
| 2,023
|
[
"JournalArticle"
] | true
| 2023-09-01T00:00:00
| [{"paperId":"857ec5f733616f0907788247ee2816065892c157","title":"Distributed Self-Sovereign-Based Acc(...TRUNCATED)
| 12,885
|
en
| [{"category":"Medicine","source":"external"},{"category":"Computer Science","source":"external"},{"c(...TRUNCATED)
|
https://www.semanticscholar.org/paper/000634d00e45d43a7abbc57c02bea6d663cb9232
|
[
"Medicine",
"Computer Science"
] | 0.832738
| "DecGPU: distributed error correction on massively parallel graphics processing units using CUDA and(...TRUNCATED)
|
000634d00e45d43a7abbc57c02bea6d663cb9232
|
BMC Bioinformatics
| [{"authorId":"2916386","name":"Yongchao Liu"},{"authorId":"38613433","name":"B. Schmidt"},{"authorId(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":["BMC Bioinform"],"alternate_urls":["http://www.pubmedcent(...TRUNCATED)
| "BackgroundNext-generation sequencing technologies have led to the high-throughput production of seq(...TRUNCATED)
| "http://www.biomedcentral.com/1471 2105/12/85\n\n## SOFTWARE Open Access\n\n# DecGPU: distributed er(...TRUNCATED)
| 16,006
| {"disclaimer":"Notice: Paper or abstract available at https://pmc.ncbi.nlm.nih.gov/articles/PMC30729(...TRUNCATED)
| 2,011
|
[
"JournalArticle"
] | true
| 2011-03-29T00:00:00
| [{"paperId":"acfc2001b5ee7cd14f951102701902eadb7eb48a","title":"CUDA-MEME: Accelerating motif discov(...TRUNCATED)
| 16,006
|
en
| [{"category":"Business","source":"external"},{"category":"Medicine","source":"external"},{"category"(...TRUNCATED)
|
https://www.semanticscholar.org/paper/000c351ffff4b7379817bf6a9c73c4d3617a1395
|
[
"Business",
"Medicine",
"Computer Science"
] | 0.92408
| "A Proof of Concept of a Mobile Health Application to Support Professionals in a Portuguese Nursing (...TRUNCATED)
|
000c351ffff4b7379817bf6a9c73c4d3617a1395
|
Italian National Conference on Sensors
| [{"authorId":"144067094","name":"Márcia Esteves"},{"authorId":"39549792","name":"Marisa Esteves"},{(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":["SENSORS","IEEE Sens","Ital National Conf Sens","IEEE Sen(...TRUNCATED)
| "Over the past few years, the rapidly aging population has been posing several challenges to healthc(...TRUNCATED)
| "# sensors\n\n_Article_\n### A Proof of Concept of a Mobile Health Application to Support Profession(...TRUNCATED)
| 20,991
| {"disclaimer":"Notice: Paper or abstract available at https://pmc.ncbi.nlm.nih.gov/articles/PMC67670(...TRUNCATED)
| 2,019
|
[
"JournalArticle"
] | true
| 2019-09-01T00:00:00
| [{"paperId":"9e6a7a7fb7c6ac98864e4e22cd86f73e247d5eb4","title":"SmartWalk Mobile - A Context-Aware m(...TRUNCATED)
| 20,991
|
en
| [{"category":"Computer Science","source":"s2-fos-model"},{"category":"Engineering","source":"s2-fos-(...TRUNCATED)
|
https://www.semanticscholar.org/paper/0010110e322b5ed622e9a57ff2aed1b092b3cf9e
|
[] | 0.863191
|
An Attribute-Based Access Control for IoT Using Blockchain and Smart Contracts
|
0010110e322b5ed622e9a57ff2aed1b092b3cf9e
|
Sustainability
| [{"authorId":"35854526","name":"S. Zaidi"},{"authorId":"35191617","name":"M. A. Shah"},{"authorId":"(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":null,"alternate_urls":["http://mdpi.com/journal/sustainabi(...TRUNCATED)
| "With opportunities brought by the Internet of Things (IoT), it is quite a challenge to maintain con(...TRUNCATED)
| "## sustainability\n\n_Article_\n# An Attribute-Based Access Control for IoT Using Blockchain and Sm(...TRUNCATED)
| 20,556
| {"disclaimer":"Notice: Paper or abstract available at https://api.unpaywall.org/v2/10.3390/su1319105(...TRUNCATED)
| 2,021
|
[] | true
| 2021-09-23T00:00:00
| [{"paperId":"6a6ad9eb495739f4c80e7c09598720c3d5c5dff7","title":"Federated Learning: Collaborative Ma(...TRUNCATED)
| 20,556
|
en
| [{"category":"Medicine","source":"external"},{"category":"Biology","source":"s2-fos-model"},{"catego(...TRUNCATED)
|
https://www.semanticscholar.org/paper/00112bc246d0ad07bf4c6ce0c2ec39f30c3015ca
|
[
"Medicine"
] | 0.868287
| "Genome-Wide Analysis of the Auxin/Indoleacetic Acid Gene Family and Response to Indole-3-Acetic Aci(...TRUNCATED)
|
00112bc246d0ad07bf4c6ce0c2ec39f30c3015ca
|
International Journal of Genomics
| [{"authorId":"2156127749","name":"Fan Yang"},{"authorId":"2141813753","name":"Xiuxia Zhang"},{"autho(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":["Int J Genom"],"alternate_urls":null,"id":"ce1c5634-a0e1-(...TRUNCATED)
| "Auxin/indoleacetic acid (Aux/IAA) family genes respond to the hormone auxin, which have been implic(...TRUNCATED)
| "Hindawi\nInternational Journal of Genomics\nVolume 2021, Article ID 3102399, 14 pages\n[https://doi(...TRUNCATED)
| 19,288
| {"disclaimer":"Notice: Paper or abstract available at https://pmc.ncbi.nlm.nih.gov/articles/PMC85642(...TRUNCATED)
| 2,021
|
[
"JournalArticle"
] | true
| 2021-10-26T00:00:00
| [{"paperId":"12c5d877d5fb35d6db4aa848e7056979c78d59c2","title":"Genome-Wide Analysis of the PIN Auxi(...TRUNCATED)
| 19,288
|
en
| [{"category":"Computer Science","source":"external"},{"category":"Computer Science","source":"s2-fos(...TRUNCATED)
|
https://www.semanticscholar.org/paper/00159a43bf50d7133c490a38339afdd626c5a975
|
[
"Computer Science"
] | 0.854539
|
HPBS: A Hybrid Proxy Based Authentication Scheme in VANETs
|
00159a43bf50d7133c490a38339afdd626c5a975
|
IEEE Access
| [{"authorId":"2377947592","name":"Hua Liu"},{"authorId":"2109041752","name":"Haijiang Wang"},{"autho(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":null,"alternate_urls":["http://ieeexplore.ieee.org/servlet(...TRUNCATED)
| "As a part of intelligent transportation, vehicle ad hoc networks (VANETs) have attracted the attent(...TRUNCATED)
| "Received August 18, 2020, accepted August 31, 2020, date of publication September 3, 2020, date of (...TRUNCATED)
| 17,936
| {"disclaimer":"Notice: Paper or abstract available at https://api.unpaywall.org/v2/10.1109/ACCESS.20(...TRUNCATED)
| 2,020
|
[
"JournalArticle"
] | true
| null | [{"paperId":"ec9fdcc55e2f96bccb4c9af5e0b1cb0f9698fc88","title":"An Extensible and Effective Anonymou(...TRUNCATED)
| 17,936
|
en
| [{"category":"Computer Science","source":"external"},{"category":"Computer Science","source":"s2-fos(...TRUNCATED)
|
https://www.semanticscholar.org/paper/00183d0d30904451be10a8ec7ceb6edf4a8f3637
|
[
"Computer Science"
] | 0.883614
|
Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes
|
00183d0d30904451be10a8ec7ceb6edf4a8f3637
|
IEEE Transactions on Information Forensics and Security
| [{"authorId":"2803419","name":"Erfan Soltanmohammadi"},{"authorId":"48014844","name":"Mahdi Orooji"}(...TRUNCATED)
| {"alternate_issns":null,"alternate_names":["IEEE Trans Inf Forensics Secur"],"alternate_urls":["http(...TRUNCATED)
| null | "# Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes(...TRUNCATED)
| 15,936
| {"disclaimer":"Notice: The following paper fields have been elided by the publisher: {'abstract', 'r(...TRUNCATED)
| 2,013
|
[
"JournalArticle"
] | true
| null |
[] | 15,936
|
DLT-Scientific-Literature
Dataset Description
Dataset Summary
DLT-Scientific-Literature is a specialized corpus of academic publications focused on Distributed Ledger Technology (DLT). This dataset is part of the larger DLT-Corpus collection, designed to support NLP research, language model development, and innovation studies in the DLT domain.
The dataset contains 37,440 scientific documents with 564 million tokens, spanning publications from 1978 to 2025. All documents are in English and have been filtered for domain relevance using a fine-tuned BERT model.
This dataset is part of the DLT-Corpus collection. For the complete corpus including patents and social media data, see: https://huggingface.co/collections/ExponentialScience/dlt-corpus-68e44e40d4e7a3bd7a224402
Languages
English (en)
Dataset Structure
Data Fields
The dataset includes the following fields for each document:
- paperId: Unique identifier from Semantic Scholar
- title: Title of the scientific publication
- authors: List of authors
- year: Publication year
- publicationDate: Full publication date
- venue: Publication venue (journal, conference, etc.)
- publicationVenue: Detailed venue information
- publicationTypes: Type of publication (e.g., JournalArticle, Conference)
- abstract: Abstract of the publication
- text: Full text content in Markdown format
- url: URL to the source document
- openAccessPdf: Link to open access PDF if available
- isOpenAccess: Boolean indicating open access status
- fieldsOfStudy: Academic fields associated with the paper
- s2FieldsOfStudy: Semantic Scholar's field classifications
- references: List of referenced papers
- lang: Language code
- lang_conf: Confidence score for language detection
- tok_len: Token length of the document
- total_tokens: Total number of tokens
Data Splits
This is a single corpus without predefined splits. Users should create their own train/validation/test splits based on their specific research needs.
Dataset Creation
Curation Rationale
DLT-Scientific-Literature was created to address the lack of large-scale, domain-specific text corpora for NLP and computational research in the Distributed Ledger Technology field. The dataset enables researchers to:
- Develop DLT-specific language models and embeddings
- Conduct innovation studies and trend analysis
- Perform text mining on cutting-edge DLT research
- Study the evolution of concepts and terminology in the field
Source Data
Data Collection
Scientific literature was collected from the Semantic Scholar API using domain-specific queries related to blockchain, distributed ledgers, cryptocurrencies, smart contracts, and related technologies.
Data Processing
The collection process involved:
- Query-based retrieval: Using targeted keywords to retrieve relevant publications
- PDF parsing: Converting PDF documents to Markdown format
- Language detection: Filtering for English-language documents
- Length filtering: Removing documents that are too short or too long
- Domain relevance filtering: Using a fine-tuned BERT model to ensure documents are relevant to DLT
Personal and Sensitive Information
This dataset contains only publicly available scientific literature. No personal or confidential data is included. Author names and affiliations are retained as they appear in the original publications, as this is standard academic practice.
Considerations for Using the Data
Discussion of Biases
Potential biases include:
- Geographic bias: Publications may be skewed toward institutions in certain countries
- Language bias: Only English-language publications are included
- Temporal bias: More recent years may have disproportionately more publications
- Venue bias: Certain journals or conferences may be over-represented
- Citation bias: Highly-cited papers may be more likely to be included
Other Known Limitations
- Temporal coverage: While the dataset spans 1978-2025, the distribution is uneven with more recent years heavily represented
- Access limitations: Some publications may be missing due to access restrictions or API limitations
- Quality variation: Academic writing quality and rigor vary across publications
- Parsing errors: PDF-to-Markdown conversion may introduce formatting issues in some documents
Additional Information
Dataset Curators
Walter Hernandez Cruz, Peter Devine, Nikhil Vadgama, Paolo Tasca, Jiahua Xu
Licensing Information
Mixed open-access licenses including:
- Creative Commons Attribution (CC-BY)
- Creative Commons Attribution-ShareAlike (CC-BY-SA)
- Creative Commons Zero (CC0)
- Other permissive open-access licenses
Individual license information is included in the metadata for each document where available. Users should check the specific license for each document before use.
Citation Information
@article{hernandez2025dlt-corpus,
title={DLT-Corpus: A Large-Scale Text Collection for the Distributed Ledger Technology Domain},
author={Hernandez Cruz, Walter and Devine, Peter and Vadgama, Nikhil and Tasca, Paolo and Xu, Jiahua},
year={2025}
}
- Downloads last month
- 43