Abstract

AbstractThe security of decentralized systems built on Blockchain technology is directly determined by the efficiency of the applied cryptographic transformations. Classical blockchain technology mainly uses several cryptographic primitives: hash function, electronic signature, encryption, etc. In particular, the hash function is used for several purposes as the generation of an address or user ID; hashing of transactions and blocks to confirm the indisputable block against network errors, as well as the hash value of the previous block is used as a reference in the formation of the next. The use of digital signatures in the blockchain system introduces services for the integrity and integrity of transactions. In turn, in any blockchain system there is a pool of transactions, each of which must be signed. This ensures that the transaction will not be altered, the signature of the transaction ensures that it is signed by a person who can then be identified, and, in fact, the signature can help determine “whether the user has the right to conduct the transaction.” Block ciphers are one of the most common cryptographic primitives, which is also used as a structural element of hash functions, message authentication codes, and so on. Thus, for the operation of monitoring and tracking programs using Blockchain technology, it is necessary to study various cryptographic primitives, in particular, hash functions, electronic signatures, encryption schemes, etc.KeywordsCryptographic transformationsBlockchain technologyDecentralized systems

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.