A new key protocol design for cryptocurrency wallet

The majority of hacking accidents in cryptocurrency occur when the information of a cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key storage, when connecting to a transaction network, it is vulnerable for a key theft. Blockchain is not traceable, but it shoul...

Full description

Bibliographic Details
Main Author: Soonhwa Sung
Format: Article
Language:English
Published: Elsevier 2021-09-01
Series:ICT Express
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2405959521000904
id doaj-dc58d1e6170b4b8287b600733519e2cd
record_format Article
spelling doaj-dc58d1e6170b4b8287b600733519e2cd2021-09-25T05:09:20ZengElsevierICT Express2405-95952021-09-0173316321A new key protocol design for cryptocurrency walletSoonhwa Sung0Creative Fusion Education Department, Chungbuk National university, Cheongju, Republic of KoreaThe majority of hacking accidents in cryptocurrency occur when the information of a cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key storage, when connecting to a transaction network, it is vulnerable for a key theft. Blockchain is not traceable, but it should communicate to applicate data of blockchain. To communicate to applicate data of blockchain, this study proposes a key protocol design to secure cryptocurrency transactions for user privacy of cryptocurrency to resolve the drawback of decentralized exchange.The key protocol includes a session key for a blockchain data structure and the Federated Byzantine Agreement (FBA) for the key-exchange agreement among users. In F-measure model, the values of Key Cluster Mode, Test Session key Mode and Original Session key Mode resulted in True Positive Ratio greater than 0.5 and False Positive Ratio lesser than 0.5. Therefore, the key protocol model has optimal security. In addition, computation costs of the protocol improve by compared with former studies. It may be played an important role in the cryptocurrency hacking accident and supported robust cryptocurrency market The study guarantees the security of cryptocurrency users without decentralized exchange, and it is scalable to other areas by using secure distributed networks.http://www.sciencedirect.com/science/article/pii/S2405959521000904Cryptocurrency walletKey protocolBlockchain
collection DOAJ
language English
format Article
sources DOAJ
author Soonhwa Sung
spellingShingle Soonhwa Sung
A new key protocol design for cryptocurrency wallet
ICT Express
Cryptocurrency wallet
Key protocol
Blockchain
author_facet Soonhwa Sung
author_sort Soonhwa Sung
title A new key protocol design for cryptocurrency wallet
title_short A new key protocol design for cryptocurrency wallet
title_full A new key protocol design for cryptocurrency wallet
title_fullStr A new key protocol design for cryptocurrency wallet
title_full_unstemmed A new key protocol design for cryptocurrency wallet
title_sort new key protocol design for cryptocurrency wallet
publisher Elsevier
series ICT Express
issn 2405-9595
publishDate 2021-09-01
description The majority of hacking accidents in cryptocurrency occur when the information of a cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key storage, when connecting to a transaction network, it is vulnerable for a key theft. Blockchain is not traceable, but it should communicate to applicate data of blockchain. To communicate to applicate data of blockchain, this study proposes a key protocol design to secure cryptocurrency transactions for user privacy of cryptocurrency to resolve the drawback of decentralized exchange.The key protocol includes a session key for a blockchain data structure and the Federated Byzantine Agreement (FBA) for the key-exchange agreement among users. In F-measure model, the values of Key Cluster Mode, Test Session key Mode and Original Session key Mode resulted in True Positive Ratio greater than 0.5 and False Positive Ratio lesser than 0.5. Therefore, the key protocol model has optimal security. In addition, computation costs of the protocol improve by compared with former studies. It may be played an important role in the cryptocurrency hacking accident and supported robust cryptocurrency market The study guarantees the security of cryptocurrency users without decentralized exchange, and it is scalable to other areas by using secure distributed networks.
topic Cryptocurrency wallet
Key protocol
Blockchain
url http://www.sciencedirect.com/science/article/pii/S2405959521000904
work_keys_str_mv AT soonhwasung anewkeyprotocoldesignforcryptocurrencywallet
AT soonhwasung newkeyprotocoldesignforcryptocurrencywallet
_version_ 1717369019379482624