Please use this identifier to cite or link to this item: http://repository.futminna.edu.ng:8080/jspui/handle/123456789/12372
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMoses, Noel Dogonyaro-
dc.contributor.authorVictor, Waziri Onomza-
dc.contributor.authorAbdulhamid, Shafi’i Muhammad-
dc.contributor.authorJoseph, Ojeniyi Adebayo-
dc.date.accessioned2021-08-04T08:06:00Z-
dc.date.available2021-08-04T08:06:00Z-
dc.date.issued2019-07-04-
dc.identifier.citationhttp://dx.doi.org/10.1109/ICECCO48375.2019.9043192en_US
dc.identifier.urihttp://dx.doi.org/10.1109/ICECCO48375.2019.9043192-
dc.identifier.urihttp://repository.futminna.edu.ng:8080/jspui/handle/123456789/12372-
dc.description.abstractModern computing devices use classical algorithms such as Rivest Shamir Adleman (RSA) and Elliptic Curve Digital Signature Algorithm (ECDSA) for their security. The securities of these algorithms relied on the problem and difficulty of integer factorization and also calculating the Discrete Logarithm Problems. With the introduction of quantum computers, recent research is focusing on developing alternative algorithms which are supposed to withstand attacks from quantum computers. One of such alternatives is the Hash-based Digital Signature Schemes. Chosen hash-based signature schemes over classical algorithms is because their security is on the hash function used and that they are metaheuristic in nature. This research work presents basic analysis and the background understanding of Stateful Hash-based Signature Schemes, particularly the Lamport One-Time Signature Scheme, Winternitz One-Time Signature Scheme, and the Merkle Signature Scheme. The three schemes selected are stateful, hence has common features and are few-time hash-based signature schemes. The selected Stateful Hash-based Digital Signature Schemes were analyzed based on their respective key generation, signature generation, signature verification, and their security levels. Practical working examples were given for better understanding. With the analyses, Merkle Signature Scheme proves to be the best candidate to be used in the Bitcoin Proof of Work protocol because of its security and its advantage of signing many messages.en_US
dc.language.isoenen_US
dc.publisher2019 15th International Conference on Electronics, Computer and Computation (ICECCO)en_US
dc.subjectPost-Quantumen_US
dc.subjectBitcoimen_US
dc.subjectCryptocurrencyen_US
dc.subjectHash-based Digital Signatureen_US
dc.subjectCryptographyen_US
dc.subjectcyber securityen_US
dc.titleStateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrencyen_US
dc.typeBook chapteren_US
Appears in Collections:Cyber Security Science

Files in This Item:
File Description SizeFormat 
68.pdfStateful Hash-based Digital Signature Schemes for Bitcoin Cryptocurrency142.52 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.