2020
DOI: 10.3390/math8010131
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Cryptographic Tools for Blockchain and Bitcoin

Abstract: Blockchain is one of the most interesting emerging technologies nowadays, with applications ranging from cryptocurrencies to smart contracts. This paper presents a review of the cryptographic tools necessary to understand the fundamentals of this technology and the foundations of its security. Among other elements, hash functions, digital signatures, elliptic curves, and Merkle trees are reviewed in the scope of their usage as building blocks of this technology.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 33 publications
(19 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…The first transaction in the blockchain is saved in Block-1 and is executed by the smart contract algorithm. The block header of block-1 is hash (SHA256 or SHA 512) of all the data available in block 0 as shown by the hash pointer [8]. Similarly, the block header of block2 has the hash of the entire block-1.…”
Section: Proposed Methods Of Ipowercoin Generationmentioning
confidence: 99%
“…The first transaction in the blockchain is saved in Block-1 and is executed by the smart contract algorithm. The block header of block-1 is hash (SHA256 or SHA 512) of all the data available in block 0 as shown by the hash pointer [8]. Similarly, the block header of block2 has the hash of the entire block-1.…”
Section: Proposed Methods Of Ipowercoin Generationmentioning
confidence: 99%
“…Fundamentally, two kinds of cryptographic algorithms are used in blockchains. The first one is known as asymmetric or public-key cryptography [46], and the second one is called hashing [47] both of which are elaborated further in this section.…”
Section: Effect Of Blockchain's Primary Cryptography On Privacymentioning
confidence: 99%
“…That individual will digitally sign the final hash pointer of the chain, and will make it publicly available. The digital signature is the procedure that allows to assure that a piece of data comes from the legitimate sender [40,41]. Changes in the transactions that have already been integrated into the blockchain will be detected, as it will affect the successive blocks of the data chain.…”
Section: Blockchain Distributed System For Tracking the Supply Chainmentioning
confidence: 99%
“…Every internal block has the same structure, including a header containing the block version (which imply the set of rules to be followed), the parent block hash (a hash value that points to the previous block, typically performed with the SHA-256 function), the Merkle tree root (as the hash value of all the transactions in the block), a timestamp, and a nonce (a number used only once) [40]. In turn, the body of the block is composed by a transaction counter and one or more transactions [44].…”
Section: Blockchain Distributed System For Tracking the Supply Chainmentioning
confidence: 99%