2020
DOI: 10.1088/1757-899x/928/3/032022
|View full text |Cite
|
Sign up to set email alerts
|

An Improvement of ECDSA Weak Randomness in Blockchain

Abstract: Blockchain technology has already changed industry and commercial enterprises remarkably. It is the underlying mechanism of a very well-known cryptocurrencies such as Bitcoin and Ethereum, and many other business applications. Therefore, its security draws the researchers’ attention more and more recently. One of Blockchain vulnerabilities is caused by weak randomness in ECDSA. A random number is not secure, cryptographically, which leads to a leakage in private key and even the user’s fund theft. As well the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 7 publications
0
6
0
Order By: Relevance
“…A finite group is one that contains a limited numbers of items depending on the order of group (G). From a set of group G with the binary operation we can form the Abelian group * : G × G → G .An elliptic curve equation for real number called Weierstrass equations [12] . As shown in figure 1:…”
Section: Arithmetic Background Of Elliptic Curvementioning
confidence: 99%
“…A finite group is one that contains a limited numbers of items depending on the order of group (G). From a set of group G with the binary operation we can form the Abelian group * : G × G → G .An elliptic curve equation for real number called Weierstrass equations [12] . As shown in figure 1:…”
Section: Arithmetic Background Of Elliptic Curvementioning
confidence: 99%
“…The theoretical analysis proves that the random integer decomposition into two integers couldn't throw out the random integer reusing weakness, since this Scheme leads to retrieving the private key when used twice. Nisreen T. Hussein [16] proposed using a double elliptic curve's (EC) private key, that yields to generate double public keys for each user. In another word, by modifying the standard ECC's encryption parameters by selecting double private keys, and calculating double public keys, this method resolved the reused of random selection integers in ECDSA, but doubly public keys by performing additional point multiplication operations could be made the execution time worse.…”
Section: Related Workmentioning
confidence: 99%
“…As mentioned in sec.2, there are three research works [11,15,16], that proposed a modification to the standard ECSDA, these modifications are made to improve the run time efficiency, or to reduce the probability of the private key steal. The theoretical analysis for these modifications has been proven weakness points also.…”
Section: Performance and Security Comparisonsmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, it is needed to modify the ECDSA algorithm. In 2020, Hussein and Kashmar modified ECDSA by using two private keys 𝑑 1 and 𝑑 2 [6]. Later on, in 2021, Liu, Chen, and Liu modified ECDSA by using two random number 𝑘 and 𝑘 1 [7].…”
Section: Introductionmentioning
confidence: 99%