A network security protection scheme for tax system based on elliptic curve cryptography

被引:0
|
作者
Wang, Wenjie [1 ]
Ni, Guofeng [2 ]
Yang, Yancheng [3 ]
Hu, Ying [3 ]
Gao, Meiling [1 ]
Shankar, Achyut [4 ,5 ,6 ,7 ,8 ]
机构
[1] Xian Univ Technol, Sch Econ & Management, Xian 710054, Peoples R China
[2] Shandong Youth Univ Polit Sci, Sch Accounting, Jinan 250103, Peoples R China
[3] Guilin Univ Technol, Business Sch, Guilin 541000, Peoples R China
[4] Univ Warwick, Dept Cyber Syst Engn, WMG, Coventry, England
[5] Chandigarh Univ, Univ Ctr Res & Dev, Mohali 140413, Punjab, India
[6] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144411, Punjab, India
[7] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[8] Chitkara Univ, Ctr Res Impact & Outcome, Rajpura, Punjab, India
关键词
Tax system; Security; Elliptic curve cryptography; Analysis; AUTHENTICATION SCHEME; EFFICIENT; PROTOCOL; FRAMEWORK; INTERNET;
D O I
10.1016/j.aej.2024.09.099
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of modern information technology and network technology, the construction of tax informatization plays an important role in improving the level of tax management and work efficiency. However, in the centralized data processing mode, the establishment of large data center and the efficient, stable, and secure connection of server bandwidth have become key challenges. Moreover, the openness and interconnectivity of the tax system network pose various network security threats, seriously threatening the integrity and security of data. For the above issues, this article proposes a tax system network security protection scheme based on elliptic curve cryptography. This scheme combines hash function and elliptic curve cryptography to achieve user anonymity and secure generation of session keys, effectively ensuring the secure transmission of confidential information. The security and effectiveness of the scheme are verified through informal and formal security analysis based on security proof, BAN logic and AVISPA tool. And a comprehensive evaluation of the scheme is conducted, and the results show that the scheme significantly reduced the costs while providing security features.
引用
收藏
页码:925 / 934
页数:10
相关论文
共 50 条
  • [1] Development of security scheme on wireless sensor network based on Elliptic Curve Cryptography
    Li, Dongmei
    Liu, Yan
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON EDUCATION, MANAGEMENT, COMMERCE AND SOCIETY, 2015, 17 : 630 - 634
  • [2] An Efficient Mobile Voting System Security Scheme based on Elliptic Curve Cryptography
    Ahmad, Tohari
    Hu, Jiankun
    Han, Song
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 474 - +
  • [3] A security enhanced password authentication and update scheme based on elliptic curve cryptography
    Qiao, Pengshuai
    Tu, Hang
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (02) : 130 - 139
  • [4] Homomorphic Encryption Scheme Based on Elliptic Curve Cryptography for Privacy Protection of Cloud Computing
    Hong, Ming-quan
    Zhao, Wen-bo
    Wang, Peng-yu
    2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 152 - 157
  • [5] A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography
    Jeong, Yoon-Su
    Kim, Yong-Tae
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2015, 11 (03): : 137 - 142
  • [6] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [7] Elliptic Curve Cryptography with Security System in Wireless Sensor Networks
    Huang, Xu
    Sharma, Dharmendra
    IAENG TRANSACTIONS ON ENGINEERING TECHNOLOGIES, VOL 5, 2010, 1285 : 519 - 531
  • [8] A Fair Electronic Cash Scheme Based on Elliptic Curve Cryptography
    Xu, Shouzhi
    Liu, Qiaoli
    Yu, Hen
    Zhou, Huan
    DCABES 2008 PROCEEDINGS, VOLS I AND II, 2008, : 758 - 763
  • [9] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography
    Sun, Xue
    Xia, Mingping
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
  • [10] A Proactive Secret Sharing Scheme Based on Elliptic Curve Cryptography
    Sun, Hua
    Zheng, Xuefeng
    Yu, Yike
    PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL II, 2009, : 666 - 669