
Enhancement of block chain security using re authentication of digital signatures
Author(s) -
K. Rajasekhar,
N Raga Rohith,
Girish Mohan,
D S Divya,
Ch Jaya Bharathi
Publication year - 2017
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i1.1.10824
Subject(s) - block (permutation group theory) , computer security , authentication (law) , computer science , digital signature , chain (unit) , implementation , set (abstract data type) , hash function , software engineering , mathematics , geometry , physics , astronomy , programming language
Block chain technology first got confined to crypto currencies but later has seen its image in varied applications and hence there is a lot of need to improve its security according to the application. Because of the current digital world revolution there are both the need of its implementation for safe and secure transactions, implementations and at the same time the threats it has been facing day by day. This also could be more efficiently implemented when there is a regulating authority set over for the whole network to whom a particular user can ask to if there is any problem. In this paper we are going to see mainly about the working of block chain technology and security threats of block chain and how can we overcome one of the threats i.e 51% attack. We also are going to see its varied applications in different fields and types of block chains which can be implemented in different applications.