Articles
| Open Access | SELECTING CRYPTOGRAPHIC SIGNATURE ALGORITHMS TO ENSURE SMART CONTRACT SECURITY
Raimov Ulugbek Yorqinbek ugli , Teacher at Andijan State Technical InstituteAbstract
Blockchain platforms based on smart contracts rely on cryptographic signature algorithms to verify user actions and provide protection against malicious attacks. Selecting the right algorithm is one of the most important factors in ensuring smart contract security, as cryptography is constantly evolving and new technologies may affect the reliability of existing algorithms. In particular, the development of quantum computers poses a threat to widely used digital signature protocols. This paper proposes a flexible approach to selecting cryptographic signature algorithms to ensure the security of smart contracts. The approach involves managing algorithms and their parameters through special smart contracts deployed on the blockchain ledger, enabling the rapid introduction of new, secure signature methods or the deprecation of outdated ones. This method increases the adaptability of the blockchain to technological advancements, facilitates the adoption of post-quantum signature algorithms, and eliminates the fork problem that often arises during updates. The proposed approach is effective for real-world applications, including industry, complex supply chains, and IoT devices.
Keywords
blockchain; smart contracts; cryptographic signature algorithms; distributed ledger; post-quantum cryptography; quantum-resistant signatures; digital signatures; cybersecurity
References
Jakobsson, M.; Juels, A. Proofs of work and bread pudding protocols. In Secure Information Networks; Springer: Boston, MA, USA, 1999; pp. 258–272. [Google Scholar]
King, S.; Nadal, S. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake. Self-Published Paper. 2012, Volume 19. Available online: https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf (accessed on 20 June 2022).
Rivest, R.L.; Shamir, A.; Adleman, L.M. A Method for Obtaining Digital Signatures and Public Key Cryptosystems; Routledge: London, UK, 2019. [Google Scholar]
Gilles, B.; Hoyer, P.; Tapp, A. Quantum algorithm for the collision problem. arXiv 1997, arXiv:quant-ph/9705002. [Google Scholar]
McCurley, K.S. The discrete logarithm problem. In Proceedings of the Symposia in Applied Mathematics, Boulder, CO, USA, 6–7 August 1989; Volume 42, pp. 49–74. [Google Scholar]
Rabah, K. Security of the Cryptographic Protocols Based on Discrete Logarithm Problem. J. Appl. Sci. 2005, 5, 1692–1712. [Google Scholar] [CrossRef] [Green Version]
Galbraith, S.D.; Gaudry, P. Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 2016, 78, 51–72. [Google Scholar] [CrossRef]
Kerry, C.F.; Director, C. FIPS PUB 186-4 Federal Information Processing Standards Publication Digital Signature Standard (DSS). 2013. Available online: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.362.5590 (accessed on 20 June 2022).
Josefsson, S.; Liusvaara, I. Edwards-Curve Digital Signature Algorithm (EdDSA). In Proceedings of the Internet Research Task Force, Crypto Forum Research Group, RFC; 2017; Volume 8032. Available online: https://www.rfc-editor.org/rfc/rfc8032.html (accessed on 20 June 2022).
Shor, P.W. Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings of the Proceedings 35th annual symposium on Foundations of Computer Science, Santa Fe, NM, USA, 20–22 November 1994; pp. 124–134. [Google Scholar]
National Institute of Standards and Technology. Post-Quantum Cryptography Standardization—Post-Quantum Cryptography. Available online: https://csrc.nist.gov/Projects/post-quantum-cryptography (accessed on 28 June 2022).
Article Statistics
Downloads
Copyright License

This work is licensed under a Creative Commons Attribution 4.0 International License.