Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/429396
Title: | Modified Multi Signature Schemes in Blockchain Technology to Enhance the Security |
Researcher: | G Uganya |
Guide(s): | Radhika Baskar |
Keywords: | Engineering Engineering and Technology Engineering Electrical and Electronic |
University: | Saveetha University |
Completed Date: | 2022 |
Abstract: | newlineInternet of Things (IoT) is an emerging technology that moves the world newlinein the direction of smart things. But, IoT security is the complex problem newlinedue to its centralized architecture, and limited capacity. So, blockchain newlinetechnology has great attention due to its features of decentralized newlinearchitecture, transparency, immutable records, and cryptography hash newlinefunctions when combining with IoT. Cryptography hash algorithms are newlinevery important in blockchain technology for secure transmission. The newlineprivate key and public key can be connected through mathematical newlinefunction called hash algorithm. Existing cryptography algorithms newlineproduced variable hash value with single node accessibility and accepts newlinethe input key size up to 128 bytes. The increasing key size leads to less newlineaccurate transaction, less entropy of key, less throughput and more time newlinecomplexity for complete transaction. As well as, the smaller key size newlineleads to increasing the possibility of vulnerable attacks. newlineBy motivating these points, first the modified key signature scheme is newlineproposed to extend the key size up to 256 bytes. It achieved an accuracy newlineof 82.6%, time complexity of 1.68 nano seconds and throughput of 15.24 newlinekilobytes per 200 nano seconds. But it transacts the data only one node newlineat a time and leads to single node accessibility. Secondly, the modified newlineelliptic curve cryptography multi signature scheme is proposed for newlinemultiple node accessibility with extension of key size up to 512 bytes. newlineHere the fixed hash bytes can be generated with constant signature. This newlinework achieved an accuracy of 90.6%, time complexity of 1.57 nano newlineseconds, and throughput of 16.31 kilobytes per 200 nano seconds. newlineFinally, the revised elliptic curve cryptography is developed using image newlineas key. This work mainly concentrates on to enhances the security in newlineelectronic health record management. These works detect the security newlineattacks like brute force attack and sybil attack from changes in hash newlinebytes. |
Pagination: | |
URI: | http://hdl.handle.net/10603/429396 |
Appears in Departments: | Department of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 89.58 kB | Adobe PDF | View/Open |
02_prelim pages.pdf | 94.61 kB | Adobe PDF | View/Open | |
03_content.pdf | 109.75 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 64.16 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 611.3 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 201.98 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 952.68 kB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 1.02 MB | Adobe PDF | View/Open | |
09_chapter 5.pdf | 999.33 kB | Adobe PDF | View/Open | |
10_annexure.pdf | 7.09 kB | Adobe PDF | View/Open | |
10_chapter 6.pdf | 235.95 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 77.65 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: