In the world of blockchain, security and privacy are key. Secret sharing is a powerful tool for protecting sensitive info. The Shamir’s Secret Sharing (SSS) algorithm is a key part of blockchain systems. It helps keep private keys and secret recovery phrases safe.
Secret sharing in blockchain uses cryptography to split sensitive info into shares. These shares are given to different parties or custodians. This method makes the system more secure and avoids single points of failure.
Blockchain apps use secret sharing to boost fault tolerance and privacy. They also manage keys better. This makes blockchain a secure, decentralized, and self-sovereign way to manage data.
Key Takeaways
- Secret sharing in blockchain technology uses cryptography like Shamir’s Secret Sharing (SSS) to safely share and manage sensitive info.
- It makes blockchain systems more secure by removing single points of failure and letting authorized parties rebuild the secret when needed.
- The main benefits of secret sharing in blockchain include secure data storage, dynamic share management, and decentralized key management. These help make blockchain systems secure and reliable.
- Shamir’s Secret Sharing algorithm allows for a hierarchical setup. It gives different levels of authority to participants. A threshold parameter sets how many shares are needed to rebuild a key.
- Techniques like Pedersen’s Verifiable Secret Sharing (PVSS) add more security. They check the integrity of shares during reconstruction. This ensures the shared secret’s privacy and integrity.
Introduction to Secret Sharing
What is Secret Sharing?
Secret sharing is a way to split a secret into parts and share them with others. These parts are called shares. The secret can only be put back together when a certain number of shares are gathered.
This method keeps the secret safe from one person getting it all. It makes the information more secure and private.
Why is Secret Sharing Needed?
Secret sharing is key for keeping safe data like encryption keys or missile codes. If one person gets it, it could be very bad. By sharing the secret, it’s harder for one person to get it all.
This makes it safer for things like blockchain, cloud computing, and storing data securely. It helps protect important information.
Shamir’s Secret Sharing, from 1979, is a big deal in this field. It uses math to put the secret back together from shares. It’s very secure, even if some shares are lost.
For example, if you need three shares to get the secret, having three will work. But two won’t. This method also lets the secret owner change shares without changing the secret itself.
Secret sharing is a base for many advanced security tools. It helps make data and assets safer when used with other security methods.
Shamir’s Secret Sharing Algorithm
Shamir’s Secret Sharing (SSS) is a well-known algorithm for safe data sharing. It was created by Adi Shamir in 1979. This method breaks a secret into parts called “shares” and gives them to different people.
The special thing about SSS is that you need only a certain number of shares to get the secret back. You don’t need all of them.
How Shamir’s Secret Sharing Works
The SSS algorithm starts with a secret and a number called the threshold. It makes a special equation using these two. This equation is then used to make the shares.
Each share is a point on this equation. To get the secret back, you need at least K shares, where K is the threshold. But, each share alone doesn’t tell you the secret. So, no one person can get the secret by themselves.
Share Thresholds and Encrypted Distributed Shares
- The SSS algorithm lets the secret owner choose the threshold value K. This gives them control over how the secret is shared.
- The shares are encrypted, making the data even safer.
- This way of sharing secrets is popular for its security and flexibility. It’s great for managing sensitive data.
Using SSS, you can keep your important information safe. This includes things like wallet recovery phrases or biometric data. It’s a decentralized and safe way to share secrets.
“Shamir’s Secret Sharing algorithm is a powerful tool for securing and managing sensitive data, enabling users to distribute their secrets across multiple trusted parties while maintaining control over the reconstruction process.”
Benefits of Shamir’s Secret Sharing
Shamir’s Secret Sharing (SSS) algorithm is a powerful tool for keeping data safe, especially in blockchain technology. It’s inherently secure, making sure the secret is safe from being broken. This is great for protecting things like cryptocurrency private keys.
Secure and Dynamic Nature
SSS also lets the secret owner change the rules easily. This means adding or removing people from the secret sharing without disturbing others. This flexibility is key for managing sensitive info in changing environments, like blockchain.
Benefit | Description |
---|---|
Inherent Security | SSS ensures the secret is cryptanalytically unbreakable and cannot be derived from individual shares. |
Dynamism and Flexibility | The secret owner can easily modify the secret sharing scheme, such as adding or removing custodians, without affecting other participants. |
Adaptability | SSS is well-suited for managing sensitive information in evolving environments, like blockchain ecosystems, where adaptable key management is crucial. |
Using the benefits of Shamir’s Secret Sharing, blockchain apps and wallets can provide secure secret sharing and dynamic secret sharing. This keeps important assets like private keys safe and sound.
“Shamir’s Secret Sharing algorithm offers a flexible and collaborative security solution for managing sensitive information in evolving environments like blockchain ecosystems.”
What is secret sharing in blockchain technology?
In blockchain tech, secret sharing methods like Shamir’s Secret Sharing (SSS) boost security and privacy. They split and share sensitive info, like private keys, across many custodians. This reduces the risk of losing everything if one point fails.
Shamir’s Secret Sharing, from 1979, is a key method. It breaks a secret into shares for authorized parties. Only a certain number of shares can reassemble the secret, keeping it safe from one person.
Secret sharing in blockchain has led to new tools like Arcana Network’s Auth SDK. It offers fast, secure login. Their SendIt product changes crypto payments, making them easy to send via email. These show how secret sharing improves blockchain security and user experience.
Metric | Value |
---|---|
Shamir’s Secret Sharing Invented | 1979 |
Arcana Network Funding | $4.5M |
Auth SDK Login Time | Sub-3 seconds |
Shamir’s Secret Sharing is a strong tool for blockchain security and cryptography in blockchain. Yet, it has limits. It can’t check share integrity and has a single point of failure risk. New methods, like Pedersen Verifiable Secret Sharing (PVSS), aim to fix these issues.
As blockchain grows, using advanced secret sharing in blockchain will be key. It will help protect users’ digital assets from privacy and security threats.
Using Secret Sharing for Crypto Wallets
Secret sharing in blockchain is key for safe backup of crypto wallet secret recovery phrases (SRPs). These words are the main key to access your crypto. They are a big target for hackers. With Shamir’s Secret Sharing, you can split your SRP into parts and share them with trusted people.
This method keeps your wallet safe even if some custodians are not available. You can get your wallet back by getting enough shares. This is safer than just keeping a single backup or using multi-signature wallets.
Backing Up Secret Recovery Phrases
Cryptocurrency hardware wallets, like the Cypherock X1, use Shamir’s Secret Sharing for better private key management. They split the private key into parts and spread them across the device. You can choose how many parts are needed to get the key back.
- Shamir’s Secret Sharing makes your wallet more secure and resilient. You can still get your funds even if something goes wrong.
- It makes recovery easier. You only need to get the right number of shares, not a single phrase.
- It’s more secure and flexible than old methods. It also helps protect against future threats from quantum computers.
Using secret sharing for crypto wallets helps keep your digital assets safe. It reduces the risk of losing your secret recovery phrases or having them stolen.
Ledger’s Pedersen Verifiable Secret Sharing
Securing your digital assets is crucial. Ledger, a top hardware wallet provider, has a new way to back up your crypto. It’s called Ledger Recover, using Pedersen Verifiable Secret Sharing (PVSS).
PVSS adds extra checks to traditional Secret Sharing Schemes (SSS). This makes sure the backup shares are correct and safe. You can trust Ledger Recover to keep your wallet’s secret safe, without sharing it.
Enhancing Security with PVSS
PVSS in Ledger Recover fixes old security issues. It makes sure the shares are real and safe, not tampered with. This means you can trust your sensitive info to others more.
- PVSS splits your private key into three parts, each with a different company. This makes your crypto safer.
- The verifiability in PVSS checks the shares are right, without sharing your secret. It’s a big plus.
- PVSS backups, like Ledger Recover, are safer than old single-backup methods.
Using Ledger’s Pedersen Verifiable Secret Sharing, you can back up and recover your Ledger’s Pedersen Verifiable Secret Sharing, PVSS, and secure crypto asset backup safely. This keeps your digital assets safe for a long time.
Importance of Decentralized Key Management
Secret sharing in blockchain is key to decentralized key management. It spreads out private keys and recovery phrases among many custodians. This makes blockchain apps safer from single failure points. It also fits with blockchain’s focus on user control over crypto assets.
Decentralized key management keeps blockchain resources safe. It makes the whole system more secure and strong.
Decentralized Key Management Systems (DKMS) are becoming more popular. They are safer than old systems. Blockchain helps DKMS by keeping a safe record of transactions. This makes security of decentralized key management better.
DKMS spreads out keys to avoid a single attack point. This makes systems more secure.
The Internet of Things (IoT) needs secure key management. DKMS is a good answer for this. Know Your Customer (KYC) rules are also key in financial deals. They help verify identities and fight fraud. They are important in blockchain-based DKMS.
Feature | Centralized Key Management | Decentralized Key Management |
---|---|---|
Security | Single point of failure | Distributed trust, reduced risk of compromise |
User Control | Limited user control | Users have full control over their digital assets |
Scalability | Limited scalability | Increased scalability through distributed infrastructure |
Resilience | Vulnerable to system failures | Highly resilient, able to withstand network disruptions |
Blockchain-based DKMS gives people control over their digital identities. It means they don’t have to share sensitive data with many places. Decentralized KYC makes it hard for unauthorized access.
DKMS lets users keep their data safe. It’s not stored in big databases. This makes it easier for different systems to work together. It improves the user experience.
Applications of Secret Sharing
Secret sharing is not just for blockchain and cryptocurrency. Shamir’s Secret Sharing algorithm is used in many places where sensitive data needs protection. For example, it helps keep biometric data, like fingerprints or iris scans, safe by spreading it among several parties.
Another key use is in missile launch codes. Here, the secret is split among many trusted people. This stops unauthorized access and ensures safety and control.
Biometrics and Missile Codes
Shamir’s Secret Sharing is a safe way to share sensitive data among many without giving one person the whole thing. It’s great for keeping biometric data safe and managing things like missile launch codes.
- Shamir’s Secret Sharing breaks a secret into parts. A certain number of people must join their parts to get the secret.
- This method lets the secret be recovered if one person is missing, as long as enough people are there.
- It uses encryption, like polynomial interpolation, to make sure only the right people can get the secret.
Using secret sharing helps protect biometric data and important things like missile launch codes. It reduces the danger of losing everything because of one problem or unauthorized access.
Choosing Trustworthy Custodians
Choosing the right custodians for secret sharing is key. The safety of your secret depends on their trustworthiness. Look for individuals or groups with a good reputation and strong security practices.
It’s important to pick custodians who keep your secret safe. They should be reliable and committed to keeping your information private. This is crucial for the success of your secret sharing system.
Institutional investors need secure custody for their digital assets. They look for custodians that are fully licensed, insured, and audited. This meets regulatory needs and protects against security risks.
Investors with a lot of digital assets often choose top-notch custody solutions. These custodians use advanced security like Hardware Security Modules (HSMs). HSMs keep your data safe by being offline and meeting strict security standards.
HSMs are key to keeping your data secure. They are not connected to the internet and follow international security rules. Key sharding adds extra security by splitting your private keys into parts stored in different places.
Good custodians, like Hex Trust, use many security tools. They include HSMs, Yubikeys, and key sharding. Hex Trust is a licensed custodian with offices in several countries.
The demand for safe custody in crypto is growing. As more people and institutions use digital assets, choosing the right custodian is more important. This ensures your secrets are kept safe and secure.
Cloud Computing and Secret Sharing
Cloud computing has changed how we store and access data. It’s more important than ever to keep our data safe. Secret sharing in cloud computing is a key solution, offering strong security without needing special hardware.
The way secret sharing in the cloud works is groundbreaking. It uses secret sharing algorithms to split data into encrypted parts. This makes data safe, even if one place is hacked.
This method has many advantages. It lets users store sensitive data like financial info or personal details safely. The data is split and protected across different places, making it hard to lose or steal.
As more people need secure cloud storage, secret sharing in cloud computing will play a big role. It helps keep data safe from cyber threats, giving users peace of mind.
Combining Shares to Reconstruct Secrets
The process of reconstructing secrets from shared fragments is key in secret sharing schemes. The Shamir’s Secret Sharing algorithm requires a certain secret sharing threshold requirement to recover the secret. This threshold is set by the secret owner and shows the minimum number of shares needed to get back the original secret.
To put the secret back together, special cryptographic methods are used. These methods, like polynomial interpolation, help to combine the pieces into a whole. This way, the secret stays safe, even if some shares are lost or stolen.
- The secret owner sets the threshold value, t, and the total number of shares, n, to be given out.
- The shares are then given to the chosen participants or custodians.
- To get the secret back, at least t shares must be combined.
- The process of putting the secret back together involves complex math to find the secret value.
This method of reconstructing secrets from shared fragments makes the secret sharing system strong and safe. It stops a single problem from causing a big issue and spreads the risk among many.
“The key to effective secret sharing is striking the right balance between security and accessibility.”
By managing the secret sharing threshold requirements well, secret owners can protect their sensitive info. They also make sure that only the right people can get to the secret when needed.
Advantages of Secret Sharing over Single Storage
Secret sharing, like Shamir’s Secret Sharing, has big benefits over single storage. It spreads out sensitive info across many custodians. This lowers the risk of losing or compromising the secret.
Even if some custodians go missing or become untrustworthy, the secret can still be recovered. This is because you need a certain number of shares to get it back. This makes secret sharing great for keeping data safe, especially in blockchain and decentralized systems.
Removing Single Point of Failure
Secret sharing’s main benefit is avoiding single points of failure. Traditional storage has one central spot, losing it means losing all data. But secret sharing breaks down the info into shares given to different custodians.
This way, even if some custodians are lost or untrustworthy, the secret can still be made whole. You just need enough shares. This is super helpful in blockchain systems, where keeping private keys and recovery phrases safe is key.
By using secret sharing, you make your system more resistant to threats. This includes hacking, natural disasters, or if custodians can’t be reached.
Metric | Single Storage | Secret Sharing |
---|---|---|
Potential for Data Loss | High | Low |
Resilience to Custodian Unavailability | Low | High |
Security Against Compromise | Moderate | High |
Flexibility in Customization | Limited | High |
Secret sharing’s benefits, like avoiding single points of failure, make it very useful. It boosts security and resilience in blockchain and decentralized systems. Here, keeping sensitive info safe and accessible is crucial.
Potential Drawbacks and Limitations
Secret sharing has many benefits, but it also has some downsides. One big challenge is picking and managing the right custodians. The system’s security depends on these trusted parties.
Another issue is the complexity of the process. This includes how shares are distributed and put back together. It can add extra work and risks of failure.
Secret sharing can also lead to data loss if custodians don’t keep their shares safe or go missing. This makes it hard to get back the original secret. It could cause big problems for those who need the secret.
There’s also a catch with secret sharing. You need a certain number of shares to get back the secret. If some shares are lost or can’t be found, it’s a big problem.
It’s important to think about the needs and risks of secret sharing before using it. By planning well and using strong security, we can make the most of it. This way, we can avoid its downsides.
Drawbacks of Secret Sharing | Limitations of Secret Sharing | Challenges of Secret Sharing |
---|---|---|
|
|
|
Knowing the downsides, limits, and challenges of secret sharing helps us use it better. This way, we can keep our important data and assets safe and secure.
Emerging Trends in Secret Sharing Technology
The digital world is changing fast, and secret sharing technology is leading the way. Experts are working on new ways to make secret sharing better. This includes making it more secure, efficient, and easy to use. It’s especially important for keeping data safe in the blockchain and cryptocurrency world.
New secret sharing algorithms are being developed. They promise to be more reliable and flexible. These updates aim to keep sensitive information safe, even when faced with failures or attacks.
Secret sharing is also getting a boost from new technologies like quantum computing. This will make secret sharing even more secure. As we need to protect our digital assets more, secret sharing tech will be key in keeping our data safe.
Blockchain technology is a great match for secret sharing. It’s all about keeping data safe and unchangeable. Experts are finding new ways to use secret sharing to make blockchain apps more secure. This includes better protection for cryptocurrency wallets and smart contracts.
Looking ahead, the future of secret sharing looks bright. Experts think we’ll see even better, more user-friendly solutions. These emerging trends in secret sharing could change how we protect our digital lives. They promise to keep our sensitive information safe in our connected world.
“The evolution of secret sharing technology is poised to redefine the landscape of secure data management, paving the way for a future where privacy and decentralization are the cornerstones of digital innovation.”
Conclusion
Secret sharing techniques, like Shamir’s Secret Sharing algorithm, are key in blockchain tech. They help keep sensitive info, like private keys, safe by spreading it among trusted people. This makes blockchain systems more secure and reliable.
As more people want to own digital assets safely, secret sharing in blockchain will be vital. It helps protect user privacy and keeps these new techs working well for a long time. For example, Trezor uses Shamir’s Secret Sharing, showing how it’s making digital wallets safer.
Secret sharing in blockchain is all about keeping data safe and easy to get back. It’s about making sure blockchain systems can handle new security challenges. As blockchain grows, so will the need for secret sharing, making it a cornerstone of digital asset management.
FAQ
What is secret sharing in blockchain technology?
Secret sharing in blockchain uses cryptography, like Shamir’s Secret Sharing (SSS), to safely share sensitive info. This info can be private keys or secret recovery phrases. It’s split among many parties, making it safer and more private.
What are the key benefits of secret sharing in blockchain?
Secret sharing in blockchain offers secure data storage, flexible share management, and decentralized key management. These benefits make blockchain systems more secure and reliable.
How does Shamir’s Secret Sharing (SSS) algorithm work?
Shamir’s Secret Sharing (SSS) splits a secret into shares given to custodians. The secret is only complete when a certain number of shares are combined, not all.
What are the advantages of using Shamir’s Secret Sharing in blockchain technology?
Shamir’s Secret Sharing brings security, flexibility, and decentralized key management to blockchain. These align with blockchain’s core values.
How is secret sharing used to secure cryptocurrency wallets?
Secret sharing secures cryptocurrency wallet secret recovery phrases (SRPs) through Shamir’s Secret Sharing. Users split their SRP into shares given to trusted custodians. This way, they can recover their wallet even if some custodians are missing.
What is Ledger’s Pedersen Verifiable Secret Sharing (PVSS)?
Ledger uses Pedersen Verifiable Secret Sharing (PVSS) in its Ledger Recover service. PVSS adds verification to ensure the integrity of shares, building on Shamir’s Secret Sharing.
Why is decentralized key management important in blockchain technology?
Decentralized key management in blockchain is key. It distributes sensitive info like private keys across many custodians. This reduces the risk of a single point of failure, aligning with blockchain’s principles.
What are some other applications of secret sharing?
Secret sharing is used beyond blockchain. It protects sensitive info like biometric data and missile launch codes. Shamir’s Secret Sharing algorithm is widely used for this.
How important is the selection of trustworthy custodians in a secret sharing scheme?
Choosing trustworthy custodians is crucial in secret sharing. The security of the secret depends on them. It’s important to carefully select and vet custodians.
How does secret sharing apply to cloud computing environments?
Secret sharing is vital in cloud computing. It adds security to sensitive data without needing special hardware. This makes cloud-based applications more secure.
What are the potential drawbacks and limitations of secret sharing?
Secret sharing has benefits but also drawbacks. It requires careful custodian selection and management. The process can be complex, adding operational overhead and potential failures.
What are the emerging trends in secret sharing technology?
Secret sharing technology is evolving. Researchers are exploring new techniques to improve security and usability. New algorithms and integration with technologies like quantum computing are emerging.
Source Links
- What is Shamir’s Secret Sharing? | Ledger – https://www.ledger.com/academy/topics/security/shamirs-secret-sharing
- Understanding Shamir’s Secret Sharing (SSS) – https://vault12.com/blog/shamir-secret-sharing-sss/
- MPC Techniques Series, Part 1: Secret Sharing – https://medium.com/partisia-blockchain/mpc-techniques-series-part-1-secret-sharing-d8f98324674a
- Shamir’s Secret Sharing: A beginner’s guide – https://keyless.io/blog/post/a-beginners-guide-to-shamir-s-secret-sharing
- Secret sharing – https://en.wikipedia.org/wiki/Secret_sharing
- PDF – https://ntt-research.com/wp-content/uploads/2022/07/Storing-and-retrieving-secrets-on-a-blockchain.pdf
- Shamir’s secret sharing – https://en.wikipedia.org/wiki/Shamir’s_secret_sharing
- Shamir’s Secret Sharing Algorithm | Cryptography – GeeksforGeeks – https://www.geeksforgeeks.org/shamirs-secret-sharing-algorithm-cryptography/
- Shamir’s Secret Sharing: Why Is It NOT MPC for PrivateKeys? – https://blog.particle.network/why-is-shamirs-secret-sharing-not-an-mpc-security-solution-for-private-keys/
- Multisig vs. Shamir’s vs. MPC: Institutional-grade bitcoin custody – https://unchained.com/features/mpc-vs-multisig-vs-sss
- Explaining Shamir’s Secret Sharing: The Building Block of Arcana’s DKG – https://blog.arcana.network/explaining-shamirs-secret-sharing/
- How Shamir’s Secret Sharing Revolutionizes Bitcoin Security – D-Central – https://d-central.tech/how-shamirs-secret-sharing-revolutionizes-bitcoin-security/
- Shamir Secret Sharing in Hardware Wallets: How it Works and Why it’s Important – https://www.cypherock.com/blogs/shamir-secret-sharing-in-hardware-wallets
- Shamir Secret Sharing and Quantum-resilient crypto keys – https://www.openware.com/news/articles/shamir-secret-sharing-and-quantum-resilient-crypto
- Ledger Key Recovery: Understanding the Principles of MPC Wallets – https://medium.com/numen-cyber-labs/ledger-key-recovery-understanding-the-principles-of-mpc-wallets-dc2eacfd39f3
- Lattice-Based Threshold Secret Sharing Scheme and Its Applications: A Survey – https://www.mdpi.com/2079-9292/13/2/287
- Using Secure Multi-Party Computation to Protect Privacy on a Permissioned Blockchain – https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7927103/
- DKMS: Decentralized Key Management Systems – https://www.togggle.io/blog/demystify-dkms-power-decentralized-key-management
- CHURP: Dynamic-Committee Proactive Secret Sharing – https://medium.com/oasislabs/churp-dynamic-committee-proactive-secret-sharing-5b0446061663
- Practical Use of Secret Sharing for Enhancing Privacy in Clouds – https://www.mdpi.com/2079-9292/11/17/2758
- How do custodians protect your digital assets? | Hex Trust – https://hextrust.com/resources-collection/how-do-custodians-protect-your-digital-assets
- Crypto Custody Solutions: Protecting Digital Assets – https://www.openware.com/news/articles/crypto-custody-solutions-protecting-digital-assets
- How Digital Asset & Crypto Custodians Safeguard Your Assets – https://www.rakkardigital.com/post/how-digital-asset-crypto-custodians-safeguard-your-assets
- A systematic review on blockchain-based access control systems in cloud environment – Journal of Cloud Computing – https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-024-00697-7
- ROMSS: a rational optional multi-secret sharing scheme based on reputation mechanism – Journal of Cloud Computing – https://journalofcloudcomputing.springeropen.com/articles/10.1186/s13677-023-00495-7
- Distributed Random Beacon for Blockchain Based on Share Recovery Threshold Signature – https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9415128/
- An Optimized Encryption Storage Scheme for Blockchain Data Based on Cold and Hot Blocks and Threshold Secret Sharing – https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11353691/
- Securing Your Bitcoin: The Power of Shamir’s Secret Sharing – https://www.linkedin.com/pulse/securing-your-bitcoin-power-shamirs-secret-sharing-dcentraltech-fiule
- Exploring the Benefits and Functionality of Shamir Backup Crypto – RedBelly Blockchain – https://www.redbellyblockchain.io/researchpapers/exploring-the-benefits-and-functionality-of-shamir-backup-crypto/
- The potential—and pitfalls—of blockchain technology – https://hub.jhu.edu/magazine/2022/winter/blockchain-technology-web3/
- Challenges in making blockchain privacy compliant for the digital world: some measures – https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9387419/
- A Blockchain-Based Secret-Data Sharing Framework for Personal Health Records in Emergency Condition – https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7917907/
- PDF – https://ijiset.com/vol9/v9s7/IJISET_V9_I07_04.pdf
- Blockchain-Based Key Management Scheme Using Rational Secret Sharing – https://www.techscience.com/cmc/v79n1/56290/html
- Efficient Local Secret Sharing for Distributed Blockchain Systems – http://shanbhag.ece.illinois.edu/publications/Yongjune-TCOMM-2019.pdf