Abstract
With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin private keys, we propose the use of a hardware token for the authorization of transactions. We created a proof-of-concept Bitcoin hardware token: BlueWallet. The device communicates using Bluetooth Low Energy and is able to securely sign Bitcoin transactions. The device can also be used as an electronic wallet in combination with a point of sale and serves as an alternative to cash and credit cards.
Chapter PDF
Similar content being viewed by others
References
Litke, P., Stewart, J.: Cryptocurrency-stealing malware landscape (2014) (retrieved March 2014)
Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008), http://bitcoin.org/bitcoin.pdf (retrieved March 2014)
Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: Peer-to-Peer Computing (P2P) (2013)
Standards for Efficient Cryptography (SEC): SEC 2: Recommended elliptic curve domain parameters. Technical report, Certicom Research (2000)
Jonathan Fildes: PS3 ECDSA security failure, http://www.bbc.co.uk/news/technology-12116051 (retrieved March 2014)
Dubuisson, O.: ASN. 1: communication between heterogeneous systems. Morgan Kaufmann (2001)
Karame, G., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? double-spending attacks on fast payments in Bitcoin. IACR Cryptology ePrint Archive (2012)
Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a Snack, Pay with Bitcoins. In: 13th IEEE International Conference on Peer-to-Peer Computing (P2P), Trento, Italy (2013)
Univision Technology Inc.: UG-2864HSWEG01 datasheet, SAS1-9046-B (2009) (retrieved March 2014)
Bluegiga: BLE113 datasheet v1.2 (2013) (retrieved March 2014)
STMicroelectronics: STM32F205xx STM32F207xx datasheet, Doc ID 15818 Rev 9 (2012) (retrieved March 2014)
Bronleewe, D.A.: Bitcoin NFC. Technical report, University of Texas (2011)
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better — how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012)
Boehm, F., Pesch, P.: Bitcoin: A First Legal Analysis - with Reference to German and American Law. In: Workshop on Bitcoin Research (2014)
Litke, P., Stewart, J.: Enterprise best practices for cryptocurrency adoption (2014) (retrieved March 2014)
Hiltgen, A., Kramp, T., Weigold, T.: Secure internet banking authentication. Security & Privacy (2006)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation (1987)
Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)
Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security (2001)
Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. Microsoft Research (November 2013)
Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of Bluetooth Low Energy: An emerging low-power wireless technology. Sensors (2012)
Kamath, S., Lindh, J.: Measuring Bluetooth Low Energy power consumption. Texas instruments application note AN092, Dallas (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Bamert, T., Decker, C., Wattenhofer, R., Welten, S. (2014). BlueWallet: The Secure Bitcoin Wallet. In: Mauw, S., Jensen, C.D. (eds) Security and Trust Management. STM 2014. Lecture Notes in Computer Science, vol 8743. Springer, Cham. https://doi.org/10.1007/978-3-319-11851-2_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-11851-2_5
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-11850-5
Online ISBN: 978-3-319-11851-2
eBook Packages: Computer ScienceComputer Science (R0)