Abstract
On the Internet, most financial applications apply public key cryptography to verify users’ identities, manage their digital assets, authenticate and authorize them, etc. In a blockchain system, this model is crucial to keep the system working, since there are no intermediaries or a central database for management. Commonly, users can manage their key pair using the blockchain wallet, also known as ‘crypto wallets.’ In practice, the user has to keep track of many key pairs for each asset, which is inefficient. We use a hierarchical deterministic wallet (HD wallet) to solve this problem, which can derive hundreds of child wallets from a single master key-pair. Currently, there are already multiple protocols for an HD wallet for Secp256k1 while those for Ed25519 are neither well-known nor well developed. In this thesis, we will try to analyze and build an HD wallet for Ed25519 signature schema.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
According to https://www.varonis.com/blog/cybersecurity-statistics.
- 2.
Certicom Research, http://www.secg.org/sec2-v2.pdf.
- 3.
The readers interested in the detailed implementation and the maths behind the scene can find those at https://www.rfc-editor.org/rfc/rfc6979.html, which also includes the proof-of-correctness of the signature algorithm.
- 4.
“This poses a problem for many cryptographic protocols using elliptic curves: censorship-circumvention protocols, for example, and password-authenticated key-exchange protocols”, as stated in According to SafeCurves, https://safecurves.cr.yp.to/ind.html by the author of Ed.
- 5.
The readers can find the details of the algorithm at https://datatracker.ietf.org/doc/html/rfc8032.
- 6.
- 7.
- 8.
- 9.
- 10.
Available at https://github.com/npsables/hdcore.
- 11.
Available at https://github.com/thangND026317/hd-wallet-ui.
- 12.
Available at https://github.com/npsables/address_service.
References
Schmidt, J., Medwed, M.: A fault attack on ECDSA. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2009, pp. 93–99 (2009). https://doi.org/10.1109/FDTC.2009.38
Console Hacking 2010 - PS3 Epic Fail, Archived 15 December 2014, at the Wayback Machine, pp. 123–128 (2014)
Android Security Vulnerability, Bitcoin, 11 August 2013. https://bitcoin.org/en/alert/2013-08-11-android
Bos, J.W., Costello, C., Longa, P., Naehrig, M.: Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. IACR: Cryptology ePrint Archive, p. 130 (2014). http://eprint.iacr.org/2014/130
Izu, T., Kogure, J., Noro, M., Yokoyama, K.: Efficient implementation of Schoof’s algorithm. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 66–79. Springer, Heidelberg (1998). https://doi.org/10.1007/3-540-49649-1_7
Internet archive: Web 3 Research, Key recovery attack on BIP32-Ed25519, 2 December 2018. https://web.archive.org/web/20210513183118/https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44
Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291–302. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_22
Solana Labs, Ed25519 BIP32, 10 October 2019. https://github.com/solana-labs/solana/issues/6301
Edwards, H.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393–423 (2007). https://doi.org/10.1090/S0273-0979-07-01153-6
Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2, 124–142 (2011). https://doi.org/10.1007/978-3-642-23951-9_9
Khovratovich, D., Law, J.: BIP32-Ed25519: hierarchical deterministic keys over a non-linear keyspace. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 27–31 (2017). https://doi.org/10.1109/EuroSPW.2017.47
Jaga, T.: Thenewboston HD Wallet, 10 July 2021. https://github.com/tomijaga/tnb-hd-wallet
Acknowledgment
We acknowledge Ho Chi Minh City University of Technology (HCMUT), VNU-HCM, for supporting this study.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nguyen-Dinh, T., Nguyen-Nguyen, P., Phan, T., Nguyen-An, K. (2022). A Hierarchical Deterministic Wallet Using Ed25519 Digital Signature Scheme. In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2022. Communications in Computer and Information Science, vol 1688. Springer, Singapore. https://doi.org/10.1007/978-981-19-8069-5_16
Download citation
DOI: https://doi.org/10.1007/978-981-19-8069-5_16
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-8068-8
Online ISBN: 978-981-19-8069-5
eBook Packages: Computer ScienceComputer Science (R0)