2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC) 2017
DOI: 10.1109/compsac.2017.119
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing Breeder Document Long-Term Security Using Blockchain Technology

Abstract: LLMs can help humans working with long documents, but are known to hallucinate. Attribution can increase trust in LLM responses: The LLM provides evidence that supports its response, which enhances verifiability. Existing approaches to attribution have only been evaluated in RAG settings, where the initial retrieval confounds LLM performance. This is crucially different from the long document setting, where retrieval is not needed, but could help. Thus, a long document specific evaluation of attribution is mis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0
1

Year Published

2019
2019
2020
2020

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 38 publications
(11 citation statements)
references
References 16 publications
0
10
0
1
Order By: Relevance
“…Governments, termed Government 3.0 (Millard, 2017) around the world, are investing in blockchain technology in order to use its distinct features such as distributed ledger, immutability and smart contracts (Macrinici et al, 2018), in applications such as in medical data to protect privacy (Buchmann et al, 2017;Priisalu and Ottis, 2017) improve security and privacy in FinTech applications (Gai et al, 2016;Hyv€ arinen et al, 2017), secure e-voting (Culnane et al, 2017), e-democracy (Karmakar and Sahib, 2017), sharing economy (Guerrini, 2017), smart city (Anthopoulos, 2017) and smart governments (Ølnes, 2016). However, Atzori (2015) identified several security concerns associated with use of blockchain and in particular, permissionless blockchains for government services such as moral hazards, scalability problems, trends towards centralisation, dependency on miners, domination of market logic over public services, possible lack of service continuity and raising of dominant techno-elite.…”
Section: Introductionmentioning
confidence: 99%
“…Governments, termed Government 3.0 (Millard, 2017) around the world, are investing in blockchain technology in order to use its distinct features such as distributed ledger, immutability and smart contracts (Macrinici et al, 2018), in applications such as in medical data to protect privacy (Buchmann et al, 2017;Priisalu and Ottis, 2017) improve security and privacy in FinTech applications (Gai et al, 2016;Hyv€ arinen et al, 2017), secure e-voting (Culnane et al, 2017), e-democracy (Karmakar and Sahib, 2017), sharing economy (Guerrini, 2017), smart city (Anthopoulos, 2017) and smart governments (Ølnes, 2016). However, Atzori (2015) identified several security concerns associated with use of blockchain and in particular, permissionless blockchains for government services such as moral hazards, scalability problems, trends towards centralisation, dependency on miners, domination of market logic over public services, possible lack of service continuity and raising of dominant techno-elite.…”
Section: Introductionmentioning
confidence: 99%
“…The most suitable blockchain for the described breeder scenario is using the Bitcoin blockchain. Shah and Kumar [15] complete the result from [14] with requiring an efficient technology to store birth records which cannot be tampered as well as easy to maintain, well secured and easily shareable using blockchain technology along with Cryptography algorithms and IPFS protocol.…”
Section: Review Of Existing National Digital Identity With Blockchainmentioning
confidence: 99%
“…Double spending attack is mitigated by the transaction verification based on unspent transaction state [3]. In [1] authors resisted this attack by PoA scheme and in [6] by PoW complexity. Also, the Muzammal et al [29] append the nonce with each transaction.…”
Section: Countermeasuresmentioning
confidence: 99%
“…No countermeasure is found for Replay attack. In order to overcome the Quantum computing threats, Yin et al [39] implement the lattice cryptography and in [6] authors suggest an additional digital signature or a hard fork in the post-quantum era. Decusatis et al [11] propose a need of quantum blockchain.…”
Section: Countermeasuresmentioning
confidence: 99%