0% found this document useful (0 votes)
184 views5 pages

Certificate Verification System Based On Blockchain Technology

This document discusses using blockchain technology to create a certificate verification system. It proposes storing academic certificate data on the blockchain to allow easy and secure verification of certificates anywhere. The system would use blockchain technologies like public/private key cryptography, hashing, and digital signatures. Certificates would be issued digitally and stored on the decentralized blockchain ledger, eliminating the need for physical certificates or third parties during verification. This would help prevent fake certificates and make the verification process more efficient.

Uploaded by

Tameemuddin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
184 views5 pages

Certificate Verification System Based On Blockchain Technology

This document discusses using blockchain technology to create a certificate verification system. It proposes storing academic certificate data on the blockchain to allow easy and secure verification of certificates anywhere. The system would use blockchain technologies like public/private key cryptography, hashing, and digital signatures. Certificates would be issued digitally and stored on the decentralized blockchain ledger, eliminating the need for physical certificates or third parties during verification. This would help prevent fake certificates and make the verification process more efficient.

Uploaded by

Tameemuddin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01

Certificate Verification System Based on Blockchain Technology


Thin Zar Ko Ko
University of Computer Studies, Hinthada
[email protected]

Abstract The goal of Blockchain Technology is to create a


decentralized environment [9]. Because of its benefits, it
One of the most important documents is certificates has been implemented to be used in different fields. In
for graduates from universities and other educational the healthcare sector Blockchain has been implemented
institutions. A certificate is a certificate of qualification [1]. It is also applied in business [8], smart government
for a graduate that is used for a job or other matters [16] and e-government [5]. The main focus of the paper
relating. Advancement of IT and low cost and high is the potential for blockchain in education. This paper
quality office supplies on the marketplace have is therefore intended to use blockchain for the
contributed to the development of essential documents verification of documents, in particular for certification
such as certificates, identification cards and passports. of graduations. The technology of blockchain is an
However, it is costly and time consuming to check acceptable technology that authenticates learning
certificates using traditional methods. The aim of this results as well as protects shares [14]. With a robust
paper is to introduce a theoretical model, which can give decentralized framework which improves network
the possible solution for the issue and verification of durability due to the multiplicity of package duplicates,
academic certificates using blockchain based. There are where the signatures are kept, the central authority has
many functions such as hash, public and private key been changed by Public Key Infrastructure (PKI).
cryptography, digital signatures, peer-to-peer networks Blockchain decentralization prohibits third parties,
and work evidence in blockchain technology. The unless they remove the proof-of-work condition that has
models formulate a system divided into two principal verified the blocks, from modifying or removing
processes using different elements, namely the issuance transactions. Blockchain technology uses a digital ledger
of a digital certificate of academic signature and the that is incorruptible. This ledger will be used to record
academic certificate verification. The paper proposed to financial transactions and anything with or without
use blockchain technology to validate university economic interest. It technology was introduced in 2008
certificates. This meets all the criteria for a modern for Bitcoin and is now used in many fields [17]. A
verification program for academic certificates. In blockchain can identify certificate issuers and recipients.
addition, the new approach for confirming academic The public database (blockchain) holds document
certificates validity fills up the gaps and challenges. records (hash) worldwide on thousands of computers. In
a single blockchain, digital certificates are secure and
Keywords: Blockchain, Education, Verification, have important advantages over standard digital
Digitalization certificates. Anyone able to access the blockchain will
authenticate their certificates with an open source app
1. Introduction that is readily accessible. There is no longer need for
third parties. Thereby, even after the company is
Certificates distributed in schools or universities dissolved or has no access to the given record, the
square measure largely within the form of hard copy. certificate may be validated. If all copies on all the
Whenever applicants apply for the task at any public or computers running software are lost, records and
private sector they have to supply those hard copies, certificates received on a blockchain can be deleted. The
whereas the organizations ought to verify all certificates hash connection is created and held by the user to the
manually that is very time-consuming process and there original text. The process requires the document
are chances that some might need turn out the certificate signature to be published and does not require the
that is not legitimate which could get unremarked by the document itself to be published. The confidentiality of
verifier throughout the method as results of this records is protected by this process.
ineligible candidate can get an opportunity. There had
been various cases in past where people are caught 3. Blockchain Technologies
selling fake certificates various organization at low
value. To eradicate such problem and diminish the The blockchain is an emerging technology as well as
production of fake certificates we are able to use the many functions such as public and private key
blockchain technology. Blockchain can be used to store cryptography, hash, peer-to-peer networks and digital
the data of the certificate that may be valid by anyone signatures. The followings explain each of them.
from anyplace. • Public and Private Keys – For coding and
cryptography, public and private blockchain keys
2. Related Work originate from the concept of generating entirely
different keys. The approach used and involving the
generation of a private key for personal use and a
6
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01

public key for public use is perpetually the public-key hash value. This means that the digital signature is
cryptographic approach in blockchain as shown in valid if two hash values are duplicated and the data
Figure 1. This technique is discreet from the key involved in the certificate was also not faked.
cryptographic isobilateral technique, which is used to
both encrypt and decrypt the similar key and when the
delivery mechanism is safe for the applicable party
[18]. Public key encryption allows secure file delivery
and receipt only when both a private and a public key
is produced by the party that certifies the document
and the general public key is provided to the sender in
advance. When the checking party controls the private
key’s privacy, it maintains protection for the group
action despite the fact that everyone has the public key.

Figure 2. The Hash Generator

3.1 Blockchain's Development Potential

Technology via blockchain has the ability to speed


up the elimination of a document based certificate
system. To present, the use of digital certificates has
been stopped from being falsified with ease. The
blockchain enables organizations to grant indefinitely
valid, unchangeable digital certificates because they are
genuine against the blockchain. Such benefits with
existing systems significantly increase the business
model of digital certificates and would probably lead to
Figure 1. The Public Key Encryption the introduction of digital certificate. Software
blockchain eliminates the need to verify certificates
EncryptionEEncryptionEEncryption
from educational organizations. Since blockchain
•EEncryptionEncryptionEncryptionE
Hash – A hash is a short constant length code.
certificates can be automatically scanned, education
Data entry into the ncryption
hash-generator leads together with
service providers do not need to fully commit any longer
a correct number of digits to a hash from a document
to that task [4].
output. A unique identification code is created by hash.
Blockchain platform is perfect for protecting, sharing
If the same data is inputted to hash generator, the hash
and authenticating educational objectives [4]. PKI, with
value is the same. But even small input differences
a highly stable decentralized structure, is replacing the
lead to completely different hash [13]. The execution
central authority and improving network durability as
of hash generation is shown in Figure 2. It is stated in
many block duplicates store the signatures.
Figure 2, that even a slight change in the data input
Decentralization of blockchain prevents the
takes place in a quite different hash. This feature of a
modification or the elimination of block transactions, if
hash is also accepted for the finding of data fraud and
the conditions of proof-of-work which had been checked
is accepted for verification purposes by a very
do not go unnoticed. Blockchains do have independent
blockchain technique.
time stamping, thereby improving privacy.
• Peer-to-Peer (P2P) Network – This means the In situations where certificates can expire, having a
development of networks or computers which start reliable time stamp is critical. In response to a key leak,
sharing work or files and tasks with each other. In the the generator must also rotate issuing keys on a regular
network, peers are equal authorities and skills within basis for privacy. In deciding whether the record was
the environment. Each user or computer on a P2P published within the validity of the key by a different
network is referred to as a node and is connected with issuer, an independent time stamp is required. In
a P2P node network.
comparison to other PKI schemes, file format signatures
• Digital Signatures – In order to construct the are independent of blockchain. Any document can use
digital signature system to validate the authenticity of the same signature software irrespective of its
the data sent over the Internet, the hash as well as the proprietary standards [4].
public key cryptographic methods is used. The digital
signature is created by encrypting the hash value of the
file to the verifier with a general sender public key [4]. 4. Work on the proposal
The file is also sent to the certificate authority on-line.
To generate a hash value, the verifier uses the data in Universities have long advanced to accommodate a
the package. Together, the verifier keeps its private huge increase within the school base, student base and
key for decoding the digital signature and drawing the various relevant institutions. It is an enormous task for

7
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01

university officers and workers to face practical digital certificates such as academic certificates. These
challenges and arrangement of services for massive digital documents facilitate data protection and file
students and graduate communities. Deliberately, the sharing for recruitment or admission with employers or
file service given to the network of educators and other authorities. This unquestioned technological trend
graduates has begun to act on the standard created by involves issuing authorities to supply a blockchain
encrypting the hash value. In universities, several more network with digital certificates. Their storage takes the
causes have resulted in reduced functional authority in form of a single hash code [3]. When a company requires
student affairs. The verification method for academic a copy from a job applicant, the educational institution
certificates and connected documents is one of the most can obtain academic credentials or documents via its
important reasons that have negative result to university blockchain. This student will give the public key to the
services. The built model shown in Figure 3 wants to university he or she graduated from. An applicant must
use blockchain technology for degree certification submit their digital educational qualifications with the
validation. The newest blockchain technology is that potential employer.
can explain for individual employers and students the Blockchain principles indicate that this composite
authentication process of educational qualifications. technology contained a large number of existing
functions, including hash, public and private
Start cryptography, digital signatures, peer-to-peer networks
and proof of labor, already analyzed during the
Digitally Signed previous section. The block which is classified into
Employer
Certificate via Email
two teams during this paper consists of the issuance of
a digitally signed academic certificate and the
Digital Student
Public Key of certificate verification is associated with the
Institution Signature (Recipient)
Input truthfulness of components. Figure 3 shows
sophisticated statistical design.
Hash of Digitally Signed
Generate Hash
Certificate Stored Certificate
on Blockchain
4.1 Digitally Signed Academic Certificate
Issuance
Timestamp
Generation
Certificate No Is Generated The academic association is in the first place to
Hash Same as digitally issue a signed certificate. This paper aims to
is Fake
University Private Key
Hash?
victimize the blockchain as explained in Figure 3 using
the following ideas.
Yes
Creates a Hash • Generation of hash – This paper approves the
using Hash
Algorithm
use of the hash generation program SHA-256 to get
Certificate
hashes due to its truth and research, which is an on-
is Real
line open source tool that could produce the SHA-256
Issues
Certificate
hash of any data set.
End • Public and Private Keys – This built model
uses private and public keys together throughout this
University
paper. The university must have public key. In turn,
Administrator
(Issuer) the university issues the student a private key that is
credible.
Figure 3. Flow of System • Digital Signatures – A unit is used for the
construction of a digital signature mechanism to
confirm the accuracy of information sent over the
Despite educational qualifications, getting a white-
internet, both hash and public key cryptographic
collar career is unlikely. Companies must provide
strategies. The digital signature is sent to the verifier
evidence of academic credentials to new graduates.
with the general sender public key, according to the
Students who wait for certificates are validated by
analysis administrated in [7]. The verifier delivers file
university certification. Verification takes a lot of time
via on-line. The verifier uses the data stored in the file
because it normally takes days or even weeks. Job
to construct a hash value. The verifier also keeps its
seekers and companies, with impeccable expertise and
private key for decrypting and drawing the hash value
skills, expend their precious time arranging testing with
of the digital signature in that matter. This means that
the relevant universities to receive their best workers.
the digital signature is real if the two hash values
The verification of documents is difficult but important
match and the data involved in the certificate have not
for the legitimacy of the applicant, whether in the area of
been faked.
education, employment or visas. The blockchain is now
the newest model to modify both job seekers and • Timestamping – It applies to the digital
university certificate another security layer. This
students’ authentication procedures for educational
model helps the peer-to-peer network system issue a
credentials. Blockchain technology permits users to
store essential documents as cryptographically signed digital form attached to the document, which confirms
the accuracy of the day, month and year when a digital
8
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01

certificate is issued. The key to timestamp generation In addition, the verification software
is to analyze the time taken to obtain digital signatures, 5 tests if the digital signature is connected
as an information block which is then encrypted to to the university's general public key.
obtain a code indicating the date the document was Both steps should display students’
issued and a digital certificate on it. 6
private keys without being demanded.
• Signing of the Document Digitally – Four When all conditions are valid, the
elements consisting of (i) hash generated by hash verification software must inform the
7
generator, (ii) public key, (iii) private key and (iv) future employer of the legal validity of
timestamps indicating the accuracy of time the the certificate.
certification is issued. The model's digital signature is If any or both conditions are false, the
combined with the models. The document recognizes software for the verification generates an
the signature by combining a hash produced with a 8
output to inform the future employer that
private key issued to the student to generate one the certificate is not legal.
unique digital signature code. This code is combined
with timestamps to unique a single digital signature, 5. Conclusion
which is then indicated in the paper. In addition, the
signature is secured by a combination of hash,
private/public keys and timestamps. The signature is Within this paper, an improvement of the verification
process was proposed as a blockchain model for
therefore unique to the document issued to the student
graduation certificate verification. The occurrence of
and may only be decrypted using the private key held
certificate falsifications will thus be reduced and the
by the student. Private student key can never be
decrypted by conversational digital signature confidentiality, security and validity of certificates will
be increased. To authorizing authorities, receivers and
engineering. If only a tiny part of the document at the
customers alike, this paper provides several advantages.
end of the day changes illegally and generates a
completely new hash value. The benefit of this paper is that the blockchain itself
contains all information needed to verify and validate the
• Certificate issuance and hosting – Both a
certificate. The job applicant does not need to contact the
paper copy of the certificate and a digitally signed
university to verify the certificate. It is only necessary to
student document are given. Using a hash generator,
ensure that the hash generated through the validation
the university provides a hash of the final document
software fits with the digital certificate and that the
signed. This hash is a unique alphanumeric string,
university’s key corresponds to the key included in the
which with the certificate and its content no one has
digital signature. This paper in selected academic
illegally modified. Then, the hash is stored on the
institutions would be applied and adapted for future
blockchain, and a record is created that states that the
research. This will be expanded further to include smart
certificate was issued to the abovementioned graduate
contracts.
at this time.

4.2 Academic Certificate Verification References

The employer may want to know the validity of the [1] A. Roehrs, C. A. da Costa, and R. da Rosa Righi,
university certificate when students apply for a job. The “OmniPHR: A Distributed Architecture Model to
steps listed in this paper demonstrate that the digital Integrate Personal Health Records”, 2017.
signature in table 1 is verified and validated.
[2] http://www.Wikipedia.com, Blockchain .
Table 1. Digitally signed document [3] C. F. Bond, F. Amati and G. Blousson, “Blockchain
issuance Academic Verification Use Case”, 2015.
Step [4] E. Chiyevo Garwe, “Qualification Award and
Specific details
No Recognition Fraud in Educational Activity in
Education groups can easily access Rhodesia”.
public keys in public directories or [5] H. Hou, “The application of blockchain technology
1
internet. They may also be provided by
in E - government in China”, 2017.
the graduates to the employer.
[6] I. C. Lin and T. C. Liao, “A Survey of Blockchain
The employer is scanning and
inputting the digitally signed document Security Issues and Challenges”, 2017.
2 [7] J. F. Blanchette, “The Digital Signature Quandary
and the public key through verification
software. Autoimmune Disorder Dilemma First State La
Software for verification uses digital Signature Numerique”, 2006.
3 signature and a public key for hash [8] J. Sidhu, “Syscoin: A Peer-to-Peer Electronic Cash
generation. System with Blockchain - Based Services for E-
Software for verification generates
Business,” 2008.
4 hash comparisons of the original certified
copy file.
9
University Journal of Creativity and Innovative Research 2020 Vol-01 Issue-01

[9] J. Yli - Huumo, D. Ko, S. Choi, S. Park, and K.


Smolander, “Where is current research on
Blockchain Technology?”, 2016.
[10] K. Kuvshinov, I. Nikiforov, J Mostovoy and D.
Mukhutdinov, “Disciplina: Blockchain for
Education”, 2018.
[11] Missile Paul, “Hyperledger - Blockchain Foundation
- The Startup - Medium”.
[12] M. Turkanovic, M. Holbl, K. Kosic, M. Hericko and
A. Kamisalic, “EduCTX: A Blockchain - based
Educational Activity Credit Platform”, 2018.
[13] Nomura Research Institute, “Survey on Blockchain
Technologies and Connected Services,” 2016.
[14] N. Smolenski and D. Hughes, “Academic
Credentials In An Era of Digital Decentralization
Academic Credentials in an Era of Digital
Decentralization Learning Machine Cultural
Anthropologist contents preface”, 2016.
[15] Ph.D. Analysis Proposal in Blockchain Technology
9 S - Logix.
[16] R. Arendsen, M. J. Ter Hedde, and H. Hermsen,
Electronic Government, 2011.
[17] S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic
Money System”, 2008.
[18] S. Thompson, “The Preservation of Digital
Signatures on the Blockchain ”, 2017.
[19] Xiuping designer, “Semi-centralized Blockchain
Sensible Contracts: Centralized Verification and
Sensible Computing Beneath Chains within the
Ethereum Blockchain”, 2017.

10

You might also like