Blockchain Technology and Cryptography

Authors

  • Nobaya Ahmad Department Of Computer Science and Technology, Somany Institute of Technology and Management (SITM), Rewari

DOI:

https://doi.org/10.53469/jrse.2025.07(03).05

Keywords:

Blockchain, cryptography, hash function, proof - of - work, consensus, signature, encryption

Abstract

Blockchain technology, coupled with cryptography, has emerged as a transformative force across various industries, promising enhanced security, transparency, and efficiency in digital transactions. This research paper explores the foundational principles of blockchain technology and cryptography, their interplay, and their applications across different sectors. We delve into the mechanisms that underpin blockchain's decentralized nature, consensus algorithms, cryptographic hash functions, digital signatures, and smart contracts. Furthermore, we examine the challenges and opportunities posed by the integration of blockchain and cryptography and highlight potential future developments in this dynamic field.

References

Ali Kaan Koç – Emre Yavuz – Umut Can Çabuk – Gökhan Dalkiliç (2018) Towards Secure E - Voting Using Ethereum Blockchain.

Conference: International Symposium on Digital Forensic and Security (ISDFS), Antalya, Vol.6 Alqassem, Israa – Svetinovic, Davor (2014) Towards Reference Architecture for Cryptocurrencies: Bitcoin Architectural Analysis.

IEEE International Conference on Internet of Things (iThings 2014), Green Computing and Communications (GreenCom2014), and Cyber - Physical - Social Computing (CPSCom 2014), 436 –

Anceaume, Emmanuelle – Lajoie - Mazenc, Thibaut – Ludinard, Romaric – Sericola, Bruno (2016) Safety Analysis of Bitcoin Improvement Proposals.

IEEE 15th International Symposium on Network Computing and Applications, 318 - 325.10.1109/NCA.2016.7778636.

Andersen, P. – Kragh, H. (2010) “Sense and sensibility: two approaches for using existing theory in theory building qualitative research”, Industrial Marketing Management, Vol.39, 49 – 55.

Apostolaki, Maria – Zohar, Aviv – Vanbever, Laurent (2017) Hijacking Bitcoin: Routing Attacks on Cryptocurrencies.

Conference: IEEE Symposium on Security and Privacy (SP – 2017), 375–392.10.1109/SP.2017.29.

Bag, Samiran – Ruj, Sushmita – Kouichi, Sakurai (2017) Bitcoin Block Withholding Attack: Analysis and Mitigation.

IEEE Transactions on Information Forensics And Security, Vol.12, No.8, 1967 – 1978 Banerjee, Mandrita – Lee, Junghee – Choo, Kim - Kwang Raymond (2017) A Blockchain Future to Internet of Things Security: A Position Paper. Digital Communications and Networks. Bauspiess, Fritz – Damm, Frank (1992) Requirements for Cryptographic Hash Functions.

Computers and Security 11, 427 – 437. Bjoernsen, Kristian (2015) Koblitz Curves and its practical uses in Bitcoin security.

Research design: Qualitative, quantitative, and mixed methods approaches (3rd ed.).

Thousand Oaks, CA: Sage Dai, Fangfang – Shi, Yue

–Meng, Nan – Wei, Liang – Ye, Zhiguo (2017) From Bitcoin to Cybersecurity: a Comparative Study of Blockchain Application and Security Issues.

4th International Conference on Systems and Informatics (ICSAI - 2017), 975 – 979. Damaj, Issam

–Kasbah, Safaa (2018) An Analysis Framework for Hardware and Software Implementations with Applications from Cryptography.

Elsevier: Computers and Electrical Engineering Vranken, Harald (2017) Sustainability of Bitcoin and blockchains. Current Opinion in Environmental Sustainability 2017, 28: 1–9.

17th International Symposium INFOTEH - JAHORINA, 1–6.10.1109/INFOTEH.2018.8345547.

Wood, Gavin (2017) Ethereum: A Secure Decentralized Generalized Transaction Ledger.

Ethereum Yellow Paper.

Overview of Blockchain Technology Cryptographic Security by Nwachukwu, Uchechukwu Justin

M – Augustine, Fred K. – Giberson, Will (2017) Blockchain Technology Adoption Status and Strategies, Journal of International Technology and Information Management, Vol.26, No.2, 65 - 92.

Yaga, Dylan – Roby, Nick – Scarfone, Karen (2018) Blockchain Technology Overview. National Institute of Standards and Technology Internal Report 8202, 1 – 59.

Yanga, Changsong – Chena, Xiaofeng – Xiang, Yang (2018) Blockchain - based publicly verifiable data deletion scheme for cloud storage. Elsevier - Journal of Network and Computer Applications 103, 185 – 193.

Zheng, Zibin – Xie, Shaoan – Dai, Hongning – Chen, Xiangping – Wang, Huaimin (2017) An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends.

2017 IEEE International Congress on Big Data (BigData Congress).557 - 564.

Zhou, Jianying – Bao, Feng – Deng Robert (2006) Minimizing TTP’s Involvement in Signature Validation. International Journal of Information Security 5 (1), 37 – 47.

Downloads

Published

2025-03-14

How to Cite

Ahmad, N. (2025). Blockchain Technology and Cryptography. Journal of Research in Science and Engineering, 7(3), 22–24. https://doi.org/10.53469/jrse.2025.07(03).05

Issue

Section

Articles