Skip to main content

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain

  • Conference paper
  • First Online:
Wireless Algorithms, Systems, and Applications (WASA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 11604))

  • 2223 Accesses

Abstract

In Bitcoin, the knowledge of private key equals to the ownership of bitcoin, which occurs two problems: the first problem is that the private key must be kept properly, and the second one is that once the private key is given, it can’t be taken back, hence the bitcoin system can only implement the transfer function. In this paper, we first propose a new digital signature algorithm and use it to design an online wallet, which can help the user derive the signature without obtaining the user’s private key. Secondly, using our proposed online wallet, we extend the application of private key so that the cryptocurrency system can implement the authorization function. In more detail, we define a new primitive that we call decentralized hierarchical authorized payment scheme (DHAP scheme). We next propose a concrete instantiation and prove its correctness. Finally, we analyze the security and usability of our scheme. For security, we prove our scheme to be secure under the random oracle model. For usability, we examine its performance and compare it with bitcoin’s performance.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nakamoto, S.: Bitcoin: A Peer-To-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf

  2. Eyal, I., Gencer, A.E., Sirer, E.G., et al.: Bitcoin-NG: a scalable blockchain protocol. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp. 45–59 (2016)

    Google Scholar 

  3. Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, p. 310 (2016)

    Google Scholar 

  4. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-46803-6_10

    Google Scholar 

  5. Yossi, G., Rotem, H., Silvio, M., et al.: Algorand: scaling Byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51–68. ACM (2017)

    Google Scholar 

  6. Zhengtong, T.: Summary of typical token stolen case hacking methods in history. https://www.tokenhand.net/posts/103

  7. Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858. IEEE (2016). https://doi.org/10.1109/SP.2016.55

  8. Zhao, J.L., Fan, S., Yan, J.: Overview of business innovations and research opportunities in blockchain and introduction to the special issue. Financ. Innov. 1(2), 28 (2016)

    Google Scholar 

  9. Wuille, P.: BIP32: hierarchical deterministic wallets, February 2012. https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki

  10. Gutoski, G., Stebila, D.: Hierarchical deterministic Bitcoin wallets that tolerate key leakage. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 497–504. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_31

    Google Scholar 

  11. Armory: Armory Secure Wallet. https://bitcoinarmory.com

  12. Bitcoin CD: Bitcoin Core. https://bitcoin.org

  13. Dmitrienko, A., Noack, D., Yung, M.: In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 520–531. ACM (2017)

    Google Scholar 

  14. Eskandari, S., Clark, J., Barrera, D., et al.: A first look at the usability of bitcoin key management. preprint arXiv arXiv: 1802.04351 (2018). Journal 2(5), 99–110 (2016)

  15. Kaliski, B.: PKCS 5: password-based cryptography specification version 2.0. http://www.rfc-editor.org/info/rfc2898

  16. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 11(37), 2245–2255 (2004)

    Google Scholar 

  17. Gennaro, R., Goldfeder, S., Narayanan, A.: Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 156–174. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-39555-5_9

    Google Scholar 

  18. Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 3(4), 161–174 (1991)

    Google Scholar 

  19. Bellare, M., Rogaway, P.: Random oracles are practical-a paradigm for designing efficient protocols. In: Proceedings of the First ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993)

    Google Scholar 

  20. Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996). https://doi.org/10.1007/3-540-68339-9_34

    Google Scholar 

Download references

Acknowledgement

This work is supported by National Key R&D Program of China (No. 2018YFB0803402), National Natural Science Foundation of China (No. 61702503) and National Natural Science Foundation of China (No. 61772516).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mingsheng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wei, Q., Li, S., Li, W., Li, H., Wang, M. (2019). Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham. https://doi.org/10.1007/978-3-030-23597-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-23597-0_29

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics