{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T20:34:35Z","timestamp":1775421275479,"version":"3.50.1"},"reference-count":26,"publisher":"Frontiers Media SA","license":[{"start":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T00:00:00Z","timestamp":1739404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["frontiersin.org"],"crossmark-restriction":true},"short-container-title":["Front. Blockchain"],"abstract":"<jats:sec><jats:title>Introduction<\/jats:title><jats:p>Blockchain technology has attracted much attention due to its decentralization, transparency and security. Initially applied in the financial field, it has now expanded to various fields such as Internet of Things (IoT), electronic cash and healthcare. However, the open nature of blockchain has raised potential security concerns about sensitive transaction data, and the increasing number of transactions requires low-latency solutions. Most blockchain applications still rely on the lightweight Elliptic Curve Digital Signature Algorithm (ECDSA). Due to complex operations such as vectorized multiplication and modular inversion, this may introduce significant additional overhead.<\/jats:p><\/jats:sec><jats:sec><jats:title>Methods<\/jats:title><jats:p>To address these issues, a new scheme named KTP-ECDSA is proposed. This scheme is based on the improved two-parameter Elliptic Curve Digital Signature Algorithm (TP-ECDSA) and the KGLP algorithm. In both the signing and verification processes, this scheme eliminates modular inverse operations and reduces scalar multiplications during the verification stage by using batch verification.<\/jats:p><\/jats:sec><jats:sec><jats:title>Result<\/jats:title><jats:p>The experimental results show that, compared with the traditional ECDSA, KTP-ECDSA has achieved a speed increase of over 50% in both independent verification and batch verification, significantly improving the efficiency of signature verification.<\/jats:p><\/jats:sec><jats:sec><jats:title>Discussion<\/jats:title><jats:p>By adopting the KTP-ECDSA algorithm and using the digital signature batch verification method, multiple signatures can be verified simultaneously, thus reducing the computational burden of the traditional single-verification method. This greatly increases the overall transaction throughput and improves resource utilization efficiency.<\/jats:p><\/jats:sec>","DOI":"10.3389\/fbloc.2025.1495984","type":"journal-article","created":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T07:08:35Z","timestamp":1739430515000},"update-policy":"https:\/\/doi.org\/10.3389\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Improved blockchain-based ECDSA batch verification scheme"],"prefix":"10.3389","volume":"8","author":[{"given":"Guangfu","family":"Wu","sequence":"first","affiliation":[]},{"given":"Jiandong","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaoyan","family":"Fu","sequence":"additional","affiliation":[]}],"member":"1965","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"B1","doi-asserted-by":"publisher","first-page":"100504","DOI":"10.1016\/j.vehcom.2022.100504","article-title":"ECDSA-based certificateless conditional privacy-preserving authentication scheme in Vehicular ad hoc Network","volume":"37","author":"Abdelkrim","year":"2022","journal-title":"Veh. Commun."},{"key":"B2","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1016\/j.amc.2005.03.016","article-title":"Cryptanalysis and improvement on batch verifying multiple RSA digital signatures","volume":"172","author":"Bao","year":"2006","journal-title":"Appl. Math. Comput."},{"key":"B3","doi-asserted-by":"publisher","first-page":"114325","DOI":"10.1016\/j.tcs.2023.114325","article-title":"Fast two-party signature for upgrading ECDSA to two-party scenario easily","volume":"986","author":"Binbin","year":"2024","journal-title":"Theor. Comput. Sci."},{"key":"B4","first-page":"1","article-title":"Improved elliptic curve digital signature algorithm","volume":"34","author":"Cao","year":"2018","journal-title":"J. Huaibei Normal Univ. Nat. Sci. Ed."},{"key":"B5","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1186\/s13638-020-01665-w","article-title":"Digital signature scheme for information non-repudiation in blockchain: a state of the art review","volume":"10","author":"Fang","year":"2020","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"B6","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/s001459900021","article-title":"Batch RSA","volume":"10","author":"Fiat","year":"1997","journal-title":"J. Cryptol."},{"key":"B7","first-page":"1","article-title":"An efficient and lightweight two-parameter ECDSA batch verification scheme","volume":"42","author":"Guang-fu","year":"2024","journal-title":"J. Jiamusi Univ. Nat. Sci. Ed."},{"key":"B8","doi-asserted-by":"publisher","first-page":"103409","DOI":"10.1016\/j.jisa.2022.103409","article-title":"A SM2 based efficient and lightweight batch verification approach for IC cards","volume":"73","author":"Jiarui","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"B9","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s13389-014-0082-x","article-title":"New algorithms for batch verification of standard ECDSA signatures","volume":"4","author":"Karati","year":"2014","journal-title":"J. Cryptogr. Eng."},{"key":"B10","doi-asserted-by":"publisher","first-page":"103271","DOI":"10.1016\/j.jnca.2021.103271","article-title":"A context-aware information-based clone node attack detection scheme in Internet of Things","volume":"197","author":"Khizar","year":"2022","journal-title":"J. Netw. Comput. Appl."},{"key":"B11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jisa.2017.09.005","article-title":"Batch verification of digital signatures: approaches and challenges","volume":"37","author":"Kittur","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"B12","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.jisa.2017.09.005","article-title":"Batch verification of digital signatures: approaches and challenges","volume":"37","author":"Kittur","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"B13","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1049\/el:19941112","article-title":"Security of interactive DSA batch verification","volume":"30","author":"Lim","year":"1994","journal-title":"Electron. Lett."},{"key":"B14","doi-asserted-by":"publisher","first-page":"2664","DOI":"10.3390\/s23052664","article-title":"Secure data transfer based on a multi-level blockchain for Internet of vehicles","volume":"23","author":"Lin","year":"2023","journal-title":"Sensors"},{"key":"B15","doi-asserted-by":"publisher","first-page":"77058","DOI":"10.1109\/access.2021.3082704","article-title":"An efficient double parameter elliptic curve digital signature algorithm for blockchain","volume":"9","author":"Liu","year":"2021","journal-title":"IEEE Access"},{"key":"B16","doi-asserted-by":"publisher","first-page":"44335","DOI":"10.1007\/s11042-023-15204-4","article-title":"Smart healthcare system using integrated and lightweight ECC with private blockchain for multimedia medical data processing","volume":"82","author":"Mahajan","year":"2023","journal-title":"Multimedia tools Appl."},{"key":"B17","doi-asserted-by":"publisher","first-page":"5664","DOI":"10.1038\/s41598-023-32701-6","article-title":"Quantum-resistance in blockchain networks","volume":"13","author":"Marcos","year":"2023","journal-title":"Sci. Rep."},{"key":"B18","doi-asserted-by":"publisher","first-page":"231","DOI":"10.5573\/ieiespc.2022.11.3.231","article-title":"Comparative analysis of Schnorr digital signature and ECDSA for efficiency using private ethereum network","volume":"11","author":"Na","year":"2022","journal-title":"IEIE Trans. Smart Process. and Comput."},{"key":"B19","doi-asserted-by":"publisher","first-page":"8898","DOI":"10.1007\/s11227-023-05789-w","article-title":"Enhanced authentication security for IoT client nodes through T-ECDSA integrated into MQTT broker","volume":"80","author":"Puthiyidam","year":"2023","journal-title":"J. Supercomput."},{"key":"B20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.jcss.2020.08.005","article-title":"Speeding-up verification of digital signatures","volume":"116","author":"Rahman Taleb","year":"2021","journal-title":"J. Comput. Syst. Sci."},{"key":"B21","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.future.2019.08.034","article-title":"ECDSA weak randomness in Bitcoin","volume":"102","author":"Wang","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"B22","first-page":"118","article-title":"Elliptic curve digital signature algorithm for modeless inverse operations","volume":"56","author":"Xiao","year":"2020","journal-title":"Comput. Eng. Appl."},{"key":"B23","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/s00145-021-09409-9","article-title":"Fast secure two-party ECDSA signing","volume":"34","author":"Yehuda","year":"2021","journal-title":"J. Cryptol."},{"key":"B24","doi-asserted-by":"publisher","first-page":"103409","DOI":"10.1016\/j.jisa.2022.103409","article-title":"A SM2 based efficient and lightweight batch verification approach for IC cards","volume":"73","author":"Yu","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"B25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2022\/1977798","article-title":"An ECC-based digital signature scheme for privacy protection in wireless communication network","volume":"2022","author":"Zhang","year":"2022","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"B26","first-page":"4425","article-title":"Fast elliptic curve verification algorithm","volume":"29","author":"Zhang","year":"2008","journal-title":"Comput. Eng. Des."}],"container-title":["Frontiers in Blockchain"],"original-title":[],"link":[{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fbloc.2025.1495984\/full","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T07:08:37Z","timestamp":1739430517000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.frontiersin.org\/articles\/10.3389\/fbloc.2025.1495984\/full"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,13]]},"references-count":26,"alternative-id":["10.3389\/fbloc.2025.1495984"],"URL":"https:\/\/doi.org\/10.3389\/fbloc.2025.1495984","relation":{},"ISSN":["2624-7852"],"issn-type":[{"value":"2624-7852","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,13]]},"article-number":"1495984"}}