Part I: Fundamentals of Media Streaming Technology

The recent pandemic situation has significantly impacted users’ behavior on the Internet and their expectations from web services. There is a new, strong requirement to integrate media technologies into even well established businesses, but despite the fact that these technologies are used a lot in telecoms, streaming, and e-learning platforms, they still remain too complicated to be embraced more widely.

The article introduces the architecture design for a post-covid e-commerce. The aim here is to debrief fundamentals of media and share personal experience in the e-commerce solution design.

There are several parts in the series:

  1. Introduce the fundamentals of streaming…

Part II: Experimental digital voting in Zug, Swiss

The part I that introduces general privacy preserving techniques to design voting platform can be found here;

The Swiss solution treat model in a similar way to microservices but are cognisant of the design limitations inherent to a decentralized, consensus driven, data replication architecture. The decentralized technology has been identified as efficient tool to construct electronic voting solutions so they imply its distributed data storage is shared across multiple nodes. It increases level of trust to the system in general and provides better auditability, integrity properties against a centralised approach.

There are few important terms to note before proceed with…

Part I: Privacy Preserving Techniques

A secure election process is an important prerequisite not only for democracy, but also to construct robust and efficient solutions for the industry. The electronic voting is an active field of research. There are many proposals that were already deployed and tested in practice, e.g the DRE system deployed in Brazil [1] and the internet voting carried out in Estonia [2]. However, it’s not enough to just accept votes remotely, the platform has to be ready to scale on city, state and even country levels. …

Identity-based proxy re-encryption scheme

cryptography level: intermediate

Many articles were published resently where Blockchain and DLT systems criticized from data privacy. Such law as GDPR, HIPPA are formulated to prevent personal data storing directly on the blockchain. This prohibits us from using this technology to its full potential. However, Blockchain is a technology and as many other it’s a part of architectural design.

Blockchain is a distributed network and data written on it will be available for other participants. Thus, If application records health check results directly on blockchain to increase efficiency of data processing between group of physicians, it means that data will…

Anonymous Credentials

cryptography level: intermediate

Nowadays we stand on the edge of the digital revolution. Blockchain gives a new life for a P2P technology. There is nothing new here, just an excellent mixing of the existing robust technics, such as P2P, key-value storage, cryptography and others. Blockchain opens doors for completely new markets as well as transforms the well-established ones.

Self Sovereign Identity is the next area to be changed. The identity idea, problem and solution are very well covered by Sovrin in their WP. In my posts I’m going to take you through the generalized mathematical schemes under the hood. …

Alexander Kopnin

DLT & Digital Identity — Chief Technologist , @Luxoft,

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store