{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T20:43:55Z","timestamp":1764103435253},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T00:00:00Z","timestamp":1691193600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Comput Virol Hack Tech"],"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Blockchain is currently one of the most widely discussed inventions in the information and communication technology industry. It is a pillar of the fourth industrial revolution and it is a cryptographically demanding technology that is regarded as one of the most influential topics in academia. Many blockchain platforms currently utilize third-party cryptographic libraries that offer many cryptographic primitives in order to ensure users' protection against cyber-attacks. The Networking and Cryptography library (NaCl) is an open-source library for cryptographic primitives. NaCl is known to be one of the best libraries that provide usability property. Although NaCl is easy to use and ensures: confidentiality, integrity, and authenticity, it fails to provide the non-repudiation service. In this paper, an improvement to the blockchain platforms is proposed by enhancing the NaCl library to achieve the non-repudiation property that enhances the security level of the implemented blockchain platform. In NaCl, to provide the aforementioned security services, messages are signed and then encrypted. Therefore, the non-repudiation service is not provided. In this paper, the proposed solution is based on adding a signature block to enable a non-repudiation property. First, logical analysis is conducted using the BAN logic on the NaCl library to prove that it does not provide the non-repudiation property. Subsequently, a modification to the library is proposed, and the correctness of the proposed solution is proven using BAN logic. The analysis suggests that the proposed solution fixes the aforementioned problem.<\/jats:p>","DOI":"10.1007\/s11416-023-00482-1","type":"journal-article","created":{"date-parts":[[2023,8,5]],"date-time":"2023-08-05T11:01:36Z","timestamp":1691233296000},"page":"1-14","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Networking and cryptography library with a non-repudiation flavor for blockchain"],"prefix":"10.1007","volume":"20","author":[{"given":"Mohamed","family":"Rasslan","sequence":"first","affiliation":[]},{"given":"Mahmoud M.","family":"Nasreldin","sequence":"additional","affiliation":[]},{"given":"Doaa","family":"Abdelrahman","sequence":"additional","affiliation":[]},{"given":"Aya","family":"Elshobaky","sequence":"additional","affiliation":[]},{"given":"Heba","family":"Aslan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,5]]},"reference":[{"key":"482_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"482_CR2","unstructured":"Wong, E.: Retrieving dispersed data from SDD-1: a system for distributed databases. In: 1977 Berkeley Workshop on Distributed Data Management and Computer Networks, University of California, Berkeley, CA, USA, pp. 217\u2013235 (1977)"},{"key":"482_CR3","doi-asserted-by":"crossref","unstructured":"Zheng, Z., Xie, S., Dai, H., Chen X., Wang, H.: An overview of blockchain technology: architecture, consensus, and future trends. In: 6th IEEE International Congress on Big Data, Honolulu, pp. 557\u2013564 (2017)","DOI":"10.1109\/BigDataCongress.2017.85"},{"issue":"1","key":"482_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.tele.2018.11.006","volume":"36","author":"F Casinoa","year":"2019","unstructured":"Casinoa, F., Dasaklisb, T.K., Patsakisa, C.: A systematic literature review of blockchain-based applications: current status, classification and open issues. Telematics Inform. 36(1), 55\u201381 (2019)","journal-title":"Telematics Inform."},{"issue":"11","key":"482_CR5","first-page":"1","volume":"32","author":"R Colomo-Palacios","year":"2020","unstructured":"Colomo-Palacios, R., S\u00e1nchez-Gord\u00f3n, M., Arias-Aranda, D.: A critical review on blockchain assessment initiatives: a technology evolution viewpoint. Softw. Evolut. Process 32(11), 1\u201311 (2020)","journal-title":"Softw. Evolut. Process"},{"key":"482_CR6","doi-asserted-by":"crossref","unstructured":"Storublevtcev, N.: Cryptography in blockchain. In: International Conference on Computational Science and Applications ICCSA2019, Saint Petersburg, Russia, pp 495\u2013508 (2019)","DOI":"10.1007\/978-3-030-24296-1_39"},{"key":"482_CR7","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Lange, T., Schwabe, P.: The security impact of a new cryptographic library. In: International Conference on Cryptology and Information Security in Latin America LATINCRYPT 2012: Progress in Cryptology\u2014LATINCRYPT 2012, Santiago de Chile, Chile, pp. 159\u2013176 (2012).","DOI":"10.1007\/978-3-642-33481-8_9"},{"key":"482_CR8","doi-asserted-by":"crossref","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences, London, UK, pp. 233\u2013271 (1989)","DOI":"10.1098\/rspa.1989.0125"},{"key":"482_CR9","unstructured":"Wessels, J.: Application of BAN-logic. Technical report, CMG Public Sector B.V (2001). http:\/\/www.win.tue.nl\/ipa\/archive\/springdays2001\/banwessels"},{"key":"482_CR10","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s42979-020-00123-0","volume":"1","author":"HTM Gamage","year":"2020","unstructured":"Gamage, H.T.M., Weerasinghe, H.D., Dias, N.G.J.: A survey on blockchain technology concepts, applications, and issues. SN Comput. Sci. 1, 114 (2020). https:\/\/doi.org\/10.1007\/s42979-020-00123-0","journal-title":"SN Comput. Sci."},{"key":"482_CR11","unstructured":"wolfSSL Inc. wolfCrypt Embedded Crypto Engine. https:\/\/www.wolfssl.com\/products\/wolfcrypt\/. Last Accessed 21 Feb 2023"},{"key":"482_CR12","unstructured":"Cifra. A collection of cryptographic primitives targeted at embedded use. https:\/\/github.com\/ctz\/cifra. Last Accessed 21 Feb 2023"},{"key":"482_CR13","unstructured":"Intel Corporation. TinyCrypt Cryptographic Library. https:\/\/github.com\/intel\/tinycrypt. Last Accessed 21 Feb 2023"},{"key":"482_CR14","unstructured":"Ken MacKay. micro-ecc. http:\/\/kmackay.ca\/micro-ecc\/. Last Accessed 21 Feb 2023"},{"key":"482_CR15","unstructured":"https:\/\/github.com\/brix\/crypto-js. Last Accessed 21 Feb 2023"},{"key":"482_CR16","unstructured":"D. F. Aranha, C. P. L. Gouv\u02c6ea, T. Markmann, R. S. Wahby, and K. Liao. RELIC is an Efficient LIbrary for Cryptography. https:\/\/github.com\/relic-toolkit\/relic. Last Accessed 21 Feb 2023"},{"key":"482_CR17","unstructured":"https:\/\/bouncycastle.org\/java.html. Last Accessed 21 Feb 2023"},{"issue":"24","key":"482_CR18","doi-asserted-by":"publisher","first-page":"17236","DOI":"10.1109\/JIOT.2021.3078072","volume":"8","author":"MA Ferrag","year":"2021","unstructured":"Ferrag, M.A., Shu, L.: The performance evaluation of blockchain-based security and privacy systems for the internet of things: a tutorial. IEEE Internet Things J. 8(24), 17236\u201317260 (2021)","journal-title":"IEEE Internet Things J."},{"key":"482_CR19","unstructured":"PBC Library. http:\/\/crypto.stanford.edu\/pbc. Last Accessed 21 Feb 2023"},{"key":"482_CR20","unstructured":"Crypto++ Library. https:\/\/www.cryptopp.com\/. Last Accessed 21 Feb 2023"},{"key":"482_CR21","unstructured":"Miracl Library. https:\/\/github.com\/miracl\/MIRACL. Last Accessed 21 Feb 2023"},{"key":"482_CR22","unstructured":"Hyperledger Ursa. https:\/\/www.hyperledger.org\/projects\/ursa. Last Accessed 21 Feb 2023"},{"key":"482_CR23","unstructured":"OpenSSL https:\/\/github.com\/openssl\/openssl. Last Accessed 21 Feb 2023"},{"key":"482_CR24","doi-asserted-by":"publisher","unstructured":"Acar, Y., Backes, M., Fahl, S., Garfinkel, S., Kim, D., et al.: Comparing the usability of cryptographic APIs. In: 2017 IEEE Symposium on Security and Privacy (SP), California, CA, USA, pp. 154\u2013171 (2017). https:\/\/doi.org\/10.1109\/SP.2017.52","DOI":"10.1109\/SP.2017.52"},{"key":"482_CR25","unstructured":"Grabovsk\u00fd, M.: Measuring the usability of cryptographic libraries. Bachelor\u2019s Thesis, Masaryk University Faculty of Informatics, Brno, Czech Republic, Spring (2018)"},{"key":"482_CR26","unstructured":"Keck, P.: Analysing and improving the crypto ecosystem of Rust. Master\u2019s thesis, Institute of Software Technology, University of Stuttgart, Stuttgart, Germany (2017)"},{"key":"482_CR27","unstructured":"Silde, T.: Comparative study of ECC libraries for embedded devices. Technical report, Norwegian University of Science and Technology (2019)"},{"key":"482_CR28","doi-asserted-by":"publisher","unstructured":"Balamurugan, C., Singh, K., Ganesan, G., Rajarajan, M.: Code-based post-quantum cryptography. Preprints 2021, 2021040734. https:\/\/doi.org\/10.20944\/preprints202104.0734.v1 (2021)","DOI":"10.20944\/preprints202104.0734.v1"},{"key":"482_CR29","doi-asserted-by":"crossref","unstructured":"Zinzindohou, J., Bhargavan, K., Protzenko, J., Beurdouche, B.: HACL*: A verified modern cryptographic library. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 1789\u20131806 (2017)","DOI":"10.1145\/3133956.3134043"},{"key":"482_CR30","unstructured":"https:\/\/github.com\/jedisct1\/libsodium. Last Accessed 21 Feb 2023"},{"key":"482_CR31","unstructured":"https:\/\/tuweni.apache.org\/docs\/org.apache.tuweni.crypto.sodium\/-lib-sodium\/index.html. Last Accessed 25 Feb 23."},{"key":"482_CR32","unstructured":"https:\/\/duniter.org\/. Last Accessed 25 Feb 2023"},{"key":"482_CR33","unstructured":"https:\/\/pytezos.org\/contents.html. Last Accessed 25 Feb 2023"},{"key":"482_CR34","unstructured":"https:\/\/z.cash\/. Last Accessed 25 Feb 2023"},{"key":"482_CR35","unstructured":"https:\/\/github.com\/MercerWeiss\/SilentDragon. Last Accesses 25 Feb 2023"},{"key":"482_CR36","unstructured":"Patnaik, N., Hallett, J., Rashid, A.: Usability smells: an analysis of developers\u2019 struggle with crypto libraries. In: Proceedings of the Fifteenth Symposium on Usable Privacy and Security (sponsored by USENIX), Santa Clara,California, CA, USA, pp. 245\u2013258 (2019)"},{"key":"482_CR37","doi-asserted-by":"crossref","unstructured":"Wohlwender, J., Huesmann, R., Heinemann, A., Wiesmaier, A.: Cryptolib: comparing and selecting cryptography libraries. (long version of EICC 2022 publication) (2022). arXiv:2203.16370.","DOI":"10.1145\/3528580.3528582"},{"key":"482_CR38","doi-asserted-by":"crossref","unstructured":"Namasudra, S., Sharma, P.: Achieving a decentralized and secure cab sharing system using blockchain technology. IEEE Trans Intell Transp Syst (2022)","DOI":"10.1109\/TITS.2022.3186361"},{"key":"482_CR39","doi-asserted-by":"crossref","unstructured":"Lopez, M.A., Terron, S., Lombardo, J.M., Gonzalez-Crespo, R.: Towards a solution to create, test and publish mixed reality experiences for occupational safety and health learning: training-MR (2021)","DOI":"10.9781\/ijimai.2021.07.003"},{"key":"482_CR40","doi-asserted-by":"publisher","unstructured":"Namasudra, S., Sharma, P., Crespo, R.G., Shanmuganathan, V.: Blockchain-Based Medical Certificate Generation and Verification for IoT-Based Healthcare Systems. In: IEEE Consumer Electronics Magazine, vol. 12, no. 2, pp. 83\u201393, 1 March 2023, https:\/\/doi.org\/10.1109\/MCE.2021.3140048.","DOI":"10.1109\/MCE.2021.3140048"},{"key":"482_CR41","doi-asserted-by":"crossref","unstructured":"Garc\u00eda-Pe\u00f1alvo, F., V\u00e1zquez-Ingelmo, A., Garc\u00eda-Holgado, A., Sampedro-G\u00f3mez, J., S\u00e1nchez-Puente, A., Vicente-Palacios, V., Dorado-D\u00edaz, P.I., S\u00e1nchez, P.L.: Application of artificial intelligence algorithms within the medical context for non-specialized users: the CARTIER-IA platform (2021)","DOI":"10.9781\/ijimai.2021.05.005"},{"key":"482_CR42","unstructured":"Sangjukta, D., Namasudra, S.: MACPABE: Multi\u2010Authority\u2010based CP\u2010ABE with efficient attribute revocation for IoT\u2010enabled healthcare infrastructure. Int. J. Netw. Manag. (2022)"}],"container-title":["Journal of Computer Virology and Hacking Techniques"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00482-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11416-023-00482-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-023-00482-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T11:22:35Z","timestamp":1708687355000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11416-023-00482-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,5]]},"references-count":42,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,3]]}},"alternative-id":["482"],"URL":"https:\/\/doi.org\/10.1007\/s11416-023-00482-1","relation":{},"ISSN":["2263-8733"],"issn-type":[{"value":"2263-8733","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,5]]},"assertion":[{"value":"23 August 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 August 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflicts of interest to report regarding the present study.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}