Browse > Article
http://dx.doi.org/10.6109/jkiice.2019.23.5.604

A Comparative Analysis of PKI Internet Banking and Blockchain Payment Transactions  

Park, Seungchul (School of Computer Science and Engineering, Korea University of Technology and Education)
Abstract
PKI Internet banking is used to have users register their public keys with the banking server together with the identity information, and verify the signature for both user and transaction authentications by using the registered public keys. Although the Blockchain-based financial systems such as Bitcoin adopt similar digital signature-based authentication scheme, there is no server that participants can register public keys with because they perform P2P payment transactions. The purpose of this paper is to identify the advantages and disadvantages of the Blockchain-based payment transactions by analyzing the differences between the most common PKI Internet banking and Blockchain payment systems. Based on the analysis, this paper suggests the issues that need to be enhanced from the aspects of architecture and security in order for Blockchain payment transaction systems to be applied universally.
Keywords
Internet banking; PKI; Blockchain; Bitcoin; FinTech;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 S. Nakamoto, "Bitcoin : A Peer-to-Peer Electronic Cash System," White Paper, 2008[Internet]. Available: http://bitcoin.org/bitcoin.pdf.
2 A. Kaushik, A. Choudhary, C. Ektare, and D. Thomas, "Blockchain - Literature Survey," in Proceeding of 2017 2nd IEEE International Conference On Recent Trends in Electronics Information & Communication Technology (RTEICT), India, pp. 2145-2148, May. 19-20, 2017.
3 I. C. Lin, and T. C. Liao , "A Survey of Blockchain Security Issues and Challenges," International Journal of Network Security, vol.19, no.5, pp. 653-659, Sep. 2017.
4 S. Park, "A Comparative Analysis of PKI Authentication and FIDO Authentication," Journal of the Korea Institute of Information and Communication Engineering, vol. 21, no. 7, pp. 1411-1419, Jul. 2017.   DOI
5 Z. Zheng, S. Xie, H. Dai, X. Chen, and H. Wang, "An Overview of Blockchain Technology: Architecture, Consensus, and Future Trends," in Proceeding of 2017 IEEE International Congress on Big Data (BigData Congress), Honolulu, USA, 25-30, Jun. 2017.
6 K. Krombholz, A. Judmayer, M. Gusenbauer, and E. Weippl, "The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy," in Proceeding of International Conference on Financial Cryptography and Data Security, Christ Church, Barbados, pp. 555-580, Feb. 22-26, 2016.
7 V. Buterin, "A Next-Generation Smart Contract and Decentralized Application Platform," White Paper, 2013 [Internet]. Available :http://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf.
8 Ripple Labs Inc.. "Ripple: A Primer," White Paper, 2018 [Internet]. Available:https://bravenewcoin.com/assets/Whitepapers/ripple-primer.pdf
9 FIDO Alliance, "2017 State of Authentication Report," White Paper, 2017[Internet]. Available : https://fidoalliance.org/wp-content/uploads/The-State-of-Authentication-Report.pdf
10 H. S. Park, J. H. Lee, and S. C. Park, "Implementation, Security, and Usability Analysis of Accredited Certificatebased Internet Banking," Journal of Internet Computing and Services, vol. 18, no. 4, pp. 69-79, Aug. 2017.   DOI
11 A. Hiltgen, T. Kramp, and T. Weigold, "Secure Internet Banking Authentication," IEEE Security & Privacy, pp. 21-29, Mar/Apr. 2006.
12 Financial Services Commission, "Memory Hacking Related Press Release," FSC Press Release, Jan. 2014[Internet]. Available : https://www.fsc.go.kr/downManager?bbsid=BBS0030&no=88525
13 F. M. Bencic, and I. P. Zarko, "Distributed Ledger Technology: Blockchain Compared to Directed Acyclic Graph," Cornell University Library, arXiv:1804.10013 [cs.DC], Apr. 2018.
14 Financial Services Commission, "Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies," IEEE Communications Surveys & Tutorials, vol. 18, no. 3, pp. 2084-2123, Feb/Mar. 2016.   DOI