Title: Establishing security of Bitcoins using elliptic-curve cryptography-based protocol

Authors: Dilbag Singh

Addresses: Indian Institute of Management Amritsar, Punjab, 143105, India

Abstract: It is undeniable that the growth of the computer and network security is repeatedly increased since the past 40 years. In 1985-1986 encryption was applied as a primary technique for providing security. Network security technology includes authentication and authorisation, data encryption, access control and security auditing. Bitcoin is presently one of the most popular crypto-currencies. The phenomenon of Bitcoin crypto-currencies is based on the public key cryptography and peer to peer network. In the Bitcoin, blockchain is used for storage of the transaction which is also called the public ledger. Digital money or Bitcoin is used in day to day activities, some of which are illicit and illegal. In this paper, the main area is security, i.e., the main focus here is to protect Bitcoin systems from unauthorised access and from various threats using an appropriate scheme (elliptic-curve cryptography, ECC) protocol.

Keywords: Bitcoin; blockchain; cryptography; network security; AVISPA; crypto-currency; elliptic-curve cryptography; ECC.

DOI: 10.1504/IJITST.2021.114927

International Journal of Internet Technology and Secured Transactions, 2021 Vol.11 No.3, pp.209 - 240

Received: 16 Feb 2019
Accepted: 22 Dec 2019

Published online: 12 May 2021 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article