Skip to main content

2020 | OriginalPaper | Buchkapitel

Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains

verfasst von : Adriano Di Luzio, Danilo Francati, Giuseppe Ateniese

Erschienen in: Cryptology and Network Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This work presents Arcula, a new design for hierarchical deterministic wallets that brings identity-based public keys to the blockchain. Arcula is built on top of provably secure cryptographic primitives. It generates all its cryptographic secrets from a user-provided seed and enables the derivation of new public keys based on the identities of users, without requiring any secret information. Unlike other wallets, it achieves all these properties while being secure against privilege escalation. We formalize the security model of hierarchical deterministic wallets and prove that an attacker compromising an arbitrary number of users within an Arcula wallet cannot escalate his privileges and compromise users higher in the access hierarchy. Our design works out-of-the-box with any blockchain that enables the verification of signatures on arbitrary messages. We evaluate its usage in a real-world scenario on the Bitcoin Cash network.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Arcula is the Latin word to define the small casket where ancient Romans used to store their jewels.
 
2
In general, the administrator of the wallet is the highest privileged user in the hierarchy.
 
3
The value https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-65411-5_16/495546_1_En_16_IEq238_HTML.gif is the public label (binary string) associated by the DHKA to the node https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-65411-5_16/495546_1_En_16_IEq239_HTML.gif . Without loss of generality we can assume that https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-65411-5_16/495546_1_En_16_IEq240_HTML.gif (the public label https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-65411-5_16/495546_1_En_16_IEq241_HTML.gif is just the node number https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-65411-5_16/495546_1_En_16_IEq242_HTML.gif ).
 
5
Another advantage of P2SH is that it hides the details of the locking script until the users redeem the coins sent by the transaction.
 
6
The transcripts of the transactions are available, respectively, at https://​bit.​ly/​2UI62tt and https://​bit.​ly/​2UoQNGI.
 
7
The sanitizable keys can be hierarchically deployed by leveraging a second instance of DHKA.
 
Literatur
2.
Zurück zum Zitat Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(3), 1–43 (2009)CrossRef Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. (TISSEC) 12(3), 1–43 (2009)CrossRef
3.
Zurück zum Zitat Ateniese, Giuseppe., Chou, Daniel H., de Medeiros, Breno, Tsudik, Gene: Sanitizable signatures. In: di Vimercati, Sabrina de Capitani, Syverson, Paul, Gollmann, Dieter (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005). https://doi.org/10.1007/11555827_10CrossRef Ateniese, Giuseppe., Chou, Daniel H., de Medeiros, Breno, Tsudik, Gene: Sanitizable signatures. In: di Vimercati, Sabrina de Capitani, Syverson, Paul, Gollmann, Dieter (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 159–177. Springer, Heidelberg (2005). https://​doi.​org/​10.​1007/​11555827_​10CrossRef
5.
Zurück zum Zitat Courtois, N.T., Valsorda, F., Emirdag, P.: Private key recovery combination attacks: on extreme fragility of popular bitcoin key management, wallet and cold storage solutions in presence of poor RNG events (2014) Courtois, N.T., Valsorda, F., Emirdag, P.: Private key recovery combination attacks: on extreme fragility of popular bitcoin key management, wallet and cold storage solutions in presence of poor RNG events (2014)
6.
Zurück zum Zitat Das, P., Faust, S., Loss, J.: A formal treatment of deterministic wallets. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 651–668 (2019) Das, P., Faust, S., Loss, J.: A formal treatment of deterministic wallets. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 651–668 (2019)
7.
Zurück zum Zitat De Santis, A., Ferrara, A.L., Masucci, B.: New constructions for provably-secure time-bound hierarchical key assignment schemes. Theor. Comput. Sci. 407(1–3), 213–230 (2008)MathSciNetCrossRefMATH De Santis, A., Ferrara, A.L., Masucci, B.: New constructions for provably-secure time-bound hierarchical key assignment schemes. Theor. Comput. Sci. 407(1–3), 213–230 (2008)MathSciNetCrossRefMATH
8.
Zurück zum Zitat Di Luzio, A., Francati, D., Ateniese, G.: Arcula: A secure hierarchical deterministic wallet for multi-asset blockchains. arXiv preprint arXiv:1906.05919 (2019) Di Luzio, A., Francati, D., Ateniese, G.: Arcula: A secure hierarchical deterministic wallet for multi-asset blockchains. arXiv preprint arXiv:​1906.​05919 (2019)
9.
Zurück zum Zitat Dikshit, P., Singh, K.: Efficient weighted threshold ECDSA for securing bitcoin wallet. In: 2017 ISEA Asia Security and Privacy (ISEASP), pp. 1–9. IEEE (2017) Dikshit, P., Singh, K.: Efficient weighted threshold ECDSA for securing bitcoin wallet. In: 2017 ISEA Asia Security and Privacy (ISEASP), pp. 1–9. IEEE (2017)
12.
Zurück zum Zitat Goldfeder, S., et al.: Securing bitcoin wallets via a new DSA/ECDSA threshold signature scheme (2015) Goldfeder, S., et al.: Securing bitcoin wallets via a new DSA/ECDSA threshold signature scheme (2015)
Metadaten
Titel
Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains
verfasst von
Adriano Di Luzio
Danilo Francati
Giuseppe Ateniese
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-65411-5_16