A new key protocol design for cryptocurrency wallet
The majority of hacking accidents in cryptocurrency occur when the information of a cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key storage, when connecting to a transaction network, it is vulnerable for a key theft. Blockchain is not traceable, but it shoul...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
Elsevier
2021-09-01
|
Series: | ICT Express |
Subjects: | |
Online Access: | http://www.sciencedirect.com/science/article/pii/S2405959521000904 |
id |
doaj-dc58d1e6170b4b8287b600733519e2cd |
---|---|
record_format |
Article |
spelling |
doaj-dc58d1e6170b4b8287b600733519e2cd2021-09-25T05:09:20ZengElsevierICT Express2405-95952021-09-0173316321A new key protocol design for cryptocurrency walletSoonhwa Sung0Creative Fusion Education Department, Chungbuk National university, Cheongju, Republic of KoreaThe majority of hacking accidents in cryptocurrency occur when the information of a cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key storage, when connecting to a transaction network, it is vulnerable for a key theft. Blockchain is not traceable, but it should communicate to applicate data of blockchain. To communicate to applicate data of blockchain, this study proposes a key protocol design to secure cryptocurrency transactions for user privacy of cryptocurrency to resolve the drawback of decentralized exchange.The key protocol includes a session key for a blockchain data structure and the Federated Byzantine Agreement (FBA) for the key-exchange agreement among users. In F-measure model, the values of Key Cluster Mode, Test Session key Mode and Original Session key Mode resulted in True Positive Ratio greater than 0.5 and False Positive Ratio lesser than 0.5. Therefore, the key protocol model has optimal security. In addition, computation costs of the protocol improve by compared with former studies. It may be played an important role in the cryptocurrency hacking accident and supported robust cryptocurrency market The study guarantees the security of cryptocurrency users without decentralized exchange, and it is scalable to other areas by using secure distributed networks.http://www.sciencedirect.com/science/article/pii/S2405959521000904Cryptocurrency walletKey protocolBlockchain |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Soonhwa Sung |
spellingShingle |
Soonhwa Sung A new key protocol design for cryptocurrency wallet ICT Express Cryptocurrency wallet Key protocol Blockchain |
author_facet |
Soonhwa Sung |
author_sort |
Soonhwa Sung |
title |
A new key protocol design for cryptocurrency wallet |
title_short |
A new key protocol design for cryptocurrency wallet |
title_full |
A new key protocol design for cryptocurrency wallet |
title_fullStr |
A new key protocol design for cryptocurrency wallet |
title_full_unstemmed |
A new key protocol design for cryptocurrency wallet |
title_sort |
new key protocol design for cryptocurrency wallet |
publisher |
Elsevier |
series |
ICT Express |
issn |
2405-9595 |
publishDate |
2021-09-01 |
description |
The majority of hacking accidents in cryptocurrency occur when the information of a cryptocurrency wallet is stolen. Since the cryptocurrency wallet is simply used for a key storage, when connecting to a transaction network, it is vulnerable for a key theft. Blockchain is not traceable, but it should communicate to applicate data of blockchain. To communicate to applicate data of blockchain, this study proposes a key protocol design to secure cryptocurrency transactions for user privacy of cryptocurrency to resolve the drawback of decentralized exchange.The key protocol includes a session key for a blockchain data structure and the Federated Byzantine Agreement (FBA) for the key-exchange agreement among users. In F-measure model, the values of Key Cluster Mode, Test Session key Mode and Original Session key Mode resulted in True Positive Ratio greater than 0.5 and False Positive Ratio lesser than 0.5. Therefore, the key protocol model has optimal security. In addition, computation costs of the protocol improve by compared with former studies. It may be played an important role in the cryptocurrency hacking accident and supported robust cryptocurrency market The study guarantees the security of cryptocurrency users without decentralized exchange, and it is scalable to other areas by using secure distributed networks. |
topic |
Cryptocurrency wallet Key protocol Blockchain |
url |
http://www.sciencedirect.com/science/article/pii/S2405959521000904 |
work_keys_str_mv |
AT soonhwasung anewkeyprotocoldesignforcryptocurrencywallet AT soonhwasung newkeyprotocoldesignforcryptocurrencywallet |
_version_ |
1717369019379482624 |