2021
DOI: 10.1109/access.2021.3082704
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Double Parameter Elliptic Curve Digital Signature Algorithm for Blockchain

Abstract: The classic Elliptic curve digital Signature Algorithm (ECDSA) uses one inversion operation in the process of signature and verification, which greatly reduces the efficiency of digital signatures. Up to now, most research schemes improve efficiency by reducing reverse operations, but they fail to attach importance to such issues as forgery signature attack. At the same time, in the blockchain, the weak randomness of ECDSA will lead to the attack of forging random numbers, which is a potential problem of digit… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 19 publications
0
7
0
Order By: Relevance
“…In [14], Thomas pronin suggests deterministic methods to calculate ๐‘˜ for each transaction rather than choice randomly, the deterministic scheme, in a specific aspect, depends on the hash value of the message, so this solution considered specific applications, such as Bitcoin, and there are no guarantees to apply it in different applications such as applications that involves a lot of messages sent as control signals, for example, when user object request some critical information from temperature sensor, by sending constant queries message as a remotecontrol . SHUANG-GEN LIU [15] signature creation phase, one of them used to generate a digital signature, and another used in the verification procedure, also, this proposed eliminating the modular inverse calculation in signature and verification phases to decreases the algorithm's complexity and enhance its run time. The theoretical analysis proves that the random integer decomposition into two integers couldn't throw out the random integer reusing weakness, since this Scheme leads to retrieving the private key when used twice.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [14], Thomas pronin suggests deterministic methods to calculate ๐‘˜ for each transaction rather than choice randomly, the deterministic scheme, in a specific aspect, depends on the hash value of the message, so this solution considered specific applications, such as Bitcoin, and there are no guarantees to apply it in different applications such as applications that involves a lot of messages sent as control signals, for example, when user object request some critical information from temperature sensor, by sending constant queries message as a remotecontrol . SHUANG-GEN LIU [15] signature creation phase, one of them used to generate a digital signature, and another used in the verification procedure, also, this proposed eliminating the modular inverse calculation in signature and verification phases to decreases the algorithm's complexity and enhance its run time. The theoretical analysis proves that the random integer decomposition into two integers couldn't throw out the random integer reusing weakness, since this Scheme leads to retrieving the private key when used twice.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned in sec.2, there are three research works [11,15,16], that proposed a modification to the standard ECSDA, these modifications are made to improve the run time efficiency, or to reduce the probability of the private key steal. The theoretical analysis for these modifications has been proven weakness points also.…”
Section: Performance and Security Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…At the same time, the author also proposes a method of using smart contract to manage and track transactions initiated by participants participating in DTS creation. Liu et al [25] constructed an improved provably secure elliptic curve digital signature scheme to solve the problem that the weak randomness of elliptic curve digital signature algorithm (ECDSA) in blockchain technology will lead to the attack of forging random numbers. Firstly, two parameters are introduced into the scheme, which can effectively resist the weak randomness attack of Bitcoin ECDSA; Secondly, the scheme uses the Hamming weight of Hash function instead of Hash value to sign, which avoids the inverse operation in the signing and verification stage.…”
Section: Blockchain and Digital Twins Techniquementioning
confidence: 99%
“…In 2020, Hussein and Kashmar modified ECDSA by using two private keys ๐‘‘ 1 and ๐‘‘ 2 [6]. Later on, in 2021, Liu, Chen, and Liu modified ECDSA by using two random number ๐‘˜ and ๐‘˜ 1 [7].…”
Section: Introductionmentioning
confidence: 99%