Skip to main content

A Hierarchical Deterministic Wallet Using Ed25519 Digital Signature Scheme

  • Conference paper
  • First Online:
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications (FDSE 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1688))

Included in the following conference series:

  • 1824 Accesses

Abstract

On the Internet, most financial applications apply public key cryptography to verify users’ identities, manage their digital assets, authenticate and authorize them, etc. In a blockchain system, this model is crucial to keep the system working, since there are no intermediaries or a central database for management. Commonly, users can manage their key pair using the blockchain wallet, also known as ‘crypto wallets.’ In practice, the user has to keep track of many key pairs for each asset, which is inefficient. We use a hierarchical deterministic wallet (HD wallet) to solve this problem, which can derive hundreds of child wallets from a single master key-pair. Currently, there are already multiple protocols for an HD wallet for Secp256k1 while those for Ed25519 are neither well-known nor well developed. In this thesis, we will try to analyze and build an HD wallet for Ed25519 signature schema.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    According to https://www.varonis.com/blog/cybersecurity-statistics.

  2. 2.

    Certicom Research, http://www.secg.org/sec2-v2.pdf.

  3. 3.

    The readers interested in the detailed implementation and the maths behind the scene can find those at https://www.rfc-editor.org/rfc/rfc6979.html, which also includes the proof-of-correctness of the signature algorithm.

  4. 4.

    “This poses a problem for many cryptographic protocols using elliptic curves: censorship-circumvention protocols, for example, and password-authenticated key-exchange protocols”, as stated in According to SafeCurves, https://safecurves.cr.yp.to/ind.html by the author of Ed.

  5. 5.

    The readers can find the details of the algorithm at https://datatracker.ietf.org/doc/html/rfc8032.

  6. 6.

    Available at https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki.

  7. 7.

    Available at https://github.com/satoshilabs/slips/blob/master/slip-0010.md.

  8. 8.

    Available at https://github.com/satoshilabs/slips/blob/master/slip-0023.md.

  9. 9.

    Available at https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki.

  10. 10.

    Available at https://github.com/npsables/hdcore.

  11. 11.

    Available at https://github.com/thangND026317/hd-wallet-ui.

  12. 12.

    Available at https://github.com/npsables/address_service.

References

  1. Schmidt, J., Medwed, M.: A fault attack on ECDSA. In: Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC) 2009, pp. 93–99 (2009). https://doi.org/10.1109/FDTC.2009.38

  2. Console Hacking 2010 - PS3 Epic Fail, Archived 15 December 2014, at the Wayback Machine, pp. 123–128 (2014)

    Google Scholar 

  3. Android Security Vulnerability, Bitcoin, 11 August 2013. https://bitcoin.org/en/alert/2013-08-11-android

  4. Bos, J.W., Costello, C., Longa, P., Naehrig, M.: Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. IACR: Cryptology ePrint Archive, p. 130 (2014). http://eprint.iacr.org/2014/130

  5. Izu, T., Kogure, J., Noro, M., Yokoyama, K.: Efficient implementation of Schoof’s algorithm. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 66–79. Springer, Heidelberg (1998). https://doi.org/10.1007/3-540-49649-1_7

    Chapter  Google Scholar 

  6. Internet archive: Web 3 Research, Key recovery attack on BIP32-Ed25519, 2 December 2018. https://web.archive.org/web/20210513183118/https://forum.w3f.community/t/key-recovery-attack-on-bip32-ed25519/44

  7. Joye, M., Yen, S.-M.: The montgomery powering ladder. In: Kaliski, B.S., Koç, K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 291–302. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36400-5_22

    Chapter  Google Scholar 

  8. Solana Labs, Ed25519 BIP32, 10 October 2019. https://github.com/solana-labs/solana/issues/6301

  9. Edwards, H.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393–423 (2007). https://doi.org/10.1090/S0273-0979-07-01153-6

    Article  MathSciNet  MATH  Google Scholar 

  10. Bernstein, D.J., Duif, N., Lange, T., Schwabe, P., Yang, B.Y.: High-speed high-security signatures. J. Cryptogr. Eng. 2, 124–142 (2011). https://doi.org/10.1007/978-3-642-23951-9_9

    Article  MATH  Google Scholar 

  11. Khovratovich, D., Law, J.: BIP32-Ed25519: hierarchical deterministic keys over a non-linear keyspace. In: 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 27–31 (2017). https://doi.org/10.1109/EuroSPW.2017.47

  12. Jaga, T.: Thenewboston HD Wallet, 10 July 2021. https://github.com/tomijaga/tnb-hd-wallet

Download references

Acknowledgment

We acknowledge Ho Chi Minh City University of Technology (HCMUT), VNU-HCM, for supporting this study.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Khuong Nguyen-An .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Nguyen-Dinh, T., Nguyen-Nguyen, P., Phan, T., Nguyen-An, K. (2022). A Hierarchical Deterministic Wallet Using Ed25519 Digital Signature Scheme. In: Dang, T.K., Küng, J., Chung, T.M. (eds) Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications. FDSE 2022. Communications in Computer and Information Science, vol 1688. Springer, Singapore. https://doi.org/10.1007/978-981-19-8069-5_16

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-8069-5_16

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-8068-8

  • Online ISBN: 978-981-19-8069-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics