Author(s):
Manoj Kumar Chande, Rajlaxmi Gupta, Shailesh Dhar Diwan
Email(s):
rajlaxmi28476@gmail.com , manojkumarchande@gmail.com , sdd11@rediffmail.com
DOI:
10.5958/2231-3915.2020.00018.8
Address:
Manoj Kumar Chande1, Rajlaxmi Gupta2, Shailesh Dhar Diwan3
1Department of Applied Mathematics, Shri Shankaracharya Institute of Professional Management and Technology, Raipur 492015, Chhattisgarh, India.
2Department of Applied Mathematics Shri Shankaracharya Group of Institutions, Junwani, Bhilai 4920020, Chhattisgarh, India.
3Department of Applied Mathematics, Government Engineering College, Raipur 492015, Chhattisgarh, India.
*Corresponding Author
Published In:
Volume - 10,
Issue - 1,
Year - 2020
ABSTRACT:
A cryptocurrency is a digital asset designed to work as a medium of exchange that uses strong cryptography to secure financial transactions, control the creation of additional units, and verify the transfer of assets. The cryptocurrency systems are based on blockchain technology uses the Elliptic Curves Digital Signature Algorithm (ECDSA). The paper proposes a multiple Elliptic Curve Digital Signature Algorithm (mECDSA), which allows multiple signers to select Elliptic Curves (EC) as per requirements. The security and computational analysis of proposed scheme proves that the scheme is secure and efficient then other existing schemes. To optimize security and efficiency it is recommended that two elliptic curves used in the systems based on blockchain.
Cite this article:
Manoj Kumar Chande, Rajlaxmi Gupta, Shailesh Dhar Diwan. New Algorithm for Blockchain Based on Elliptic Curves Digital Signature. Int. J. Tech. 2020; 10(1):93-96. doi: 10.5958/2231-3915.2020.00018.8
Cite(Electronic):
Manoj Kumar Chande, Rajlaxmi Gupta, Shailesh Dhar Diwan. New Algorithm for Blockchain Based on Elliptic Curves Digital Signature. Int. J. Tech. 2020; 10(1):93-96. doi: 10.5958/2231-3915.2020.00018.8 Available on: https://ijtonline.com/AbstractView.aspx?PID=2020-10-1-18
REFERENCES:
1. Stallings, William. Cryptography and network security, 4th ed., Pearson Education India, 2006.
2. Blake, Ian F., Gadiel Seroussi, and Nigel P. Smart, eds. Advances in elliptic curve cryptography. Vol. 317. Cambridge University Press, 2005.
3. Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, Rich – ard Brooks. A brief survey of Cryptocurrency Systems. 14th Annual Conference on Privacy, Securiy and Trust, 2016, pp. 745-752.
4. Andreas M. Antonopoulos. Mastering Bitcoin. Second Edition, 2017.
5. Vujicic, Dejan, Dijana Jagodic, and Sinisa Randic. Blockchain technol- ogy, bitcoin, and Ethereum: A brief overview. 2018 17th international symposium infoteh-jahorina (infoteh). IEEE, 2018.
6. Alphand, Olivier, et al. IoTChain: A blockchain security architecture for the Internet of Things. 2018 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2018.
7. Yavuz, Emre, et al. Towards secure e-voting using ethereum blockchain. 2018 6th International Symposium on Digital Forensic and Security (ISDFS). IEEE, 2018.
8. Koblitz, Neal. Elliptic curve cryptosystems. Mathematics of computation 48.177 (1987): pp. 203-209.
9. A. Mennezes, S. Vanstone. Elliptic Curve Systems. Proposed IEEE P1363 standard, 1995, pp. 1-42.
10. Caelli, William J., Edward P. Dawson, and Scott A. Rea. PKI, elliptic curve cryptography, and digital signatures. Computers and Security 18.1 (1999): pp. 47-66.
11. Bi, Wei, Xiaoyun Jia, and Maolin Zheng. A Secure Multiple Elliptic Curves Digital Signature Algorithm for Blockchain. arXiv preprint arXiv:1808.02988 (2018).
12. Long, Tao, and Xiaoxia Liu. Two Improvements to Digital Signature Scheme Based on the Elliptic Curve Cryptosystem. Proceedings. The 2009 International Workshop on Information Security and Application (IWISA 2009). Academy Publisher, 2009.
13. Miller V. S., Use of elliptic curves in cryptography. In Advances in Cryptology-CRYPTO’85, Santa Barbara, CA, 1985, Lecture Notes in Comput. Sci., 218, Springer-Verlag, Berlin, (1986), 417–426.
14. Vanstone S. A., Responses to NIST’s proposal. Commun. ACM, 35, (1992), pp. 50–52.