• Corpus ID: 13919592

ECDSA Security in Bitcoin and Ethereum : a Research Survey

@inproceedings{Mayer2016ECDSASI,
  title={ECDSA Security in Bitcoin and Ethereum : a Research Survey},
  author={Hartwig und Paola Mayer},
  year={2016}
}
  • H. Mayer
  • Published 2016
  • Computer Science, Mathematics
This survey discusses the security level of the signature scheme implemented in Bitcoin and Ethereum. 

Tables from this paper

Bitcoin security with a twisted Edwards curve

It is shown that Bitcoin is more secure and more efficient with the digital signature algorithm Ed25519 and the twisted Edwards curve CurveEd25519.

A Survey on Efficient and Secure Implementation of ECDSA against Fault Attack

  • J. Kaushalya
  • Computer Science, Mathematics
    International Journal of Emerging Trends in Engineering Research
  • 2020
A precise and complete review of an update of the Elliptic Curve Digital Signature (ECDSA) algorithm and fault attack and its countermeasures and describes about the future work to be done are presented.

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

A comprehensive survey of an update of the ECDSA algorithm in terms of performance, security, and applications is presented.

Post quantum identity authentication mechanism in blockchain

An identity based post quantum authentication system applicable to the blockchain, which provides anti quantum protection and eliminates the dependence on public key certificates is considered.

Ethereum Transactions and Smart Contracts among Secure Identities

This paper solves the limitation of the current Blockchains by integrating Public Digital Identity with Ethereum via Identity-Based-Encryption (IBE), and shows that it does not require additional trust w.r.t. that necessary for IBE and Public Digital identity systems.

A Survey on the Security of Blockchain Systems

Security Assessment of Authentication and Authorization Mechanisms in Ethereum, Quorum, Hyperledger Fabric and Corda

A general threat model for blockchain authentication and authorization schemes and assess the security of each platform with regard to this model is defined and hardening guidelines are provided in order to help users prevent the stated vulnerabilities when possible.

Efficient Blockchain System based on Proof of Segmented Work

This work proposes a system (FaircoinBD) where the focus on reducing energy consumption by limiting participation, increasing propagation speed and fair reward distribution, and compared it with Bitcoin and Ether in terms of energy consumption.

Security on Blockchain Technology

This paper provides an overview of BC security, starting with the basics of BC technology, and gives the primary BC security attacks and the BC countermeasures.

Novel Method for Handling Ethereum Attack

Ethereum, a leading block chain, is considered and the current approach is compared against a novel approach providing a security and scaling solution, which helps safe guard block chain projects, making them safer and chain agnostic.
...

References

SHOWING 1-10 OF 20 REFERENCES

Elliptic Curve Cryptography in Practice

It is found that despite the high stakes of money, access and resources protected by ECC, implementations suffer from vulnerabilities similar to those that plague previous cryptographic systems.

ECDSA Key Extraction from Mobile Devices via Nonintrusive Physical Side Channels

We show that elliptic-curve cryptography implementations on mobile devices are vulnerable to electromagnetic and power side-channel attacks. We demonstrate full extraction of ECDSA secret signing

High-speed high-security signatures

This paper shows that a $390 mass-market quad-core 2.4GHz Intel Westmere (Xeon E5620) CPU can create 109000 signatures per second and verify 71000 signatures per second on an elliptic curve at a 2128

Guide to Elliptic Curve Cryptography

This guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment, as well as side-channel attacks and countermeasures.

How to manipulate curve standards: a white paper for the black hat

This paper analyzes the cost of breaking ECC under the following assumptions: (1) ECC is using a standardized elliptic curve that was actually chosen by an attacker; (2) the attacker is aware of a

Recent progress on the elliptic curve discrete logarithm problem

We survey recent work on the elliptic curve discrete logarithm problem. In particular we review index calculus algorithms using summation polynomials, and claims about their complexity.

Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms

A new method for accelerating this operation on classes of elliptic curves that have efficiently-computable endomorphisms is described, applicable to a larger class of curves than previous such methods.

Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves

This work gives detailed implementation results which show that the Gallant–Lambert–Vanstone method for elliptic curve point multiplication on general curves runs in between 0.70 and 0.83 the time of the previous best methods.

Elliptic Curves: Number Theory and Cryptography

This book discusses Elliptic Curve Cryptography, a Cryptosystem Based on Factoring and its Applications, and some of the techniques used to develop such systems.

Four-Dimensional Gallant–Lambert–Vanstone Scalar Multiplication

Two implementations of the merged GLV–GLS approach improve the state-of-the-art performance of scalar multiplication on elliptic curves over large prime characteristic fields for a variety of scenarios including side-channel protected and unprotected cases with sequential and multicore execution.