2016
DOI: 10.1007/s10207-016-0325-1
|View full text |Cite
|
Sign up to set email alerts
|

Two-factor authentication for the Bitcoin protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(16 citation statements)
references
References 16 publications
0
16
0
Order By: Relevance
“…Bos et al (2014) stated that the use of elliptic curve cryptography (ECC), which is used to derive Bitcoin addresses to users, is insufficient and does not have the required randomness. Mann & Loebenberger (2017) suggested two-factor authentication for a Bitcoin wallet. Lim et al (2014) analyzed the trend of security breaches in Bitcoin and their countermeasures.…”
Section: Blockchain Taxonomymentioning
confidence: 99%
“…Bos et al (2014) stated that the use of elliptic curve cryptography (ECC), which is used to derive Bitcoin addresses to users, is insufficient and does not have the required randomness. Mann & Loebenberger (2017) suggested two-factor authentication for a Bitcoin wallet. Lim et al (2014) analyzed the trend of security breaches in Bitcoin and their countermeasures.…”
Section: Blockchain Taxonomymentioning
confidence: 99%
“…A two-factor authentication is considered to be the leading method for strengthening authentication. For bitcoin, the two-party signature protocol by ECDSA can be used for authentication ( Figure 3) [31,32]. Nonetheless, even the bitcoin core software, which must be more reliable than anything, is not free from the problem of software malfunction such as bug.…”
Section: Authenticationmentioning
confidence: 99%
“…A two-factor authentication is considered to be the leading method for strengthening authentication. For bitcoin, the two-party signature protocol by ECDSA can be used for authentication (Figure 3) [31,32]. …”
Section: Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…Two-influence verification is thought to remain the main strategy for reinforcing verification. Aimed at bitcoin, the 2-party moniker convention by ECDSA container can utilized aimed at verification (Figure 3.8) [31,32]. …”
Section: Confirmationmentioning
confidence: 99%