Sucha Smanchat
King Mongkut’s University of Technology North Bangkok

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

NAGA: multi-blockchain based decentralized platform architecture for cryptocurrency payment Dendej Sawarnkatat; Sucha Smanchat
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 4: August 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i4.pp4067-4078

Abstract

Paying for electronic commerce products with cryptocurrencies is an increasingly popular method. However, the situations where a seller expects one specific cryptocurrency as a payment while a buyer only possesses another, inevitably create inconvenience to the buyer, which may lead to cancellation of purchase. In this paper, we propose a light-weighted software architecture of a payment system called NAGA platform that works with a number of crypto blockchain networks to support cross-cryptocurrency payments where buyers can pay in one currency, and the seller automatically receives another of his/her choice. This minimizes the complexity and inconvenience of the buyer, leading to an increase in sales and revenues of the electronic commerce system. With the built-in crypto exchange, crosscryptocurrency payment can be processed with real-time exchange rates that enables both buyers and sellers to receive cryptocurrency of their preferred choices.
Finding the Optimal Value for Threshold Cryptography on Cloud Computing Weena Janratchakool; Sirapat Boonkrong; Sucha Smanchat
International Journal of Electrical and Computer Engineering (IJECE) Vol 6, No 6: December 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (789.655 KB) | DOI: 10.11591/ijece.v6i6.pp2979-2988

Abstract

The objective of using threshold cryptography on cloud environment is to protect the keys, which are the most important elements in cryptographic systems. Threshold cryptography works by dividing the private key to a number of shares, according to the number of virtual machines, then distributing them each share to each virtual machine. In order to generate the key back, not all the shares are needed. Howerver, the problem is that there has been no research attemping to find a suitable threshold value for key reconstruction. Therefore, this paper presented a guildline designed and implemented that can assist to choose such value. The experiment was setup using CloudSim to simulate cloud environment and collecting time taken in key distribution and key reconstruction process to achieve the optimal threshold value.