Skip to main content
  • I own a Doctorate Degree in Computer Science, University of Portharcourt, Nigeria. My research area of interests incl... moreedit
  • Prof. B.O. Eke and Dr. F.E. Onuodu , Prof. Kingsley Obahiagbonedit
Blockchain systems rely on classical cryptography of public key encryption and hash functions for its security. These security mechanisms of the distributed technology is made possible by complex mathematical computations, integer... more
Blockchain systems rely on classical cryptography of public key encryption and hash functions for its security. These security mechanisms of the distributed technology is made possible by complex mathematical computations, integer factorization and discrete logarithm problems. The emergence of quantum technology is expected to reduce the security of current cryptographic systems. As a result, companies adopting blockchain-based solutions, becomes prone to quantum attack in long-term strategic planning. Grover's and Shor's quantum algorithms, which attack the cryptographic principles on which the blockchain is built, currently pose the biggest threat to the blockchain. To counter these threats, the post-quantum cryptography was proposed. The main aim of this study is to critically analyzed the security of classical blockchain and present some post-quantum implementation algorithms in developing a quantumbased blockchain system that would be able to withstand any attacks using quantum technology.
Counterfeit certificate is indeed a pervasive and chronic phenomenon that undermines the faith in academic institutions, costs a lot of money and hinders societal growth. Regrettably, costly, time-consuming and inefficient certificate... more
Counterfeit certificate is indeed a pervasive and chronic phenomenon that undermines the faith in academic institutions, costs a lot of money and hinders societal growth. Regrettably, costly, time-consuming and inefficient certificate verification solution is still in existence. It has become very difficult to distinguish between real and fake certificates. In a bid to get employed, young graduates who have no academic result or could not complete his or her career in engaging institution present counterfeit certificate to the employee. This could result in huge financial loss and employment of incompetency. Blockchain-based smart contract has emerged as a fruitful means of verifying educational certificates and combating document fraud and misuse. This paper presents a verification model to detect counterfeit certificate using blockchain-based smart contract model. We presented a model to save the society from the effect of certificate forgery by enabling a verified smart-contract against security vulnerability and to detect counterfeit certificate.
This work discussed a way of improving smart contract implementation using Ethereumblockchain. This is achieved by the introduction of an improved verification and validation module, together with the Offblockchain Checker that ensures... more
This work discussed a way of improving smart contract implementation using Ethereumblockchain. This is achieved by the introduction of an improved verification and validation module, together with the Offblockchain Checker that ensures that cold wallet to cold wallet transaction is checked. The system was modeled using Object-Oriented Analysis and Design methodology, with solidity as the language of implementation. The system showed improved performance over an existing system reaching Transaction Speed (TS), Scalability (S),
Smart contracts are programs that run on a blockchain computational infrastructure via transaction-based state transitions. Business process and contracts have been difficult or impossible to carry out without third party due to lack of... more
Smart contracts are programs that run on a blockchain computational infrastructure via transaction-based state transitions. Business process and contracts have been difficult or impossible to carry out without third party due to lack of trust, challenge of repudiation and mutability of contract documents. In this work, a smart contract model with an improved verification and validation system was developed and deployed for a Pharmaceutical products distribution chain. The scripting model was used in implementing a smart contract and deploying it in Ethereum Blockchain. The system was designed using Object-Oriented analysis and design methodology (OOADM), and implemented using Solidity programming language, MetaMask and Remix IDE. The executed transactions were successfully deployed on Ethereum Virtual Machine (EVM). The result showed great accuracy, especially in its ability to tackle the problem of counterfeiting of Pharmaceutical products.
Non-fungible tokens have been a unique transformation in the implementation of the concept of distributed ledger technology in digital assets. NFTs are said to be non-interchangeable, which distinguishes its value from fungible tokens... more
Non-fungible tokens have been a unique transformation in the implementation of the concept of distributed ledger technology in digital assets. NFTs are said to be non-interchangeable, which distinguishes its value from fungible tokens like Bitcoin (Btc). Scammers are utilizing the open source nature of the blockchain to victimize users and steal their NFTs, leaving NFT collectors with infringed artwork. In a bid to eliminate security vulnerability and attack in NFT platform, we implemented a smart contract verification model. Our verification model is a 2-pronged approach that utilized F*, functional programming language. We presented two tools that translated solidity source code and EVM bytecode to solidity* and EVM* respectively. The EVM decompiler analyzes contracts in which the solidity source codes are unavailable as well as low level properties of contracts. The EVM* and Solidity* tools helped to check the equivalence between a solidity program and the bytecode output from the solidity compiler in order to avoid bugs and preserve verified properties at the source level. In this paper, Etherscan token tracker was used to verify and authenticate NFT token before buying or minting such NFT.
The constant usage of the internet has necessitated the need to improve current cyber-security frameworks. This is because; majority of the current cyber-security frameworks are still vulnerable to cyber-attacks, and also lack trustable... more
The constant usage of the internet has necessitated the need to improve current cyber-security frameworks. This is because; majority of the current cyber-security frameworks are still vulnerable to cyber-attacks, and also lack trustable measures. In this paper, we addressed the aforementioned issue through a blockchain-based approach termed as an improved Sapiens Chain. Our approach encompassed an in-depth illustrative model on how Sapiens chain can be improved for a more robust cyber-security framework.
The Internet of Things has become a household name for future technology used to describe miniaturised and smart devices. It has gradually revolutionising the way in which enterprises manage andis inevitably transforming the way we do... more
The Internet of Things has become a household name for future technology used to describe miniaturised and smart devices. It has gradually revolutionising the way in which enterprises manage andis inevitably transforming the way we do things on the internet. This progress comes with a price as most of these IoT devices present security challenges we must be ready to overcome in Nigeria. We present in the paper an overview of the security changelings faced in the adoption of IoT in Nigeria and proposed key areas on how they can be resolved.
A secured process whereas enumerating and casting of votes with the electronic aids with aim of improving the performance of electoral system is called E-voting (Electronic voting). Present e-voting mechanisms are faced with challenges... more
A secured process whereas enumerating and
casting of votes with the electronic aids with aim of improving
the performance of electoral system is called E-voting
(Electronic voting). Present e-voting mechanisms are faced with
challenges such as confidentiality, integrity, verifiability,
transparency, non-repudiation, and authenticity. In e-voting
system, blockchain cryptography exists to protect voter’s
records. Encryption as well as decryption prevents forgery and
other electoral malpractices by confirming voter’s coherence
and confidentiality. Rivest, Shamir, Adleman (RSA) is a crooked
algorithm with trapdoor functionality which makes it difficult
to factor a huge prime whole number as the product of
multiplication into its component primes. RSA – Key
Encapsulation Mechanism describes a hybrid encryption that
makes use of unrelated keys for decryption and encryption
along with a key derivation function. In this paper, a secured
voting system using RSA Key Encapsulation Mechanism with
two layers-Symmetric and Public key Layers was presented.
RSA consist of three functions such as key generation,
encryption, and decryption. In RSA-KEM, KDF3 built upon
SHA-256, induction function is mainly for key generation. AES
key wrap (Advanced-Encryption-Standard) provides keywrapping
functionality.
National governments are making efforts in de-globalizing various aspects of governance. There is need for a polycentric governance model utilizing blockchain potentials to establish a voluntary and consensual "global social contract"... more
National governments are making efforts in de-globalizing various aspects of governance. There is need for a polycentric governance model utilizing blockchain potentials to establish a voluntary and consensual "global social contract" where every participating public or private member would abide by an agreed-upon set of rules. Blockchain Technology can be utilized to build a resilient and trustworthy international governance system through the distributed infrastructure in order for multiplicity of stakeholders to collaborate to solve most prevalent global challenges. In this paper, we proposed a smart contract model using blockchain technology for easy implementation, coordination and handling challenges in governance without a central control. This will help to increase public confidence and trust.