Quick viewing(Text Mode)

Blockchain Is the Promising Technology in the Next Decade With

Blockchain Is the Promising Technology in the Next Decade With

Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). DVD Part Number: CFP21ONG-DVD, 978-0-7381-1182-7

Mr. Shaik Johny Basha Mr. Venkata Srinivasu Veesam Ms. Tamminina Ammannamma Department of CSE Department of IT Department of IT Lakireddy Bali Reddy College of RVR & JC College of Engineering (A), Sridevi Women's Engineering College, Engineering (A), Chandramoulipuram, Vattinagulapally, Near Gandipet, Mylavaram, Krishna Dt., Chowdavaram, Guntur Dt., Rangareddy Dt., Andhra Pradesh, India 521230 Andhra Pradesh, India 522019 Telangana, India 500075 [email protected] [email protected] [email protected]

Ms. Sirisha Navudu Mr. M.V.V.S. Subrahmanyam Department of CSE, Department of IT Sridevi Women's Engineering College, Sasi Institute of Technology and Vattinagulapally, Near Gandipet, Engineering (A), Rangareddy Dt., Tadepalligudem, West Godavari Dt., Telangana, India 500075 Andhra Pradesh, India 534101 [email protected] [email protected]

Abstract Blockchain will be the most used technology in transactions and become a validator also [4]. But they must the next decade with the key features of distributed ledger and maintain their Work Proof and Stake Proof for security and high security. To provide security in the transactions process of incentivize their work. Ethereum and Bitcoin falls under this hashing, blockchain technology was using the category [7]. Algorithm (ECDSA). Using the ECDSA Algorithm, if any error has happened, this may lead to identify ii. Private blockchains: Blockchains with various restrictions the private key value that which can acquire matching like permission, valid id, valid credentials, etc., for access, is signatures for various documents. To avoid that problem, we known as Private Blockchains. These blockchains use a suggest using the Edwards-curve Digital Signature Algorithm technology named Distributed Ledger for maintaining the (EdDSA) Algorithm in generating the hash functions among the transactions, which provides the high-level speed, getting the decentralized peer-to-peer database. Hyperledger and best performance, and independence in generating the random Multichain projects such as Fabric, Sawtooth and Corda falls number. Our suggestion provides improved security while under this category [7]. compared to the ECDSA Algorithm. iii. Hybrid blockchains: Blockchains that are a combination Keywords Blockchain, ECDSA, EdDSA, private key, of centralization and decentralization of databases and their hashing, distributed ledger, high security, high speed, and features are called Hybrid Blockchain [6]. These blockchains performance working nature depends on which part of the centralization and decentralization is used. The best example of this I. INTRODUCTION blockchain is Dragonchain [7]. Blockchain is the promising technology in the next decade iv. Consortium blockchains: Blockchains that are the semi- with the most advanced features like decentralization, high centralized type of features are known as Consortium security, transparency in transfer, public and digitalized ledger [1], etc. A chain of an increasing list of records or files is called Blockchain. Also, these blockchains are maintained by more blocks linked to various techniques. than one organization, which are used by banks, government sectors, etc. Mostly this blockchain was used by Energy Web Blocks contain various batches of valid transactions [2], Foundation and R3 [7]. which are hashed using cryptographic algorithms and form chains. The above-said process will be repeated multiple B. Working of Blockchain: times and confirms the previous block's integrity [3]. In fig. 1 [8], given by Investopedia, there is a clear explanation of how the blockchain for bitcoin works. A. Types of Blochchain Networks: Initially, it will start the transaction to operate. It will send As blocks are connected and form like a chain, they may that transaction through a peer-to-peer network, which is be called a network. In this view, at present, there are 4 scattered across the world. Then using the cryptographic different forms of block-chain networks. algorithms such as DSA or RSA or ECDSA or any other for i. Public block chains validating whether the transaction is valid or not. This is known as Hashing, which can be done using various ii. Private block chains cryptographic transformations such as Digital Signature iii. Hybrid block chains Algorithms. Whenever the transaction is validated, they will be iv. Consortium block chains clustered as blocks. Those blocks will then have chained each i. Public blockchains: Blockchains that does not have any other by making all their transactions/history into an available restriction over access is known as Public Blockchains. The ledger for future references. Once it is added, it will be tough persons who have an internet connection may send the

978-0-7381-1183-4/21/$31.00 ©2021 IEEE 1302 Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). DVD Part Number: CFP21ONG-DVD, 978-0-7381-1182-7 to go back and change/edit/deleting the block's contents vii. Rapid Digital Signature unless the majority reached a consensus to do so. viii. GMR Algorithm Due to the hash code's mathematical nature that turns info ix. into a sequence of numerical and alphabets, if there is any x. EdDSA (Edwards-curve Digital Signature Algorithm) change in that block's information, automatically, the hash xi. NTRU Sign code of the block also changes. xii. Undeniable signatures E. Types of Digital Signature Schemes: In this part, a brief description of various digital signature schemes available in the current situation are given: i. Batch Signature Scheme [12] ii. Forward Secure Signature Scheme [13] iii. Blind Signature Scheme [14] iv. Proxy Signature Scheme [15] v. Aggregate Signature Scheme [16] vi. Ring Signature Scheme [17] Our paper is organized as follows: Section II of our paper depicts the different authors' related work. Section III focuses primarily on the EdDSA Algorithm in Blockchain System.

Fig. 1: Working of Blockchain in BitCoin given by Investopedia Section IV gives the analytical results of how our suggested technique works, and finally, a conclusion at the end of the

C. Digital Signature: paper has been discussed. Digital Signature (DS) is a method for verifying and validating the message's originality or a document by II. RELATED WORK providing the integrity, authentication, and non-repudiation In this section, work done by various authors in this area [9]. has been discussed. Authenticity is the key feature in cryptography to prove Authors [18] have presented the ECDSA Signing protocol the identity of the user. These digital signatures work based that provides fast key distribution and signing process. They on public and private keys along with hash functions. The presented an approach, i.e., full threshold ECDSA signing working of digital signatures is shown in fig. 2 [10]. protocol, which has the practically distributed key generation for smaller parties. They have achieved this with the replacement of Paillier additively homomorphic encryption with exponent . Sahoo et al. [19] have presented a blockchain-based framework secured by ECDSA for counterfeiting the drugs. Their work was carried out as the flow or supply chain management in drug transportation without any counterfeits. They have achieved a good result with the help of ECDSA but created a low impact on the fast processing of a transaction. Dalskov et al. [20], in their work, have achieved DNSSEC keys via Threshold ECDSA. Their work showed the techniques of protecting the keys by not revealing the signing keys and protecting the DNS operators' operational integrity.

Fig. 2: Working of Digital Signature Their work purely focused on DNS Management and a generic technique that was obtained by threshold ECDSA D. Types of Digital Signature Algorithms: protocol. Digital Signatures are mostly used to implement the e- Castagnos et al. [21], in their work, have defined ECDSA signatures by employing asymmetric or public key as widely adopted signature form. But most of the variants of cryptography. Digital Signatures will provide the non- this ECDSA are very hard to attain and they do not have any repudiation, and some of the non-repudiation schemes will proof for their knowledge to handle with hateful opponents. make timestamps available for each signature by making the s solution by using the signature valid after exposing the private key [11]. Hash Proof Systems and got good results. The following are the various digital signature algorithms Ring Signature Scheme: Ring Signature primarily focuses on / techniques: the digital signature, where the signature can be done by any i. RSA (Rivest Shamir Adleman) Algorithm member from the related group of users [24] who are having ii. DSA (Digital Signature Algorithm) the keys. One of the key advantages with this scheme is that iii. ElGamal Encryption System who done the signature is unknown and not possible to iv. ECDSA (Elliptic Curve Digital Signature Algorithm) identify. v. GOST R 34.10 2012 The main problem with the Ring Signature Scheme is vi. Algorithm Key Exposure Problem. In this scheme, if the private key of

978-0-7381-1183-4/21/$31.00 ©2021 IEEE 1303 Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). DVD Part Number: CFP21ONG-DVD, 978-0-7381-1182-7 the user has been identified by adversary, then the adversary the signature as (A, B). After that, the verifier will be can have the ability to generate digital signature for any eventually verified for B * Y = A+ k * X, whether the result document in that chain [25]. Also, that adversary can sign any is true or not. number of documents in the chain on behalf of the set of users Process Flow: or team members. This scheme will worsen the security of a Start of Transaction digital signature if the key is exposed to adversary. Still if Ring Signature Scheme is used, then avoid the above said problem when it is used by any other key schemes Initialization of Transaction [25] such as Forward Secure Ring Signature, Key-Insulated Ring Signature, etc.

III. METHODOLOGY Message considered for Digital Signature will provide a path to authorize and signing purpose integrate only the correct and genuine persons to do the transaction. Hashing is the process of transforming the input of types i.e., letters and numbers into an encrypted output, which is of Encrypting the transaction with SHA-512 a fixed length. This hashing can be done using the cryptographic algorithms available in the current scenario [8]. In blockchain system, hashing provides a place for everyone on that network for agreeing the current state of the Generating the Collision transaction. resilience Hash Function At present situation of blockchain system, Elliptical Curve Digital Signature Algorithm (ECDSA) is used as a digital signature for transaction authentication. But the ECDSA purely and heavily relies on the point multiplication. Sending the Transaction This is creating a problem when if an error is happened while this operation, it is giving the possibility of selecting a private key [22]. This is causing the performance of the system to Approval of the work rigorously and numerous computations must be done to Transaction by Receiver get the private key. To avoid these problems, we suggest the usage of EdDSA Fig. 3: Workflow of our methodology instead of the ECDSA to avoid the multiple computations and As shown in fig. 3, workflow from starting to the making the digital signature very easily. This EdDSA approval of a transaction, following steps will be done. algorithm is based on the Ed25519 signature scheme and it is developed on basis of SHA-512 and . With the Step 1: Starting of a transaction usage of this EdDSA in digital signature of blockchain, there Step 2: Initialization of transaction with the data that should will be a severe raise in performing the digital signature very be sent for the next round. fastly and efficiently. Various advantages will be there with the EdDSA Step 3: Selecting the message, assuming it as G. algorithm over ECDSA algorithm in Digital Signature of Step 4: Encrypting the message taken from the sender and Blockchain. converting them into hash code by using the SHA-512 by Parameters for EdDSA: considering the finite number of elements (x). A Set of finite number of elements (x) over the Odd power Step 5: Performing the operation on the message to obtain the prime (y). EdDSA Public key of n number of bits with the signature of Any EdDSA Public Keys may have n number of bits with 2n. the signatures of 2n i.e., 2^(n-1) > y. This will perform the Step 6: Generating the collision resilience hash function to operation and generate a function with 2*n bits. using SHA-512, which gives the HashEdDSA algorithm. A base integer with an order of c that is 2 or 3. Step 7: Sending the transaction to the receiver which was Ed25519 private key is of 256 bits and provides the encrypted with private key. independence in generating the random number. Also, helps in performing the hashing very easily and raise in Step 8: Transaction receiving by the other end person. performance. IV. PERFORMANCE ANALYSIS Signing with EdDSA is done by private key which is Solidity [26] is the tool/language mainly used for verifiable with the public key. Before the signing in, should implementation of smart contracts on different block-chain have to generate the signature. platforms. So, the results obtained on the application has been Let us assume that the message is taken as G for sign defined below. Time comparison also done on the EcDSA purpose [23] and should sign with the help of a private key P. and EdDSA to find out the speed of the algorithm which gives That private key should be verifiable by the N. Then generate better result.

978-0-7381-1183-4/21/$31.00 ©2021 IEEE 1304 Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). DVD Part Number: CFP21ONG-DVD, 978-0-7381-1182-7

Time Consumption: REFERENCES As shown in the fig. 4, EdDSA will be faster while [1] Xu, M., Chen, X. & Kou, G. A systematic review of blockchain. Financ compared to the ECDSA. Due to the working nature of Innov 5, 27 (2019). https://doi.org/10.1186/s40854-019-0147-z ECDSA, it performs more computation and consumes more [2] "Blockchains: The great chain of being sure about things". The time to perform the signing process. But this EdDSA will be Economist. 31 October 2015. Archived from the original on 3 July 2016. less consuming of time due to its less computational nature. [3] Bhaskar, Nirupama Devi; Chuen, David LEE Kuo (2015). "Bitcoin Mining Technology". Handbook of Digital Currency. pp. 45 65. doi:10.1016/B978-0-12-802117-0.00003-5. ISBN 978-0-12-802117-0. [4] #Blockchain, "How Companies Can Leverage Private Blockchains to Improve Efficiency and Streamline Business Processes". https://perfectial.com/blog/leveraging-private-blockchains/, Perfectial. [5] Bob Marvin (30 August 2017). "Blockchain: The Invisible Technology That's Changing the World". PC MAG Australia. ZiffDavis, LLC. Archived from the original on 25 September 2017. Retrieved 25 September 2017. [6] [Distributed Ledger Technology: Hybrid Approach, Front-to-Back Designing and Changing Trade Processing Infrastructure, By Martin Walker, First published:, 24 OCT 2018 ISBN 978-1-78272-389-9] [7] Types of Blockchains Decide which one is better for your Investment Needs https://data-flair.training/blogs/types-of- blockchain/ [8] Luke Conway, Blockchain Explained, https://www.investopedia.com/ terms/b/blockchain.asp, Updated Nov 17, 2020, Accessed Jan 05, Fig. 4: Time Consumption of ECDSA and EdDSA for 1 Hash Function 2021. and 10 Functions [9] A., Menezes, P., Van., Oorschot, and S. Vanstone, CRC Press, 1996. Performance: Handbook of Applied Cryptography. Fig. 5 shows the performance comparison of which is [10] Understanding digital signatures, https://www.docusign.com/how-it- better in EdDSA and ECDSA. In that, ECDSA is slow due to works/electronic-signature/digital-signature/digital-signature-faq the greater number of computations that are performed for [11] Fang, Weidong; Chen, Wei; Zhang, Wuxiong; Pei, Jun; Gao, Weiwei; single digital signing. Also, ECDSA will give a chance to Wang, Guohui (2020-03-04). "Digital signature scheme for information non-repudiation in blockchain: a state of the art review". finding the private key easily if there is any error in EURASIP Journal on Wireless Communications and Networking. computation. 2020 (1). doi:10.1186/s13638-020-01665-w. ISSN 1687-1499. S2CID 212613803. [12] D. Chaum, E.V. Heyst, in Proceedings of Advances in Cryptology

1991), pp. 257 265 [13] Ross Anderson. Invited lecture. Fourth Annual Conference on Computer and Communications Security, ACM, 1997. [14] D. Chaum. Blind Signature System. In Proceedings of Advances in Cryptology CRYPTO '83, Santa Barbara, California, USA, August 21-24. 1984, pp. 153. [15] M. Mambo, K. Usuda, E. Okamoto. Proxy signatures for delegating signing operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security. New Delhi, India, March 14- 16, 1996, pp. 48-57. [16] B. Dan, C. Gentry, B. Lynn, H. Shacham, in Proceedings of International Conference on the Theory and Applications of Cryptographic Techniques. Aggregate and verifiably encrypted Fig. 5: Performance Evaluation of ECDSA and EdDSA signatures from bilinear maps (Springer, Berlin, Heidelberg, 2003), pp. 416 432 CONCLUSION [17] R.L. Rivest, A. Shamir, Y. Tauman. How to leak a secret. In Proceedings of Advances in Cryptology ASIACRYPT. Gold Coast, In this paper, we have discussed about blockchain and its Australia, December 9- 13, 2001, pp. 552-565. types of networks. Followed by the introduction, discussed [18] Yehuda Lindell and Ariel Nof. 2018. Fast Secure Multiparty ECDSA about the working nature of blockchain i.e., starting from the with Practical Distributed Key Generation and Applications to transaction (initial step) to the complete block added after the Custody. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (CCS '18). transaction. After that, described the Digital Signature, Association for Computing Machinery, New York, NY, USA, 1837 various types and schemes in digital signature. In the next 1854. DOI:https://doi.org/10.1145/3243734.3243788 section, discussed about related work of EcDSA algorithm in [19] Sahoo, M., Singhar, S. S., Nayak, B., & Mohanta, B. K. (2019). A supply chain management, DNS Networking, etc. After that, Blockchain Based Framework Secured by ECDSA to Curb Drug Counterfeiting. 2019 10th International Conference on Computing, given the details about EdDSA and the advantages of EdDSA Communication and Networking Technologies (ICCCNT). in signing process of hashing in blockchain. Then gave the doi:10.1109/icccnt45670.2019.8944772 theoretical analysis of time consumption, performance [20] Dalskov A., Orlandi C., Keller M., Shrishak K., Shulman H. (2020) evaluation with the respective analyzed graphs. In future, we Securing DNSSEC Keys via Threshold ECDSA from Generic MPC. want to work on reducing the power consumption of the In: Chen L., Li N., Liang K., Schneider S. (eds) Computer Security ESORICS 2020. ESORICS 2020. Lecture Notes in Computer Science, EdDSA over the ECDSA and obtain good results in that. vol 12309. Springer, Cham. https://doi.org/10.1007/978-3-030-59013- 0_32

978-0-7381-1183-4/21/$31.00 ©2021 IEEE 1305 Proceedings of the Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2021). DVD Part Number: CFP21ONG-DVD, 978-0-7381-1182-7

[21] Castagnos G., Catalano D., Laguillaumie F., Savasta F., Tucker I. [24] Ring signature, https://en.wikipedia.org/wiki/Ring_signature, Edited (2019) Two-Party ECDSA from Hash Proof Systems and Efficient on 23 January 2021. Instantiations. In: Boldyreva A., Micciancio D. (eds) Advances in [25] Liu, Joseph & Wong, Duncan. (2008). Solutions to Key Exposure Cryptology CRYPTO 2019. CRYPTO 2019. Lecture Notes in Problem in Ring Signature. International Journal of Network Security. Computer Science, vol 11694. Springer, Cham. 6. https://doi.org/10.1007/978-3-030-26954-8_7 [26] Solidity, https://en.wikipedia.org/wiki/Solidity, Edited on 10 January [22] Zhanna Lyasota, Digital Signature in Blockchain, 2021. https://dzone.com/articles/digital-signature-2, Jul 17, 18.

[23] WHAT'S AN EDDSA? https://duo.com/labs/tech- notes/whats-an-eddsa, May 14th, 2020.

978-0-7381-1183-4/21/$31.00 ©2021 IEEE 1306