Blockchain-Integrated Elliptic Curve Cryptography for Secure Data Sharing

Authors

  • Aditya Ankana, Dabbada Nagaraju, Kosuri Ganesh Karthik, Tamma Hemendra Kumar Author

DOI:

https://doi.org/10.7492/a77snd28

Abstract

The current paper describes a secure document sharing system that generates blockchain-based architecture complemented with Elliptic Curve Cryptography (ECC) to ensure file authenticity, integrity, and non-repudiation apply to use in a distributed location. The system addresses intractably significant challenges in digital document exchange including unauthorised interference and signature of a sender and transparency to the transactions. The given architecture assumes application of the three-tier security model, namely file integrity through the application of SHA-256 hashing and ECDSA (Elliptic Curve Digital Signature Algorithm) using SECP256k1 curve cryptographic signature and authentication and immutable blockchain ledger to record and provide transaction audit trails. The implementation of it incorporates a proof-of-work consensus algorithm, where the mining difficulty is configurable, to provide resistance to computation attacks on blockchains. The process of system can allow a file to be uploaded by its sender and an ECC key pair to be created, file hashes to be digitally signed and transactions to be recorded as a set of blockchain blocks. Receivers can self-authenticate file authenticity by comparing computed hashes with blockchain and authenticate ECDSA signatures using sender public keys. Google drive and the integration of cloud storage offer an option of persistent availability of data and backup. The system architecture will provide extensive logging options, automatic file validation processes and exploratory interfaces of blockchain. Through the identification of hash mismatch used to detect file tampering and preventing impersonation of the sender by validating signature, the experiment has shown success. It is not only cryptographically secured with 256-bit ECC protection comparable to 128-bit symmetric-key encryption, but the old generates computational performance requirements at resource-bound environments. The paper presents a practical implementation design that uses both cryptographic primitives and distributed ledger technology to effect a secure document exchange that can be applied to the management of and exchange of legal document, healthcare records exchange, supply chain records/documents, and any other field needing a validatable provenance of files and store of tamperevidence.

Downloads

Published

1990-2026

Issue

Section

Articles

How to Cite

Blockchain-Integrated Elliptic Curve Cryptography for Secure Data Sharing. (2026). MSW Management Journal, 36(1s), 224-233. https://doi.org/10.7492/a77snd28