Philanthropy on the Blockchain

Danushka Jayasinghe, Sheila Cobourne, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Abstract

One of the significant innovations that came out of Bitcoin is the blockchain technology. This paper explores how the blockchain can be leveraged in the philanthropic sector, through charitable donation services in fiat currency or Bitcoin via a web-based donor platform. The philanthropic model is then used for a case study providing humanitarian aid for a community living in a challenging geographical environment with limited internet availability. An SMS based mobile payment system is proposed for provisioning the received donations using the existing GSM network, very basic mobile phones and One Time Password (OTP) security tokens. The proposed scheme is finally evaluated for security while discussing the impact it has on charities and donors.
Original languageEnglish
Title of host publicationIFIP International Conference on Information Security Theory and Practice
EditorsG Hancke , E Damiani
PublisherSpringer
Pages25-38
Number of pages14
ISBN (Electronic)978-3-319-93524-9
ISBN (Print)978-3-319-93523-2
DOIs
Publication statusPublished - 21 Jun 2018
EventIFIP International Conference on Information Security Theory and Practice: WISTP 2017 - Heraklion, Greece
Duration: 28 Sep 201729 Sep 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10741
ISSN (Print)0302-9743

Conference

ConferenceIFIP International Conference on Information Security Theory and Practice
CountryGreece
CityHeraklion
Period28/09/1729/09/17

Fingerprint Dive into the research topics of 'Philanthropy on the Blockchain'. Together they form a unique fingerprint.

  • Cite this

    Jayasinghe, D., Cobourne, S., Markantonakis, K., Akram, R. N., & Mayes, K. (2018). Philanthropy on the Blockchain. In G. Hancke , & E. Damiani (Eds.), IFIP International Conference on Information Security Theory and Practice (pp. 25-38). (Lecture Notes in Computer Science; Vol. 10741). Springer . https://doi.org/10.1007/978-3-319-93524-9_2