Open Access Paper
2 February 2023 Application analysis of cryptography in blockchain
Haonan Jiang
Author Affiliations +
Proceedings Volume 12462, Third International Symposium on Computer Engineering and Intelligent Communications (ISCEIC 2022); 1246216 (2023) https://doi.org/10.1117/12.2661094
Event: International Symposium on Computer Engineering and Intelligent Communications (ISCEIC 2022), 2022, Xi'an, China
Abstract
The purpose of blockchain technology is to solve the trust problem between people or institutions and make the communication data and network communication of the Internet. In the past, cryptography lost money. Passwords are used to protect data, and the cost is relatively high. But with blockchain, cryptography becomes valuable. The formation of blockchain has made new contributions to cryptography and done something we could not do in the past. With blockchain, cryptography is "valuable". In fact, there are many cryptographic primitives used in blockchain, such as hash, digital signature, and etc. Moreover, digital signature not only uses standard digital signature, but also uses ring signature, connectable ring signature, one-time signature, borromer ring signature, multi signature, homomorphic encryption, homomorphic commitment, accumulator, zero knowledge proof, etc. As well as the recently popular password signature toss. As mentioned above, the popularity of blockchain technology will completely break the centralized pattern, indicating the advent of a new era in the future - Web3.0. This paper focuses on the application of encryption technology in blockchain and expounds in detail the applications of such as hash function and ring signature in blockchain. This study analyzes the application of cryptography in blockchain and discusses to the development of encryption technology in the future.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Haonan Jiang "Application analysis of cryptography in blockchain", Proc. SPIE 12462, Third International Symposium on Computer Engineering and Intelligent Communications (ISCEIC 2022), 1246216 (2 February 2023); https://doi.org/10.1117/12.2661094
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Cryptography

Mining

Data communications

Computer security

Internet

Network security

Algorithm development

RELATED CONTENT

Dependability analysis of WRT54GL router
Proceedings of SPIE (September 28 2016)
Survey of cyber security issues in smart grids
Proceedings of SPIE (April 28 2010)
Computer loss experience and predictions
Proceedings of SPIE (March 12 1996)
Access and accounting schemes of wireless broadband
Proceedings of SPIE (April 28 2004)

Back to Top