A network security protection scheme for tax system based on elliptic curve cryptography

被引:0
|
作者
Wang, Wenjie [1 ]
Ni, Guofeng [2 ]
Yang, Yancheng [3 ]
Hu, Ying [3 ]
Gao, Meiling [1 ]
Shankar, Achyut [4 ,5 ,6 ,7 ,8 ]
机构
[1] Xian Univ Technol, Sch Econ & Management, Xian 710054, Peoples R China
[2] Shandong Youth Univ Polit Sci, Sch Accounting, Jinan 250103, Peoples R China
[3] Guilin Univ Technol, Business Sch, Guilin 541000, Peoples R China
[4] Univ Warwick, Dept Cyber Syst Engn, WMG, Coventry, England
[5] Chandigarh Univ, Univ Ctr Res & Dev, Mohali 140413, Punjab, India
[6] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144411, Punjab, India
[7] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[8] Chitkara Univ, Ctr Res Impact & Outcome, Rajpura, Punjab, India
关键词
Tax system; Security; Elliptic curve cryptography; Analysis; AUTHENTICATION SCHEME; EFFICIENT; PROTOCOL; FRAMEWORK; INTERNET;
D O I
10.1016/j.aej.2024.09.099
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of modern information technology and network technology, the construction of tax informatization plays an important role in improving the level of tax management and work efficiency. However, in the centralized data processing mode, the establishment of large data center and the efficient, stable, and secure connection of server bandwidth have become key challenges. Moreover, the openness and interconnectivity of the tax system network pose various network security threats, seriously threatening the integrity and security of data. For the above issues, this article proposes a tax system network security protection scheme based on elliptic curve cryptography. This scheme combines hash function and elliptic curve cryptography to achieve user anonymity and secure generation of session keys, effectively ensuring the secure transmission of confidential information. The security and effectiveness of the scheme are verified through informal and formal security analysis based on security proof, BAN logic and AVISPA tool. And a comprehensive evaluation of the scheme is conducted, and the results show that the scheme significantly reduced the costs while providing security features.
引用
收藏
页码:925 / 934
页数:10
相关论文
共 50 条
  • [21] Communication security and secret based on elliptic curve cryptography in packet networks
    Department of Biological Medical and Electronic Engineering, Fourth Military Medical University, Xi'an 710032, China
    不详
    Jisuanji Gongcheng, 2006, 21 (133-135):
  • [22] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Chou, Jue-Sam
    JOURNAL OF SUPERCOMPUTING, 2014, 70 (01): : 75 - 94
  • [23] An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
    Vincent O.R.
    Okediran T.M.
    Abayomi-Alli A.A.
    Adeniran O.J.
    SN Computer Science, 2020, 1 (2)
  • [24] Toward A Real-Time Elliptic Curve Cryptography-Based Facial Security System
    Tuy Tan Nguyen
    Lee, Hanho
    2022 IEEE ASIA PACIFIC CONFERENCE ON CIRCUITS AND SYSTEMS, APCCAS, 2022, : 364 - 367
  • [25] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
    Yuan, Ding
    Fan, Pingzhi
    Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
  • [26] Elliptic Curve Cryptography based authentication scheme for Internet of Medical Things
    Sowjanya, K.
    Dasgupta, Mou
    Ray, Sangram
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58 (58)
  • [27] A Fair E-Cash Scheme Based on Elliptic Curve Cryptography
    WANG Changji WU Jianping DUAN Haixin
    Geo-Spatial Information Science, 2004, (03) : 231 - 234
  • [28] A secure authenticated image encryption scheme based on elliptic curve cryptography
    Jnana Ramakrishna C.
    Bharath Kalyan Reddy D.
    Amritha P.P.
    Lakshmy K.V.
    Sachnev V.
    International Journal of Computers and Applications, 2024, 46 (03) : 184 - 193
  • [29] An efficient mutual authentication RFID scheme based on elliptic curve cryptography
    Jue-Sam Chou
    The Journal of Supercomputing, 2014, 70 : 75 - 94
  • [30] Attribute-Based Blind Signature Scheme Based on Elliptic Curve Cryptography
    Ma, Rui
    Du, Linyue
    IEEE Access, 2022, 10 : 34221 - 34227