{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:27:32Z","timestamp":1760149652641,"version":"build-2065373602"},"reference-count":18,"publisher":"MDPI AG","issue":"9","license":[{"start":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T00:00:00Z","timestamp":1693180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>A zero-confirmation transaction is a transaction that has not yet been confirmed on the blockchain and is not yet part of the blockchain. The network propagates zero-confirmation transactions quickly, but they are not secured against double-spending attacks. In this study, the proposed method is used to secure zero-confirmation transactions by using the security hashing algorithm 512 in elliptic curve cryptography (ECDSA) instead of the security hashing algorithm 256. This is to generate a cryptographic identity to secure the transactions in zero-confirmation transactions instead of security hashing algorithm 256. The results show that SHA-512 is greater than SHA-256 in throughput. Additionally, SHA-512 offers better throughput performance than SHA-256 while also having a larger hash size. Results also show that SHA-512 is more secure than SHA-256.<\/jats:p>","DOI":"10.3390\/computers12090171","type":"journal-article","created":{"date-parts":[[2023,8,28]],"date-time":"2023-08-28T02:23:25Z","timestamp":1693189405000},"page":"171","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks"],"prefix":"10.3390","volume":"12","author":[{"given":"Hasan","family":"Hashim","sequence":"first","affiliation":[{"name":"Department of Information Systems, College of Computer Science and Engineering, Taibah University, Yanbu 46477, Saudi Arabia"}]},{"given":"Ahmad Reda","family":"Alzighaibi","sequence":"additional","affiliation":[{"name":"Department of Information Systems, College of Computer Science and Engineering, Taibah University, Yanbu 46477, Saudi Arabia"}]},{"given":"Amaal Farag","family":"Elessawy","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 6132501, Egypt"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3388-9144","authenticated-orcid":false,"given":"Ibrahim","family":"Gad","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Faculty of Science, Tanta University, Tanta 31111, Egypt"}]},{"given":"Hatem","family":"Abdul-Kader","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 6132501, Egypt"}]},{"given":"Asmaa","family":"Elsaid","sequence":"additional","affiliation":[{"name":"Department of Information Systems, Faculty of Computers and Information, Menoufia University, Shebin El-Kom 6132501, Egypt"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,28]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Karame, G.O., Androulaki, E., and Capkun, S. (2012, January 16\u201318). Double-spending fast payments in bitcoin. Proceedings of the 2012 ACM Conference on Computer and Communications Security, Raleigh North, CA, USA.","DOI":"10.1145\/2382196.2382292"},{"key":"ref_2","first-page":"451","article-title":"Double-spending prevention for Bitcoin zero-confirmation transactions","volume":"18","year":"2018","journal-title":"Int. J. Inf. Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.ipl.2018.08.004","article-title":"Bitcoin private key locked transactions","volume":"140","year":"2018","journal-title":"Inf. Process. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2732196","article-title":"Misbehavior in Bitcoin","volume":"18","author":"Karame","year":"2015","journal-title":"Acm Trans. Inf. Syst. Secur."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1080\/23257962.2019.1702003","article-title":"Digital preservation handbook, 2nd Edition","volume":"41","author":"Crockett","year":"2019","journal-title":"Arch. Rec."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., and Welten, S. (2013, January 9\u201311). Have a snack, pay with Bitcoins. Proceedings of the IEEE P2P 2013 Proceedings, Trento, Italy.","DOI":"10.1109\/P2P.2013.6688717"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., and Pustogarov, I. (2014, January 3\u20137). Deanonymisation of Clients in Bitcoin P2P Network. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA.","DOI":"10.1145\/2660267.2660379"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1038\/scientificamerican0714-14","article-title":"Help Wanted on Internet Security","volume":"311","author":"Felten","year":"2014","journal-title":"Sci. Am."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","article-title":"A Survey on Security and Privacy Issues of Bitcoin","volume":"20","author":"Conti","year":"2018","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"79","DOI":"10.20894\/IJCOA.101.005.002.003","article-title":"Cryptographic Hash Algorithms Performance Finding using .Net Simulation","volume":"5","author":"Nithya","year":"2016","journal-title":"Int. J. Comput. Algorithm"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Paar, C., and Pelzl, J. (2010). Understanding Cryptography, Springer.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"ref_12","unstructured":"Cai, Z. (2001). A Study on Parameters Generation of Elliptic Curve Cryptosystem over Finite Fields. [Ph.D. Thesis, The University of Hong Kong]."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Turner, S., and Brown, D. (2010). Elliptic Curve Private Key Structure, IETF. Technical Report.","DOI":"10.17487\/rfc5915"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Goyal, J., Ahmed, M., and Gopalani, D. (2021, January 12\u201313). Empirical Study of Standard Elliptic Curve Domain Parameters for IoT Devices. Proceedings of the 2021 International Conference on Electrical, Communication, and Computer Engineering (ICECCE), Kuala Lumpur, Malaysia.","DOI":"10.1109\/ICECCE52056.2021.9514179"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Moody, D. (2022). Recommendations for Discrete Logarithm-Based Cryptography, National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.SP.800-186"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Pornin, T. (2013). Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA), RFC Editor. Technical Report.","DOI":"10.17487\/rfc6979"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Dang, Q.H. (2015). Secure Hash Standard, National Institute of Standards and Technology. Technical Report.","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Gupta, D.N., and Kumar, R. (2021, January 25\u201327). Sponge based Lightweight Cryptographic Hash Functions for IoT Applications. Proceedings of the 2021 International Conference on Intelligent Technologies (CONIT), Karnataka, India.","DOI":"10.1109\/CONIT51480.2021.9498572"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/9\/171\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:40:30Z","timestamp":1760128830000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/12\/9\/171"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,28]]},"references-count":18,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["computers12090171"],"URL":"https:\/\/doi.org\/10.3390\/computers12090171","relation":{},"ISSN":["2073-431X"],"issn-type":[{"type":"electronic","value":"2073-431X"}],"subject":[],"published":{"date-parts":[[2023,8,28]]}}}