loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: ChihYun Chuang 1 ; Ihung Hsu 1 and TingFang Lee 2

Affiliations: 1 AMIS, Taipei, Taiwan ; 2 Department of Population Health, NYU Grossman School of Medicine, New York, U.S.A.

Keyword(s): Secure Two-Party Computation, Cryptocurrencies, Key Derivation, Key Generation, Wallets.

Abstract: The applications of Hierarchical Deterministic Wallet are rapidly growing in various areas such as cryptocurrency exchanges and hardware wallets. Improving privacy and security is more important than ever. In this study, we proposed a protocol that fully support a two-party computation of BIP32. Our protocol, similar to the distributed key generation, can generate each party’s secret share, the common chain-code, and the public key without revealing a seed and any descendant private keys. We also provided a simulation-based proof of our protocol assuming a rushing, static, and malicious adversary in the hybrid model. Our master key generation protocol produces up to total of two bit leakages from a honest party given the feature that the seeds will be re-selected after each execution. The proposed hardened child key derivation protocol leads up to a one bit leakage in the worst situation of simulation from a honest party and will be accumulated with each execution. Fortunately, in re ality, this issue can be largely mitigated by adding some validation criteria of boolean circuits and masking the input shares before each execution. We then implemented the proposed protocol and ran in a single thread on a laptop which turned out with practically acceptable execution time. Lastly, the outputs of our protocol can be easily integrated with many threshold sign protocols. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.227.228.95

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Chuang, C.; Hsu, I. and Lee, T. (2023). A Two-Party Hierarchical Deterministic Wallets in Practice. In Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT; ISBN 978-989-758-666-8; ISSN 2184-7711, SciTePress, pages 850-856. DOI: 10.5220/0012138700003555

@conference{secrypt23,
author={ChihYun Chuang. and Ihung Hsu. and TingFang Lee.},
title={A Two-Party Hierarchical Deterministic Wallets in Practice},
booktitle={Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT},
year={2023},
pages={850-856},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012138700003555},
isbn={978-989-758-666-8},
issn={2184-7711},
}

TY - CONF

JO - Proceedings of the 20th International Conference on Security and Cryptography - SECRYPT
TI - A Two-Party Hierarchical Deterministic Wallets in Practice
SN - 978-989-758-666-8
IS - 2184-7711
AU - Chuang, C.
AU - Hsu, I.
AU - Lee, T.
PY - 2023
SP - 850
EP - 856
DO - 10.5220/0012138700003555
PB - SciTePress