Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon

被引:1
|
作者
Mohammed, Noor Sabah [1 ]
Dawood, Omar A. [1 ]
Sagheer, Ali M. [1 ]
Nafea, Ahmed Adil [2 ]
机构
[1] Univ Anbar, Coll Comp Sci & IT, Ramadi, Iraq
[2] Univ Kebangsaan Malaysia, Fac Informat Sci & Technol, Ctr Artificial Intelligence Technol CAIT, Bangi, Selangor, Malaysia
关键词
Blockchain; Cryptography; Digital Signature; Hash Function; Non-Repudiation; Smart contract; TOPOLOGICAL INDEXES; GRAPH-THEORY;
D O I
10.21123/bsj.2023.8614
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Blockchain is an innovative technology that has gained interest in all sectors in the era of digital transformation where it manages transactions and saves them in a database. With the increasing financial transactions and the rapidly developed society with growing businesses many people looking for the dream of a better financially independent life, stray from large corporations and organizations to form startups and small businesses. Recently, the increasing demand for employees or institutes to prepare and manage contracts, papers, and the verifications process, in addition to human mistakes led to the emergence of a smart contract. The smart contract has been developed to save time and provide more confidence while dealing, as well as to cover the security aspects of digital management and to solve negotiation concerns. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. In this paper, a simple prototype has been implemented for the smart contract integrated with blockchain which is simulated in a local server with a set of nodes. Several security objectives, such as confidentiality, authorization, integrity, and non-repudiation, have been achieved in the proposed system. Besides, the paper discussed the importance of using the Blockchain technique, and how it contributed to the management of transactions in addition to how it was implemented in highly transparent real-estate scenarios. The smart contract was employed in creating a distributed ledger to eliminate the need for centralization. The elliptic-curve public key has been adopted as an alternative for the RSA in a signature generation/verification process and encryption protocol. For secure transactions, The Secure Socket Layer (SSL) also has been adopted as a secure layer in the web browser. The results have been investigated and evaluated from different aspects and the implementation was in a restricted environment. Experiments showed us the complexity of time and cost when using the (ECC) algorithm and using (RSA) algorithm depending on the size and length of the key. So if the size of the key in (ECC) equals (160) bits, and it corresponds to (1024) bits in (RSA), which is equivalent to 40% for (ECC) and 30% for (RSA). As a result, the (ECC) algorithm is complex, its key is smaller and the process of generating the key is faster, so it has achieved a high level of security.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A New Fair Non-repudiation Protocol for Secure Negotiation and Contract Signing
    Ruiz-Martinez, Antonio
    Inmaculada Marin-Lopez, C.
    Bano-Lopez, Laura
    Gomez-Skarmeta, Antonio F.
    [J]. JOURNAL OF UNIVERSAL COMPUTER SCIENCE, 2009, 15 (03) : 555 - 583
  • [2] A Blockchain-based Communication Non-repudiation System for Conversational Service
    Li, Zhaozheng
    Lei, Weimin
    Hu, Hanyun
    Zhang, Wei
    [J]. PROCEEDINGS OF 2019 IEEE 13TH INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (IEEE-ASID'2019), 2019, : 6 - 10
  • [3] Smart card-based agents for fair non-repudiation
    Marin Lopez, Andres
    Diaz Sanchez, Daniel
    Almenarez, Florina
    Garcia Rubio, Carlos
    Campo, Celeste
    [J]. COMPUTER NETWORKS, 2007, 51 (09) : 2288 - 2298
  • [4] Networking and cryptography library with a non-repudiation flavor for blockchain
    Mohamed Rasslan
    Mahmoud M. Nasreldin
    Doaa Abdelrahman
    Aya Elshobaky
    Heba Aslan
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 1 - 14
  • [5] Non-repudiation Scheme of Smart Home Based on Cloud Service
    Luo Lan
    Hu Xinping
    Chen Hanchun
    Dong Jiancheng
    [J]. PROCEEDINGS OF 2016 SIXTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2016), 2016, : 453 - 456
  • [6] Networking and cryptography library with a non-repudiation flavor for blockchain
    Rasslan, Mohamed
    Nasreldin, Mahmoud M.
    Abdelrahman, Doaa
    Elshobaky, Aya
    Aslan, Heba
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (01) : 1 - 14
  • [7] Maintaining Integrity and Non-Repudiation in Secure Offline Documents
    Shatnawi, Ahmed
    Munson, Ethan V.
    Thao, Cheng
    [J]. PROCEEDINGS OF THE 2017 ACM SYMPOSIUM ON DOCUMENT ENGINEERING (DOCENG 17), 2017, : 59 - 62
  • [8] Non-Repudiation Storage and Access Control Scheme of Insurance Data Based on Blockchain in IPFS
    Sun, Jin
    Yao, Xiaomin
    Wang, Shangping
    Wu, Ying
    [J]. IEEE ACCESS, 2020, 8 (08): : 155145 - 155155
  • [9] Non-Repudiation in Neighborhood Area Networks for Smart Grid
    Xiao, Zhifeng
    Xiao, Yang
    Du, David Hung-Chang
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) : 18 - 26
  • [10] Cross-organizational Non-repudiation Industrial Control Log System Based on Blockchain
    Liu, I-Hsien
    Tsai, Yao-Chu
    Li, Chu -Fen
    Li, Jung-Shian
    [J]. JOURNAL OF ROBOTICS NETWORKING AND ARTIFICIAL LIFE, 2022, 9 (03): : 240 - 244