题名

The Enabling Technique for Digital Transformation in Financial Sectors: a Signatory Embedded Blockchain and Digital Identity

并列篇名

金融領域數位轉型賦能技術:嵌入區塊鏈和數位身份之簽章

作者

林亭汝(Grace T.R. Lin);王仁聖(Jen-Sheng Wang)

关键词

Digital Transformation ; Financial Sectors ; Enabling Technique ; Blockchain ; Digital Identity ; 金融領域 ; 數位轉型 ; 賦能技術 ; 區塊鏈 ; 數位身份 ; 數位簽章

期刊名称

科技管理學刊

卷期/出版年月

26卷2期(2021 / 12 / 01)

页次

1 - 24

内容语文

英文

中文摘要

With the advent of the digital transformation, traditional signature systems in financial sectors must also face a diversified data information exchange environment. At the same time, a faster and more secure digital signature mechanism is required to ensure data security. If the algorithm of the asymmetric key is combined with the blockchain structure, it is designed to be comparable to the traditional symmetric cryptographic system in terms of computing performance, and can complete the signature and verification operations at the same time. These functions will be digitally signed systematically. The data protection and message exchange mode is more secure. In addition to being able to adapt to the restricted digital signatures in the finance industry, it can also ensure the security of confidential information. Therefore, in order to meet the needs of future digitization, this research uses hash function and blockchain algorithm to construct a novel digital signature mechanism. This architecture has the following advantages: 1. Build a fast, safe and reliable offline self-identity authentication mechanism, without relying on the authentication center to participate in authentication online, reducing authentication frequency and bandwidth usage. 2. Establish a mixed public key cryptosystem with multiple difficulties, in addition to meeting the basic security requirements of confidentiality, integrity, authentication and non-repudiation, and resisting common network attack modes.

英文摘要

隨著數位轉型的到來,金融領域的傳統簽名系統也必須面臨多元化的數據資訊交換環境。這樣的場域也需要更快、更安全的數字簽名機制來保證數據安全,如果將非對稱密鑰的算法與區塊鏈結構相結合,在計算性能上可以與傳統的對稱密碼系統相媲美,並且可以同時完成簽名和身份驗證操作,其機制能夠系統化地進行數位簽章,讓數據保護和資訊交換模式更安全。此數位簽章除了能夠符合金融領域應用的合規性,進一步確保機密資訊的安全。因此,為了適應未來數位轉型的需要,本研究利用Hash函數和區塊鏈概念構建了一種新穎包含數位身份的數位簽章架構。該架構具有以下優勢:1.構建快速、安全、可靠的離線身份認證機制,無需依賴認證中心參與線上認證,降低認證頻率和頻寬佔用;2.建立一個多重困難度的混合公鑰密碼機制滿足數位簽章保密性、完整性、認證性和不可否認性的基本安全要求,來抵抗常見的網絡攻擊方式。

主题分类 社會科學 > 管理學
参考文献
  1. Afrianto, I.,Heryandi, A.,Finandhita, A.,Atin, S.(2019).E-Document Authentication With Digital Signature For Smart City: Reference Model.Conference: The 2nd ASEAN Workshop on Information Science and Technology (AWIST2019),Bandung:
  2. Akter, S.,Michael, K.,Uddin, M. R.,McCarthy, G.,Rahman, M.(2020).Transforming business using digital innovations: the application of AI, blockchain, cloud and data analytics.Ann. Oper. Res
  3. Alawida, M.,Teh, T. S.,Oyinloye, D. P.,Alshoura, W. H.,Ahmad, M.,Alkhawaldeh, R. S.(2020).A New Hash Function Based on Chaotic Maps and Deterministic Finite State Automata.IEEE Access,8,113163-113174.
  4. Banerjee, S.,Odelu, V.,Das, A. K.,Chattopadhyay, S.,Kumar, N.,Park, Y.,Tanwar, S.(2018).Design of an anonymity-preserving group formation based authentication protocol in global mobility networks.IEEE Access,6,20673-20693.
  5. Bralić, V.,Stančić, H.,Stengård, M.(2020).A blockchain approach to digital archiving: digital signature certification chain preservation.Records Management Journal,30(3),345-362.
  6. Chong, K. W.,Kim, Y. S.,Choi, J.(2021).A Study of Factors Affecting Intention to Adopt a Cloud-Based Digital Signature Service.Information,12(2)
  7. Cui, H.,Qin, B.,Susilo, W.,Nepal, S.(2020).Robust digital signature revisited.Theoretical Computer Science,844,87-96.
  8. Dey, S.,Hossain, A.(2019).Session-Key Establishment and Authentication in a Smart Home Network Using Public Key Cryptography.IEEE Sensors Letters,3(4),7500204.
  9. Diffie, W.,Hellman, M.(1976).New Directions in Cryptography.IEEE Transactions on Information Theory,22,472-492.
  10. Duong, D. H.,Susilo, W.,Trinh, V. C.(2020).A New Approach to Keep the Privacy Information of the Signer in a Digital Signature Scheme.Information,11(5)
  11. Dzhangarov, I.,Suleymanova, M. A.(2020).Electronic digital signature.IOP Conf. Ser.: Mater. Sci. Eng.,862(052054)
  12. Elhabob, R.,Zhao, Y.,Sella, I.,Xiong, H.(2020).An efficient certificateless public key cryptography with authorized equality test in IIoT.Journal of Ambient Intelligence and Humanized Computing,11,1065-1083.
  13. El-Rahman, S. A.,Aldawsari, D.,Aldosari, M.,Alrashed, O.,Alsubaie, G.(2018).A Secure Cloud Based Digital Signature Application for IoT.International Journal of E-Services and Mobile Applications,10(3)
  14. Géraud, R.,Naccache, D.,Rosie, R.(2019).Robust encryption, extended.Topics in Cryptology - CT-RSA 2019 - the Cryptographers' Track at the RSA Conference 2019,San Francisco, CA, USA:
  15. Girault, M.(1991).Self-certified public keys.Advances in Cryptology-EUROCRYPT '91,Berlin, Heidelberg:
  16. Gul, E.,Ozturk, S.(2019).A novel hash function based fragile watermarking method for image integrity.Multimedia Tools and Applications,78,17701-17718.
  17. He, D.,Zhang, Y.,Wang, D.,Choo, K. K. R.(2020).Secure and Efficient Two-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography.IEEE Transactions on Dependable and Secure Computing,17(5),1124-1132.
  18. Höglund, J.,Lindemer, S.,Furuhed, M.,Raza, S.(2020).PKI4IoT: Towards public key infrastructure for the Internet of Things.Computers & Security,89,101658.
  19. Hu, X.,Tan, W.,Xu, H.,Wang, J.,Ma, C.(2017).Strong Designated Verifier Signature Schemes with Undeniable Property and Their Applications.Secur. Commun. Netw.,2017,7921782.
  20. Huang, Z.,Liu, S.,Mao, X.,Chen, K.,Li, J.(2017).Insight of the protection for data security under selective opening attacks.Inf. Sci.,412,223-241.
  21. Kabra, N.,Bhattacharya, P.,Tanwar, S.,Tyagi, S.(2020).MudraChain: Blockchain-based framework for automated cheque clearance in financial institutions.Future Generation Computer Systems,102,574-587.
  22. Karati, A.,Islam, S. H.,Biswas, G.,Bhuiyan, M. Z. A.,Vijayakumar, P.,Karuppiah, M.(2018).Provably secure identity-based signcryption scheme for crowdsourced industrial Internet of Things environments.IEEE Internet Things J.,5(4),2904-2914.
  23. Kazmirchuk, S.,Ilyenko, A.,Ilyenko, S.(2019).Digital Signature Authentication Scheme with Message Recovery Based on the Use of Elliptic Curves.ICCSEEA 2019, AISC 938
  24. Kumar, P.,Chouhan, L.(2021).A privacy and session key based authentication scheme for medical IoT networks.Computer Communications,166,154-164.
  25. Kuznetsov, A.,Pushkaŕov, A.,Kiyan, N.,Kuznetsova, T.(2018).Code-Based Electronic Digital Signature.The 9th IEEE International Conference on Dependable Systems, Services and Technologies, DESSERT’2018, 24-27 May,Kyiv, Ukraine:
  26. Kuznetsov, A.,Svatovskij, I.,Kiyan, N.,Pushkáov, A.(2017).Codebased public-key cryptosystems for the post-quantum period.2017 4th International Scientific-Practical Conference Problems of Infocommunications, Science and Technology (PIC S&T),Kharkov:
  27. Li, H.,Han, D.(2019).EduRSS: A Blockchain-Based Educational Records Secure Storage and Sharing Scheme.IEEE Access,7,179273-179289.
  28. Li, Y.,Li, X.,Liu, X.(2017).A fast and efficient hash function based on generalized chaotic mapping with variable parameters.Neural Comput. Appl.,28(6),1405-1415.
  29. Lu, S.,Ostrovsky, R.,Sahai, A.,Shacham, H.,Waters, B.(2013).Sequential aggregate signatures, multisignatures, and verifiably encrypted signatures without random oracles.J. Cryptol.,26(2),340-373.
  30. Lusetti, M.,Salsi, L.,Dallatana, A.(2020).A blockchain based solution for the custody of digital files in forensic medicine.Forensic Science International: Digital Investigation,35,301017.
  31. Malik, M.,Dutta, M.,Granjal, J.(2019).A Survey of Key Bootstrapping Protocols Based on Public Key Cryptography in the Internet of Things.IEEE Access,7,27443-27464.
  32. Mezher, A. E.(2018).Enhanced RSA Cryptosystem based on Multiplicity of Public and Private Keys.International Journal of Electrical and Computer Engineering,8(5)
  33. Mouha, N.,Raunak, M. S.,Kuhn, D. R.,Kacker, R.(2018).Finding Bugs in Cryptographic Hash Function Implementations.IEEE Transactions on Reliability,67(3),870-884.
  34. Nakhaei, K.,Ansari, F.,Ansari, E. J.(2020).Signature: eliminating third‑party‑hosted JavaScript infection threats using digital signatures.SN Applied Sciences,2(4)
  35. Ouyang, M.,Wang, Z.,Li, F.(2021).Digital signature with cryptographic reverse firewalls.Journal of Systems Architecture,116,102029.
  36. Rahardja, U.,Sudaryono, S.,Santoso, N. P. L.,Faturahman, A.,Aini, Q.(2020).Covid-19: Digital Signature Impact on Higher Education Motivation Performance.International Journal of Artificial Intelligence Research,4(1)
  37. Santini, P.,Baldi, M.,Chiaraluce, F.(2019).Cryptanalysis of a One-Time Code-Based Digital Signature Scheme.2019 IEEE International Symposium on Information Theory (ISIT),Paris, France:
  38. Sepahi, R.,Steinfeld, R.,Pieprzyk, J.(2014).Lattice-based certificateless public-key encryption in the standard model.Int. J. Inf. Secur.,13(4),315-333.
  39. Shahid, F.,Khan, A.(2020).Smart Digital Signatures (SDS): A post-quantum digital signature scheme for distributed ledgers.Future Generation Computer Systems,111,241-253.
  40. Shannon, C. E.(2001).A mathematical theory of communication.ACM SIGMOBILE Mobile Comput. Commun. Rev.,5(1),3-55.
  41. Sohal, A. S.,Sandhu, R.,Sood, S. K.,Chang, V.(2018).A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments.Comput. Secur.,74,340-354.
  42. Teh, J. S.,Samsudin, A.(2017).A chaos-based authenticated cipher with associated data.Security and Communication Networks,2017,9040518.
  43. Teh, J. S.,Tan, K.,Alawida, M.(2019).A chaos-based keyed hash function based on fixed point representation.Cluster Computing,22,649-660.
  44. Wazid, M.,Das, A. K.,Bhat, V.,Vasilakos, A. V.(2020).LAM-CIoT: Lightweight authentication mechanism in cloud-based IoT environment.J. Netw. Comput. Appl.,150,102496.
  45. Xue, Y.,Tan, Y.,Liang, C.,Li, Y.,Zheng, J.,Zhang, Q.(2018).RootAgency: A digital signature-based root privilege management agency for cloud terminal devices.Information Sciences,444,36-50.
  46. Yang, Y.,Chen, F.,Chen, J.,Zhang, Y.,Yung, K. L.(2019).A secure hash function based on feedback iterative structure.Enterprise Information Systems,13(3),281-302.
  47. Ying, B.,Nayak, A.(2019).Lightweight remote user authentication protocol for multi-server 5G networks using self-certified public key cryptography.Journal of Network and Computer Applications,131,66-74.
  48. Yuan, E.,Wang, L.,Cheng, S.,Ao, N.,Guo, Q.(2020).A Key Management Scheme Based on Pairing-Free Identity Based Digital Signature Algorithm for Heterogeneous Wireless Sensor Networks.Sensors,20(6),1543.
  49. Zhang, L.,Zhang, H.,Yu, J.,Xian, H.(2020).Blockchain-based two-party fair contract signing scheme.Information Sciences,535,142-155.
  50. Zhou, Y.,Guo, G.,Li, F.(2020).Certificateless public key encryption with cryptographic reverse firewalls.Journal of Systems Architecture,109,101754.
被引用次数
  1. (2023)。金融創新服務之風險管理分析。科技管理學刊,28(3),1-35。