Please use this identifier to cite or link to this item: http://ir.futminna.edu.ng:8080/jspui/handle/123456789/18041
Title: Comparative Analysis of Classical and Post-quantum Digital Signature Algorithms used in Bitcoin transactions
Authors: Noel, M. D.
Waziri, V.O.
Abdulhmid, S. M.
Ojeniyi, Joseph Adebayo
Okoro, M.U.
Keywords: Post-Quantum Cryptography Cryptocurrency Security Hash-based Signatures
Issue Date: 2020
Publisher: 2020 International Conference on Computer and Information Sciences (ICCIS), IEEE Conference, Jouf University, Aljouf
Citation: DOI: 10.1109/ICCIS49240.2020.9257656
Abstract: The use of public key cryptosystems ranges from securely encrypting bitcoin transactions and creating digital signatures for non-repudiation. The cryptographic systems security of public key depends on the complexity in solving mathematical problems. Quantum computers pose a threat to the current day algorithms used. This research presents analysis of two Hash-based Signature Schemes (MSS and W-OTS) and provides a comparative analysis of them. The comparisons are based on their efficiency as regards to their key generation, signature generation and verification time. These algorithms are compared with two classical algorithms (RSA and ECDSA) used in bitcoin transaction security. The results as shown in table II indicates that RSA key generation takes 0.2012s, signature generation takes 0.0778s and signature verification is 0.0040s. ECDSA key generation is 0.1378s, signature generation takes 0.0187s, and verification time for the signature is 0.0164s. The W-OTS key generation is 0.002s. To generate a signature in W-OTS, it takes 0.001s and verification time for the signature is 0.0002s. Lastly MSS Key generation, signature generation and verification has high values which are 16.290s, 17.474s, and 13.494s respectively. Based on the results, W-OTS is recommended for bitcoin transaction security because of its efficiency and ability to resist quantum computer attacks on the bitcoin network.
URI: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/18041
Appears in Collections:Cyber Security Science



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.