A network security protection scheme for tax system based on elliptic curve cryptography

被引:0
|
作者
Wang, Wenjie [1 ]
Ni, Guofeng [2 ]
Yang, Yancheng [3 ]
Hu, Ying [3 ]
Gao, Meiling [1 ]
Shankar, Achyut [4 ,5 ,6 ,7 ,8 ]
机构
[1] Xian Univ Technol, Sch Econ & Management, Xian 710054, Peoples R China
[2] Shandong Youth Univ Polit Sci, Sch Accounting, Jinan 250103, Peoples R China
[3] Guilin Univ Technol, Business Sch, Guilin 541000, Peoples R China
[4] Univ Warwick, Dept Cyber Syst Engn, WMG, Coventry, England
[5] Chandigarh Univ, Univ Ctr Res & Dev, Mohali 140413, Punjab, India
[6] Lovely Profess Univ, Sch Comp Sci & Engn, Phagwara 144411, Punjab, India
[7] Graph Era Deemed Univ, Dept Comp Sci & Engn, Dehra Dun 248002, India
[8] Chitkara Univ, Ctr Res Impact & Outcome, Rajpura, Punjab, India
关键词
Tax system; Security; Elliptic curve cryptography; Analysis; AUTHENTICATION SCHEME; EFFICIENT; PROTOCOL; FRAMEWORK; INTERNET;
D O I
10.1016/j.aej.2024.09.099
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
With the rapid development of modern information technology and network technology, the construction of tax informatization plays an important role in improving the level of tax management and work efficiency. However, in the centralized data processing mode, the establishment of large data center and the efficient, stable, and secure connection of server bandwidth have become key challenges. Moreover, the openness and interconnectivity of the tax system network pose various network security threats, seriously threatening the integrity and security of data. For the above issues, this article proposes a tax system network security protection scheme based on elliptic curve cryptography. This scheme combines hash function and elliptic curve cryptography to achieve user anonymity and secure generation of session keys, effectively ensuring the secure transmission of confidential information. The security and effectiveness of the scheme are verified through informal and formal security analysis based on security proof, BAN logic and AVISPA tool. And a comprehensive evaluation of the scheme is conducted, and the results show that the scheme significantly reduced the costs while providing security features.
引用
收藏
页码:925 / 934
页数:10
相关论文
共 50 条