Enhancement of digital signature algorithm in bitcoin wallet

نویسندگان

چکیده

Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on Elliptic Curve Digital Signature Algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety security of bitcoin wallets. In this paper, secure key management was designed based several changes parts. cold wallet, we employed an image-based passphrase achieve strong entropy source master seed. The hot proposed key_ Gen algorithm modifying generation step ECDSA that it generate fresh pair at each transaction. final part ensures recovering all keys both wallets without daily backups case losing wallet. findings prove resisting against dictionary attack overcoming memorizing problem. model acquires good anonymity privacy users by eliminating likability additional execution time signing is~70 millisecond, which then important domain.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

BlueWallet: The Secure Bitcoin Wallet

With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin priva...

متن کامل

A Blind-Mixing Scheme for Bitcoin based on an Elliptic Curve Cryptography Blind Digital Signature Algorithm

To strengthen the anonymity of Bitcoin, several centralized coin-mixing providers (mixers) such as BitcoinFog.com, BitLaundry.com, and Blockchain.info assist users to mix Bitcoins through CoinJoin transactions with multiple inputs and multiple outputs to uncover the relationship between them. However, these mixers know the output address of each user, such that they cannot provide true anonymit...

متن کامل

Design of Proxy Signature in the Digital Signature Algorithm (DSA)

The use of proxy signature has attracted considerable attention and has been deployed in many applications. Unfortunately, most of the proxy signature schemes, which have been proposed up to now, are not based on standard signature such as Digital Signature Algorithm (DSA). Consequently, those proposals have inevitably been considered infeasible because of obvious security weaknesses so they su...

متن کامل

Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)

This document defines a deterministic digital signature generation procedure. Such signatures are compatible with standard Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) digital signatures and can be processed with unmodified verifiers, which need not be aware of the procedure described therein. Deterministic signatures retain the cryptographic security...

متن کامل

Implementation of Elliptic Curve Digital Signature Algorithm

The Elliptic Curve Digital Signature Algorithm (ECDSA) is the elliptic curve analogue of the Digital Signature Algorithm (DSA). It was accepted in 1999 as an ANSI standard, and was accepted in 2000 as IEEE and NIST standards. It was also accepted in 1998 as an ISO standard, and is under consideration for inclusion in some other ISO standards. Unlike the ordinary discrete logarithm problem and t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Bulletin of Electrical Engineering and Informatics

سال: 2021

ISSN: ['2302-9285']

DOI: https://doi.org/10.11591/eei.v10i1.2339