Publications

Academic Paper Collaboration

Schnorr Protocol in Jasmin

View online

José Bacelar Almeida, Denis Firsov, Tiago Oliveira, Dominique Unruh

In: International Association for Cryptologic Research, ePrint Archive, 2023-06-16 (revised version)

Pre-print version available HERE.

Collaboration Fintech

Project Hamilton. Conceptual Analysis

Ahto Buldas. Märt Saarepera 

The Hamilton Project, conducted by the Federal Reserve Bank of Boston together with the Massachusetts Institute of Technology Digital Currency Initiative, is a concept study on implementing central bank digital currency (CBDC). 

This report is based on the information presented in the technical paper [1] of the Hamilton project, where two possible CBDC designs are described. In Section 2, we present basic engineering principles of CBDC design. In Section 3, we analyze both designs in the framework of the engineering principles and compare them with the KSI-Cash [3] and Bitcoin [2].

Authors' version available HERE.

Academic Paper Collaboration

Zero-Knowledge in EasyCrypt

View online
Denis Firsov, Dominique Unruh 

In: IEEE 36th Computer Security Foundations Symposium (CSF) (CSF), Dubrovnik, undefined, HR, 2023 pp. 226-241.

Pre-print version available HERE.
Academic Paper Collaboration

Secure and Efficient Implementation of Electronic Money

View online
Ahto Buldas, Dirk Draheim, Märt Saarepera

In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2022. Communications in Computer and Information Science, vol 1688. Springer, Singapore.
Academic Paper Collaboration

Towards a Foundation of Web3

View online
Ahto Buldas, Dirk Draheim, Mike Gault, Märt Saarepera

In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2022. Communications in Computer and Information Science, vol 1688. Springer, Singapore.
Academic Paper Collaboration

An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation

View online
Ahto Buldas, Dirk Draheim, Mike Gault, Risto Laanoja, Takehiko Nagumo, Märt Saarepera, Syed Attique Shah, Joosep Simm, Jamie Steiner, Tanel Tammet, Ahto Truu

In: IEEE Access, vol. 10, pp. 77284-77322, 2022.
Academic Paper Collaboration

Unsatisfiability of Comparison-Based Non-malleability for Commitments

View online
Denis Firsov, Sven Laur, Ekaterina Zhuchko

In: H. Seidl, Z. Liu, C. S. Pasareanu, eds., Proc. of 19th Int. Coll. on Theoretical Aspects of Computing, ICTAC 2022 (Tbilisi, Sept. 2022), v. 13572 of Lect. Notes in Comput. Sci., pp. 305-323. Springer, 2022.

Authors' version available HERE
Academic Paper Collaboration

Reflection, Rewinding, and Coin-Toss in EasyCrypt

View online

Denis Firsov, Dominique Unruh 

In: Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP 2022). Association for Computing Machinery, New York, NY, USA, 166–179. 

Authors' version available HERE.

Academic Paper KSI Security

Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures

View online
Ahto Buldas, Risto Laanoja, Peeter Laud, Ahto Truu

In: Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu. Provable Security - 8th International Conference, ProvSec 2014, Proceedings. LNCS 8782, pp. 130-145. Springer, 2014. 

Pre-print version available HERE.
Academic Paper KSI Security

Security Proofs for Hash-Tree Time-Stamping Using Hash Functions with Small Output Size

View online
Ahto Buldas, Risto Laanoja

In: Colin Boyd, Leonie Simpson. Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings. LNCS 7959, pp. 235-250. Springer, 2013.
Academic Paper KSI Security

Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.

View online

Ahto Buldas, Margus Niitsoo

In: Ron Steinfeld, Philip Hawkes. Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. LNCS 6168, pp. 318-335. Springer, 2010.

Academic Paper KSI Security

Knowledge-Binding Commitments with Applications in Time-Stamping

View online
Ahto Buldas, Sven Laur

In: Okamoto T., Wang X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, 2007.
Academic Paper KSI Security

Does Secure Time-Stamping Imply Collision-Free Hash Functions?

View online
Ahto Buldas, Aivo Jürgenson

In: Susilo W., Liu J.K., Mu Y. (eds) Provable Security. ProvSec 2007. Lecture Notes in Computer Science, vol 4784. Springer, 2007.
Academic Paper KSI Security

Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?

View online
Ahto Buldas, Sven Laur

In: Zhou J., Yung M., Bao F. (eds) Applied Cryptography and Network Security. ACNS 2006. Lecture Notes in Computer Science, vol 3989. Springer, 2006.
Academic Paper KSI Security

Universally Composable Time-Stamping Schemes with Audit

View online
Ahto Buldas, Peeter Laud, Mart Saarepera, Jan Willemson

In: Zhou J., Lopez J., Deng R.H., Bao F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, 2005.

Extended version available HERE.
Academic Paper KSI Security

On Provably Secure Time-Stamping Schemes

View online

Ahto Buldas, Märt Saarepera

In: Pil Joong Lee. Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. LNCS 3329, pp. 500-514. Springer, 2004.

Academic Paper KSI Engineering

Verifiable Multi-Party Business Process Automation

View online
Joosep Simm, Jamie Steiner, Ahto Truu.

In: A. Del Río Ortega, H. Leopold, F.M. Santoro. Business Process Management Workshops. BPM 2020. LNBIP 397, pp. 30-41. Springer, 2021.

Author's manuscript available HERE.
Academic Paper KSI Engineering

Keyless Signature Infrastructure and PKI: Hash-Tree Signatures in Pre- and Post-Quantum World

View online
Ahto Buldas, Risto Laanoja, Ahto Truu

In: International Journal of Services Technology and Management, Vol. 23, Nos. 1/2, pp. 117-130. Inderscience publishers, 2017.

Academic Paper KSI Engineering

Efficient Record-Level Keyless Signatures for Audit Logs

View online
Ahto Buldas, Ahto Truu, Risto Laanoja, Rainer Gerhards

In: Karin Bernsmed, Simone Fischer-Hübner. Secure IT Systems - 19th Nordic Conference, NordSec 2014, Proceedings. LNCS 8788, pp. 149-164. Springer, 2014.

Pre-print version available HERE.
Academic Paper KSI Engineering

Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees

View online
Ahto Buldas, Andres Kroonmaa, Risto Laanoja

In: Hanne Riis Nielson, Dieter Gollmann. Secure IT Systems - 18th Nordic Conference, NordSec 2013, Proceedings. LNCS 8208, pp 313-320. Springer, 2013.

Pre-print version available HERE.
Academic Paper BLT

BLT+L: Efficient Signatures from Timestamping and Endorsements

View online

Denis Firsov, Henri Lakk, Sven Laur, Ahto Truu

In Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT), pp. 75–86, SciTePress, 2021

Pre-print version available HERE

Academic Paper BLT

Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping

View online

Denis Firsov, Henri Lakk, Ahto Truu

In 2021 IEEE 34th Computer Security Foundations Symposium (CSF), pp. 1–13, IEEE, 2021

Pre-print version available HERE.
Code available HERE.
Academic Paper BLT

Verified Security of BLT Signature Scheme

View online
Denis Firsov, Ahto Buldas, Ahto Truu, Risto Laanoja

In: CPP 2020: Proceedings of the 9th ACM SIGPLAN International Conference on Certified Programs and Proofs, pp. 244–257. ACM DL, 2020.

Pre-print available HERE.
Code HERE.
Academic Paper BLT

A New Approach to Constructing Digital Signature Schemes

View online
Ahto Buldas, Denis Firsov, Risto Laanoja, Henri Lakk, Ahto Truu

In: Attrapadung N., Yagi T. (eds) Advances in Information and Computer Security. IWSEC 2019. Lecture Notes in Computer Science, vol 11689. Springer, 2019. 

Extended version available HERE.

Academic Paper BLT

A Blockchain-Assisted Hash-Based Signature Scheme

View online
Ahto Buldas, Risto Laanoja, Ahto Truu

In: Nils Gruschka. Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Proceedings. LNCS 11252, pp. 138-153. Springer, 2018.

Pre-print available HERE.
Academic Paper BLT

A Server-Assisted Hash-Based Signature Scheme

View online
Ahto Buldas, Risto Laanoja, Ahto Truu

In: Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius. Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Proceedings. LNCS 10674, pp. 3-17. Springer, 2017.

Pre-print version available HERE.
Academic Paper Policy

The Technological Sovereignty Dilemma – and How New Technology Can Offer a Way Out

View online
Luukas Ilves, Anna-Maria Osula

In: European Cybersecurity Journal, Vol. 6, No. 1, 2020, pp. 24-35. 
Academic Paper Policy

Blockchain Industry, Regulations and Policy in Estonia

View online
Risto Hansen

In: Asian Research Policy , Vol. 9, No. 2, 2018 (special issue on Science and Technology Trends - Blockchain Industries, Regulations and Policy), pp. 45-55.
Academic Paper Collaboration

A Unifying Theory of Electronic Money and Payment Systems

View online

Ahto Buldas, Märt Saarepera, Jamie Steiner, Dirk Draheim  

In: TechRxiv (2021)

PDF version available HERE.

Academic Paper Collaboration

A privacy-preserving statistics marketplace using local differential privacy and blockchain: An application to smart-grid measurements sharing

View online

Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, George C. Polyzos, Priit Anton

In Blockchain: Research and Applications, Vol. 2, No. 1, April 2021


Academic Paper Collaboration

SST Data Trust as a Service - Towards Secure Decentralised Management and Exchange of Space Surveillance and Tracking Data

View online

M. Popp, V. Rogojin, M.C.Boysan, and M. Wallum.

In 8th European Conference on Space Debris, 20-23.04.2021, vol 8/1, ESA Space Debris Office, 2021.

Whitepaper

Blockchain Receipts using History Trees

View online

Guardtime Whitepaper by Risto Alas and Hema Krishnamurthy, 2020

Whitepaper

Blockchain Designed for Supply Chains: Guardtime Supply Chain Framework

View online
Guardtime Whitepaper, 2020
Whitepaper

Shortage Alerts Engine

View online
Guardtime Health Whitepaper, 2020
Whitepaper

Real World Data Engine

View online
Guardtime Health Whitepaper, 2020
Whitepaper

Data integrity critical in securing autonomous AI

View online
Whitepaper by Guardtime Strategic Advisor Tony Kenyon, 2019
Whitepaper

Privacy Series: Differential Privacy in a Nutshell

View online
Guardtime Research whitepaper, 2019
Whitepaper

Convergence of Blockchain and Artificial Intelligence

View online
Guardtime Research whitepaper, 2019
Whitepaper

Guardtime Health

View online
Guardtime Whitepaper, 2019
Whitepaper

Enabling Multi Party Trust in the Era of 5G and Multi-Access Edge Computing

View online
Guardtime Whitepaper, 2019
Whitepaper

KSI and PUF - Internet of Things Authentication

View online

Guardtime Whitepaper, 2016
Whitepaper

KSI and SDN - Use of a globally distributed blockchain to secure SDN

View online
Guardtime Whitepaper, 2016
Whitepaper

KSI and Insider Threat - Combating the enemy within – an elegant mathematical approach to insider threat eradication

View online
Guardtime Whitepaper, 2015
Whitepaper

Attributable Networks - Truth, not Trust

View online
Guardtime Whitepaper, 2014
Whitepaper

Cloud Insecurity and True Accountability - Primer for CIOs on Guardtime and KSI for Attributed Networking

View online
Guardtime Whitepaper, 2014
Whitepaper

Internet of Things (IoT) Security - Turning Defense into Offence

View online
Guardtime Whitepaper, 2014