Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage

@inproceedings{Gutoski2014HierarchicalDB,
  title={Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage},
  author={Gus Gutoski and Douglas Stebila},
  booktitle={Financial Cryptography},
  year={2014}
}
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among… 
Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks
TLDR
A novel HD wallet scheme that gives out a signature with trapdoor hash functions instead of directly giving anyone private keys for signing to achieve user anonymity, public key derivation and high scalability.
Secure hierarchical Bitcoin wallet scheme against privilege escalation attacks
TLDR
A novel HD wallet scheme that gives out a signature with trapdoor hash functions instead of directly giving private keys for signing to achieve user anonymity, public key derivation, and high scalability.
A Formal Treatment of Deterministic Wallets
TLDR
This work proposes the first comprehensive security model for hot/cold wallets and develops wallet schemes that are provable secure within these models and provides a new provably secure ECDSA-based hot/ cold wallet scheme that can be integrated into legacy cryptocurrencies such as Bitcoin.
MOBT: A kleptographically-secure hierarchical-deterministic wallet for multiple offline Bitcoin transactions
TLDR
This paper proposes a secure and efficient Bitcoin payments in multiple offline transactions, which relies on the master public key property of the hierarchical deterministic (HD) wallet to generate the key pairs of the offline wallet (MOBT).
The Exact Security of BIP32 Wallets
TLDR
This work proposes the first formal analysis of the BIP32 system in its entirety and without any modification and gives a security reduction in this model from the existential unforgeability of the ECDSA signature algorithm that is used in Bip32.
Deterministic Wallets in a Quantum World
TLDR
This work gives a generic wallet construction with security in the quantum random oracle model (QROM) if the underlying signature scheme is secure in the QROM and designs the first post-quantum secure signature scheme with rerandomizable public keys by giving a construction from generic lattice-based Fiat-Shamir signature schemes.
Efficient Bitcoin Password-protected Wallet Scheme with Key-dependent Message Security
TLDR
This paper proposes a new password-protected wallet scheme that uses a KDM secure scheme to encrypt wallet files and proves that the scheme is KDM-CCA secure and the semi-trust cloud server cannot get any information of the backup files.
CryptoWills: How to Bequeath Cryptoassets
TLDR
This paper formally defines the security goals of a cryptographic will (cryptowill) protocol and subsequently present schemes fulfilling the required security properties.
Strengthening the bitcoin safety: a graded span based key partitioning mechanism
TLDR
A private key safety model is proposed for safely keeping the sub elements of the private key under different spans that introduce syntactic, semantic and cognitive safety control to minimize the complete key loss.
Möbius: Trustless Tumbling for Transaction Privacy
TLDR
Möbius achieves strong notions of anonymity, as even malicious senders cannot identify which pseudonyms belong to the recipients to whom they sent money, and is able to resist denial-of-service attacks.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 18 REFERENCES
GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks
TLDR
This paper provides a proof for GQ based on the assumed security of RSA under one more inversion, an extension of the usual one-wayness assumption that was introduced in [5].
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events
TLDR
This paper proposes new more advanced combination attacks in which the security of keys hold in cold storage can be compromised without executing any software exploit on the cold system, but through security incidents at operation such as bad random number or related random events.
Intractable Problems in Cryptography
We examine several variants of the Diffie-Hellman and Discrete Log problems that are connected to the security of cryptographic protocols. We dis- cuss the reductions that are known between them and
Another look at non-standard discrete log and Diffie-Hellman problems
Abstract We examine several versions of the one-more-discrete-log and one-more-Diffie-Hellman problems. In attempting to evaluate their intractability, we find conflicting evidence of the relative
BIP32: Hierarchical Deterministic Wallets (February 2012), https: //github.com/bitcoin/bips/blob/master/bip-0032.mediawiki
  • 2012
Deterministic wallets
  • https://bitcointalk.org/index.php?topic= 19137
  • 2011
Coinkite. https://coinkite
  • Coinkite. https://coinkite
  • 2014
Bitcoin: A peer-to-peer electronic cash system (2008), https:// bitcoin.org/bitcoin.pdf 11. National Institute of Standards and Technology: FIPS-186-4: Digital Signature Standard (DSS)
  • Bitcoin: A peer-to-peer electronic cash system (2008), https:// bitcoin.org/bitcoin.pdf 11. National Institute of Standards and Technology: FIPS-186-4: Digital Signature Standard (DSS)
  • 2013
Bitcoin: A peer-to-peer electronic cash system (2008), https:// bitcoin.org/bitcoin.pdf 12. National Institute of Standards and Technology: FIPS-186-4: Digital Signature Standard (DSS)
  • Bitcoin: A peer-to-peer electronic cash system (2008), https:// bitcoin.org/bitcoin.pdf 12. National Institute of Standards and Technology: FIPS-186-4: Digital Signature Standard (DSS)
  • 2013
Deterministic wallets, their advantages and their understated flaws
  • Bitcoin Magazine (November
  • 2013
...
1
2
...