Articles | Open Access | DOI: https://doi.org/10.37547/tajet/Volume07Issue05-06

Cryptographic techniques in blockchain for enhanced digital asset security

Poltavskyi Dmytro , Team lead at Upland.me Poland, Warsaw

Abstract

This article examines the role cryptographic methods play in protecting digital assets through blockchain systems, with a particular focus on their adjustment to contemporary challenges and technological trends. An endeavor is undertaken to systematize major cryptographic algorithms, their effective appraisal in data protection, and development prospects under quantum computing threats. The study is relevant because centralized systems increasingly depend on cryptography due to greater regulatory pressures and, above all, a need for security through secrecy. The scientific novelty lies in the detailed comparative analysis of the said methodology (hashing, digital signatures, zero-knowledge proofs) for cases relating to major blockchain platforms (Bitcoin, Ethereum, Zcash), which hence demonstrate varied approaches towards security provision. The study's methodological foundation consists of analyzing 13 sources, merging a qualitative examination of algorithms and ECDSA with zk-SNARKs with a quantitative assessment of their effectiveness. Hash functions and Merkle trees ensure data integrity while reducing the computational costs of verification; asymmetric cryptography and Zero-Knowledge Proofs guarantee authenticity and confidentiality for the function of the transaction. Main findings support that cryptography is the cornerstone technology for blockchain security, but it has to be tailored to meet new challenges. Development in post-quantum algorithms and the infusion of homomorphic encryption will soon become imperative for quantum threats. This paper strongly advocates hybrid solutions that would bring traditional ways merged with novelties, which will provide sustainability over time for digital assets. Thus, this article will be useful for Developers of Blockchain Systems, Cryptographers, Cybersecurity Experts, & Regulators willing to know how protection methods for digital assets evolve.

Keywords

blockchain, cryptographic methods, digital assets, data security, hash functions, digital signatures

References

M. Tarawneh, “Perspective Chapter: Cryptography – Recent Advances and Research Perspectives,” in Biometrics and Cryptography, BoD – Books on Demand, 2024.

H. Blake, H. Bullock, and N. Chouliara, “Enablers and Barriers to Mental Health Initiatives in Construction SMEs,” Occupational Medicine, vol. 73, no. 6, Jul. 2023, doi: https://doi.org/10.1093/occmed/kqad075.

K. Raut, “Secure Message Hashing with SHA-256: Cryptographic Implementation,” International Journal for Research in Applied Science and Engineering Technology, vol. 12, no. 11, pp. 1288–1294, Nov. 2024, doi: https://doi.org/10.22214/ijraset.2024.65078.

X. Wang et al., “Integrating Merkle Trees with Transformer Networks for Secure Financial Computation,” Applied sciences, vol. 14, no. 4, pp. 1386–1386, Feb. 2024, doi: https://doi.org/10.3390/app14041386.

C. Shekhar and R. K. Yadav, “An innovative and secured electronic voting system based on Elliptic Curve Signing Approach (ECDSA) and digital signatures,” International Journal of Information Technology, Mar. 2025, doi: https://doi.org/10.1007/s41870-025-02405-3.

I. Aad, “Zero-Knowledge Proof,” in Trends in Data Protection and Encryption Technologies, Springer, 2023.

G. Chen, “Optimizing Digital Signatures for Enhanced Privacy Protection in Blockchain Systems,” Applied and Computational Engineering, vol. 110, no. 1, pp. 96–101, Nov. 2024, doi: https://doi.org/10.54254/2755-2721/110/2024melb0105.

D.-S. Kim, I. S. Igboanusi, L. A. Chijioke Ahakonye, and G. O. Anyanwu, “Proof-of-Authority-and-Association Consensus Algorithm for IoT Blockchain Networks,” in 2025 IEEE International Conference on Consumer Electronics (ICCE), IEEE, Jan. 2025. doi: https://doi.org/10.1109/icce63647.2025.10930052.

“Bitcoin Energy Consumption Index - Digiconomist,” Digiconomist, 2024. https://digiconomist.net/bitcoin-energy-consumption (accessed Mar. 21, 2025).

C. Gilbert and M. Gilbert, “Investigating the Challenges and Solutions in Cybersecurity Using Quantum Computing and Cryptography,” International Research Journal of Advanced Engineering and Science, vol. 9, no. 4, pp. 291–315, Dec. 2024.

K. Paruchuru, Aneeshkumar Perukilakattunirappel Sundareswaran, and Akshun Chhapola, “The Impact of Data Privacy Laws, such as GDPR, on the Design and Operation of WMS,” International Journal of Research in Modern Engineering and Emerging Technology, vol. 13, no. 3, pp. 183–203, Mar. 2025, doi: https://doi.org/10.63345/ijrmeet.org.v13.i3.11.

A. Marlyn Rose and T. Prabu Vengatesh, “Understanding Cryptocurrency and Blockchain Technology: a Comprehensive Overview,” in The International Conference on Fintech: Digital Transformation of Financial Services-ICF2023, Sep. 2023.

A. Sideris, T. Sanida, and M. Dasygenis, “A Novel Hardware Architecture for Enhancing the Keccak Hash Function in FPGA Devices,” MDPI Information, vol. 14, no. 9, p. 475, Sep. 2023, doi: https://doi.org/10.3390/info14090475.

H. Syed, A. Paul, M. Singh, and M. Rajan, “An Efficient Two-Party ECDSA Scheme for Cryptocurrencies,” Lecture notes in computer science, pp. 411–430, Jan. 2023, doi: https://doi.org/10.1007/978-3-031-49099-6_25.

P. Jaya, None Sawaluddin, and Elviawaty Muiza Zamzami, “Comparison of ECDHE-ECDSA and ECDHE-RSA on SSL/TSL,” in 2023 IEEE 7th International Conference on Information Technology, Information Systems and Electrical Engineering, Nov. 2023. doi: https://doi.org/10.1109/icitisee58992.2023.10404441.

Mariia Mykhailova, “Teaching Quantum Computing Using Microsoft Quantum Development Kit and Azure Quantum,” in 2023 IEEE International Conference on Quantum Computing and Engineering (QCE), Sep. 2023. doi: https://doi.org/10.1109/qce57702.2023.20320.

Article Statistics

Copyright License

Download Citations

How to Cite

Poltavskyi Dmytro. (2025). Cryptographic techniques in blockchain for enhanced digital asset security. The American Journal of Engineering and Technology, 7(05), 76–87. https://doi.org/10.37547/tajet/Volume07Issue05-06