Open Access Open Access  Restricted Access Subscription Access

ECSDA-based Security Approach to Blockchain for Online Transactions Using Cryptocurrency

Arifa .

Abstract


Blockchain is a creative application model that organizes understanding instruments, appropriated data accumulating, feature point transmission, mechanized encryption development and various other PC progresses. This paper explores the issues that the blockchain still has in the piece of safety protection, and familiarizes the ongoing game plans with these issues. One of the strategies for cutting edge cash is ring mark which can be accomplished by Elliptic Bend Advanced Mark Calculation (ECSDA). In this paper, we present a clever technique for gaining speedy programming execution of the Elliptic Bend Computerized Mark Calculation in the restricted Galois field GF(p) with an optional prime modulus p of self-confident. The main part of the method is that it avoids bit-level exercises which are deferred on chip and performs word-level undertakings which are through and through speedier. The estimations used in the execution perform word-level exercises, trading them off for bit-level undertakings and in this manner achieving a great deal of higher speeds. We give the arranging results of our use on a 2.8 GHz Pentium 4 processor, supporting our case that ECDSA is reasonable for constrained circumstances.

 


Full Text:

PDF

References


Vanstone, S. (1992). Responses to NIST’s proposal. Communications of the ACM, 35(7), 50-52.

Vanstone, S. A. (2003). Next generation security for wireless: elliptic curve cryptography. Computers & Security, 22(5), 412-415.

Koblitz, N., & Cryptosystems, E. C. (1987). Mathematics of Computation, vol. 48.

Miller, V. S. (1985, August). Use of elliptic curves in cryptography. In Conference on the theory and application of cryptographic techniques (pp. 417-426). Springer, Berlin, Heidelberg.

Hankerson, D., Menezes, A. J., & Vanstone, S. (2005). Guide to elliptic curve cryptography. Computing Reviews, 46(1), 13.

Bos, J. W., Halderman, J. A., Heninger, N., Moore, J., Naehrig, M., & Wustrow, E. (2014, March). Elliptic curve cryptography in practice. In International Conference on Financial Cryptography and Data Security (pp. 157-175). Springer, Berlin, Heidelberg.

Evans, J. (2014). Bitcoin 2.0: Sidechains and ethereum and zerocash. In Oh my!.

Gentry, C. (2009, May). Fully homomorphic encryption using ideal lattices. In Proceedings of the forty- first annual ACM symposium on Theory of computing (pp. 169-178).

Barlow, J. P. (2019). A Declaration of the Independence of Cyberspace. Duke Law & Technology Review, 18(1), 5-7.

Karamitsos, I., Papadaki, M., & Al Barghuthi, N. B. (2018). Design of the blockchain smart contract: A use case for real estate. Journal of Information Security, 9(3), 177-190.


Refbacks

  • There are currently no refbacks.