Enhanced Block Chain Financial Transaction Security Using Chain Link Smart Agreement based Secure Elliptic Curve Cryptography
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2025.16.10.06Keywords:
Decentralised, Blockchain, Security, Elliptic Curve Cryptography, information, Financial Data, authenticationDimensions Badge
Issue
Section
License
Copyright (c) 2025 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Blockchain technology to offer transparency and Security within financial management in the banking industry. By building a financial data information collection, information exchange, and information security information Agreement mechanism to improve the efficiency of the existing financial control system, a more effective financial control mechanism can therefore be introduced, and through it, significantly drive down the cost of financial data, the audit cycle, and enhance the Security of information. The current problems of data security, inefficiency of low information, accelerated transactions, and the cost and exchange rate of information under traditional financial control systems, which are supposed to guarantee data integrity. The proposed method, Chain Link Smart Agreement based on Secure Elliptic Curve Cryptography (CLSA-SEC2), aims to generate a secure authentication key for data encryption and decryption. The initial step is Primary Key Node Generation (PKNG) for User Identity Verification, which transfers secure financial data into blocks.A decentralized blockchain divides each block of data into blocks stored at different locations. In chain-link aggregation to produce a unique key to each block series sequence, to ensure the process of communication and Transaction is secure under a decentralized block chain. And it validates the user transaction based on the Access Block Sequence Rate (ABSR) in data access. Build blocks are controlled by a key that is verified from the controller node. A Sequential Searchable Attribute Key (S2AK) is used to simplify the calculation of the user authentication phase’s cost. Lastly, its security analysis demonstrates that a decentralized block chain network will render the traditional system of centralised audit systems obsolete, providing digitally sealed and verified results of certification and enhancing financial transparency and Security.Abstract
How to Cite
Downloads
Similar Articles
- Niharika Bharti, Photomodulation of strigolactones in mediating sunflower seedling growth , The Scientific Temper: Vol. 14 No. 02 (2023): The Scientific Temper
- Maysam A. Khabisi, Azar B. Masoudzade, Neda F. Rad, On the effectiveness of receiving teacher and peer feedback as a mediator on Iranian English as a Foreign Language learners’ writing skill: Mobile-mediated vs. direct instruction , The Scientific Temper: Vol. 14 No. 03 (2023): The Scientific Temper
- C. Agilan, Lakshna Arun, Optimization-based clustering feature extraction approach for human emotion recognition , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Jadhav Girish Vasantrao, Chirag Patel, AT&C and non-technical loss reduction in smart grid using smart metering with AI techniques , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- Jasmine A, G. Arul Selvi, Exploring Behavioural Dimensions of Social Media Engagement: An Exploratory Factor Analysis Among College Youth , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Hashmat Ali, Nishant Soren, Rohit Kumar Ravi, Kunal Kumar, Anjali, Evaluation of Standard Changes in Free Energy During Complexation of p-chlorobenzoylthioacetophenone with Some Bivalent Transition Metals , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Sadanand Maurya, Manikant Tripathi, Karunesh K. Tiwari, Awadhesh K. Shukla, Isolation and molecular characterization of microbial isolates from Saryu river water , The Scientific Temper: Vol. 14 No. 04 (2023): The Scientific Temper
- Archana Verma, Role of artificial intelligence in evaluating autism spectrum disorder , The Scientific Temper: Vol. 15 No. 02 (2024): The Scientific Temper
- Brigith Gladys L, J. Merline Vinotha, Sustainable rough multi-objective two-stage solid transportation problem of third-party e-commerce logistic providers with conditional fixed parameter on safety , The Scientific Temper: Vol. 16 No. 01 (2025): The Scientific Temper
- Sweta Sain, Nilima Kumari, BN Tripathi, TRADITIONAL USES OF LOCALLY AVAILABLE PLANTS FOR THE TREATMENT OF URINARY DISORDERS AT BANASTHALI REGION OF RAJASTHAN, INDIA , The Scientific Temper: Vol. 8 No. 1&2 (2017): The Scientific Temper
<< < 39 40 41 42 43 44 45 46 47 48 > >>
You may also start an advanced similarity search for this article.
Most read articles by the same author(s)
- A. Basheer Ahamed, M. Mohamed Surputheen, M. Rajakumar, Quantitative transfer learning- based students sports interest prediction using deep spectral multi-perceptron neural network , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
- Y. Mohammed Iqbal, M. Mohamed Surputheen, S. Peerbasha, Swarm intelligence-driven HC2NN model for optimized COVID-19 detection using lung imaging , The Scientific Temper: Vol. 16 No. 03 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, A Unified Consistency-Calibrated Boundary-Aware Framework for Generalizable Skin Cancer Detection , The Scientific Temper: Vol. 16 No. 12 (2025): The Scientific Temper
- J. Fathima Fouzia, M. Mohamed Surputheen, M. Rajakumar, Hybrid pigeon optimization-based feature selection and modified multi-class semantic segmentation for skin cancer detection (HPO-MMSS) , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- K. Mohamed Arif Khan, A.R. Mohamed Shanavas, Energy efficient techniques for iot application on resource aware fog computing paradigm , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Bio-Inspired and Machine Learning-Driven Multipath Routing Protocol for MANETs Using Predictive Link Analytics , The Scientific Temper: Vol. 16 No. 10 (2025): The Scientific Temper
- S. Mohamed Iliyas, M. Mohamed Surputheen, A.R. Mohamed Shanavas, Trust-based symmetric game theory for physical layer security in wi-fi communication , The Scientific Temper: Vol. 16 No. 05 (2025): The Scientific Temper
- S. Munawara Banu, M. Mohamed Surputheen, M. Rajakumar, Enhanced AOMDV-based multipath routing approach for mobile ad-hoc network using ETX and ant colony optimization , The Scientific Temper: Vol. 16 No. 06 (2025): The Scientific Temper
- Mudassir Peeran A, A.R. Mohamed Shanavas, A Hybrid Post-Quantum Cryptography and Machine Learning and Framework for Intrusion Detection and Downgrade Attack Prevention throughout PQC Migration , The Scientific Temper: Vol. 17 No. 01 (2026): The Scientific Temper

