Establishing security of Bitcoins using elliptic-curve cryptography-based protocol Online publication date: Wed, 12-May-2021
by Dilbag Singh
International Journal of Internet Technology and Secured Transactions (IJITST), Vol. 11, No. 3, 2021
Abstract: It is undeniable that the growth of the computer and network security is repeatedly increased since the past 40 years. In 1985-1986 encryption was applied as a primary technique for providing security. Network security technology includes authentication and authorisation, data encryption, access control and security auditing. Bitcoin is presently one of the most popular crypto-currencies. The phenomenon of Bitcoin crypto-currencies is based on the public key cryptography and peer to peer network. In the Bitcoin, blockchain is used for storage of the transaction which is also called the public ledger. Digital money or Bitcoin is used in day to day activities, some of which are illicit and illegal. In this paper, the main area is security, i.e., the main focus here is to protect Bitcoin systems from unauthorised access and from various threats using an appropriate scheme (elliptic-curve cryptography, ECC) protocol.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Internet Technology and Secured Transactions (IJITST):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com