Certificate Verification System Based On Blockchain Technology
Certificate Verification System Based On Blockchain Technology
public key for public use is perpetually the public-key hash value. This means that the digital signature is
cryptographic approach in blockchain as shown in valid if two hash values are duplicated and the data
Figure 1. This technique is discreet from the key involved in the certificate was also not faked.
cryptographic isobilateral technique, which is used to
both encrypt and decrypt the similar key and when the
delivery mechanism is safe for the applicable party
[18]. Public key encryption allows secure file delivery
and receipt only when both a private and a public key
is produced by the party that certifies the document
and the general public key is provided to the sender in
advance. When the checking party controls the private
key’s privacy, it maintains protection for the group
action despite the fact that everyone has the public key.
7
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01
university officers and workers to face practical digital certificates such as academic certificates. These
challenges and arrangement of services for massive digital documents facilitate data protection and file
students and graduate communities. Deliberately, the sharing for recruitment or admission with employers or
file service given to the network of educators and other authorities. This unquestioned technological trend
graduates has begun to act on the standard created by involves issuing authorities to supply a blockchain
encrypting the hash value. In universities, several more network with digital certificates. Their storage takes the
causes have resulted in reduced functional authority in form of a single hash code [3]. When a company requires
student affairs. The verification method for academic a copy from a job applicant, the educational institution
certificates and connected documents is one of the most can obtain academic credentials or documents via its
important reasons that have negative result to university blockchain. This student will give the public key to the
services. The built model shown in Figure 3 wants to university he or she graduated from. An applicant must
use blockchain technology for degree certification submit their digital educational qualifications with the
validation. The newest blockchain technology is that potential employer.
can explain for individual employers and students the Blockchain principles indicate that this composite
authentication process of educational qualifications. technology contained a large number of existing
functions, including hash, public and private
Start cryptography, digital signatures, peer-to-peer networks
and proof of labor, already analyzed during the
Digitally Signed previous section. The block which is classified into
Employer
Certificate via Email
two teams during this paper consists of the issuance of
a digitally signed academic certificate and the
Digital Student
Public Key of certificate verification is associated with the
Institution Signature (Recipient)
Input truthfulness of components. Figure 3 shows
sophisticated statistical design.
Hash of Digitally Signed
Generate Hash
Certificate Stored Certificate
on Blockchain
4.1 Digitally Signed Academic Certificate
Issuance
Timestamp
Generation
Certificate No Is Generated The academic association is in the first place to
Hash Same as digitally issue a signed certificate. This paper aims to
is Fake
University Private Key
Hash?
victimize the blockchain as explained in Figure 3 using
the following ideas.
Yes
Creates a Hash • Generation of hash – This paper approves the
using Hash
Algorithm
use of the hash generation program SHA-256 to get
Certificate
hashes due to its truth and research, which is an on-
is Real
line open source tool that could produce the SHA-256
Issues
Certificate
hash of any data set.
End • Public and Private Keys – This built model
uses private and public keys together throughout this
University
paper. The university must have public key. In turn,
Administrator
(Issuer) the university issues the student a private key that is
credible.
Figure 3. Flow of System • Digital Signatures – A unit is used for the
construction of a digital signature mechanism to
confirm the accuracy of information sent over the
Despite educational qualifications, getting a white-
internet, both hash and public key cryptographic
collar career is unlikely. Companies must provide
strategies. The digital signature is sent to the verifier
evidence of academic credentials to new graduates.
with the general sender public key, according to the
Students who wait for certificates are validated by
analysis administrated in [7]. The verifier delivers file
university certification. Verification takes a lot of time
via on-line. The verifier uses the data stored in the file
because it normally takes days or even weeks. Job
to construct a hash value. The verifier also keeps its
seekers and companies, with impeccable expertise and
private key for decrypting and drawing the hash value
skills, expend their precious time arranging testing with
of the digital signature in that matter. This means that
the relevant universities to receive their best workers.
the digital signature is real if the two hash values
The verification of documents is difficult but important
match and the data involved in the certificate have not
for the legitimacy of the applicant, whether in the area of
been faked.
education, employment or visas. The blockchain is now
the newest model to modify both job seekers and • Timestamping – It applies to the digital
university certificate another security layer. This
students’ authentication procedures for educational
model helps the peer-to-peer network system issue a
credentials. Blockchain technology permits users to
store essential documents as cryptographically signed digital form attached to the document, which confirms
the accuracy of the day, month and year when a digital
8
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01
certificate is issued. The key to timestamp generation In addition, the verification software
is to analyze the time taken to obtain digital signatures, 5 tests if the digital signature is connected
as an information block which is then encrypted to to the university's general public key.
obtain a code indicating the date the document was Both steps should display students’
issued and a digital certificate on it. 6
private keys without being demanded.
• Signing of the Document Digitally – Four When all conditions are valid, the
elements consisting of (i) hash generated by hash verification software must inform the
7
generator, (ii) public key, (iii) private key and (iv) future employer of the legal validity of
timestamps indicating the accuracy of time the the certificate.
certification is issued. The model's digital signature is If any or both conditions are false, the
combined with the models. The document recognizes software for the verification generates an
the signature by combining a hash produced with a 8
output to inform the future employer that
private key issued to the student to generate one the certificate is not legal.
unique digital signature code. This code is combined
with timestamps to unique a single digital signature, 5. Conclusion
which is then indicated in the paper. In addition, the
signature is secured by a combination of hash,
private/public keys and timestamps. The signature is Within this paper, an improvement of the verification
process was proposed as a blockchain model for
therefore unique to the document issued to the student
graduation certificate verification. The occurrence of
and may only be decrypted using the private key held
certificate falsifications will thus be reduced and the
by the student. Private student key can never be
decrypted by conversational digital signature confidentiality, security and validity of certificates will
be increased. To authorizing authorities, receivers and
engineering. If only a tiny part of the document at the
customers alike, this paper provides several advantages.
end of the day changes illegally and generates a
completely new hash value. The benefit of this paper is that the blockchain itself
contains all information needed to verify and validate the
• Certificate issuance and hosting – Both a
certificate. The job applicant does not need to contact the
paper copy of the certificate and a digitally signed
university to verify the certificate. It is only necessary to
student document are given. Using a hash generator,
ensure that the hash generated through the validation
the university provides a hash of the final document
software fits with the digital certificate and that the
signed. This hash is a unique alphanumeric string,
university’s key corresponds to the key included in the
which with the certificate and its content no one has
digital signature. This paper in selected academic
illegally modified. Then, the hash is stored on the
institutions would be applied and adapted for future
blockchain, and a record is created that states that the
research. This will be expanded further to include smart
certificate was issued to the abovementioned graduate
contracts.
at this time.
The employer may want to know the validity of the [1] A. Roehrs, C. A. da Costa, and R. da Rosa Righi,
university certificate when students apply for a job. The “OmniPHR: A Distributed Architecture Model to
steps listed in this paper demonstrate that the digital Integrate Personal Health Records”, 2017.
signature in table 1 is verified and validated.
[2] http://www.Wikipedia.com, Blockchain .
Table 1. Digitally signed document [3] C. F. Bond, F. Amati and G. Blousson, “Blockchain
issuance Academic Verification Use Case”, 2015.
Step [4] E. Chiyevo Garwe, “Qualification Award and
Specific details
No Recognition Fraud in Educational Activity in
Education groups can easily access Rhodesia”.
public keys in public directories or [5] H. Hou, “The application of blockchain technology
1
internet. They may also be provided by
in E - government in China”, 2017.
the graduates to the employer.
[6] I. C. Lin and T. C. Liao, “A Survey of Blockchain
The employer is scanning and
inputting the digitally signed document Security Issues and Challenges”, 2017.
2 [7] J. F. Blanchette, “The Digital Signature Quandary
and the public key through verification
software. Autoimmune Disorder Dilemma First State La
Software for verification uses digital Signature Numerique”, 2006.
3 signature and a public key for hash [8] J. Sidhu, “Syscoin: A Peer-to-Peer Electronic Cash
generation. System with Blockchain - Based Services for E-
Software for verification generates
Business,” 2008.
4 hash comparisons of the original certified
copy file.
9
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01
10