Filters








48 Hits in 5.6 sec

Custody Protocols Using Bitcoin Vaults [article]

Jacob Swambo and Spencer Hommel and Bob McElrath and Bryan Bishop
2020 arXiv   pre-print
A bitcoin vault is a specific type of covenant transaction that enforces a time-lock on the transfer of control of funds to a hot wallet, but enables an immediate transfer of funds into a deep cold recovery  ...  It is shown that vault-custody protocols enable the wallet owner to specify their desired balance for an inherent trade-off between the security of and accessibility of bitcoin holdings by adjusting the  ...  Key Structure Each HM in the active and recovery wallet will generate its own key-tree for a hierarchical deterministic wallet as per BIP-0032 [Wui12] .  ... 
arXiv:2005.11776v1 fatcat:sovkhte4y5cp7lauannc6isrfa

Bitcoin and Blockchain: Security and Privacy [article]

Ehab Zaghloul, Tongtong Li, Matt Mutka, Jian Ren
2019 arXiv   pre-print
We compare three types of Bitcoin wallets in terms of security, type of services and their trade-offs.  ...  A cryptocurrency is a decentralized digital currency that is designed for secure and private asset transfer and storage. As a currency, it should be difficult to counterfeit and double-spend.  ...  Hierarchical Deterministic (HD) wallets, referred to as Type-2 wallets, were later introduced based on the BIP0032 standard [51] .  ... 
arXiv:1904.11435v1 fatcat:cn5d4vjvevcihcyi5g4j3cpipq

Secure Hierarchical Deterministic Wallet Supporting Stealth Address [article]

Xin Yin, Zhen Liu, Guomin Yang, Guoxing Chen, Haojin Zhu
2022 IACR Cryptology ePrint Archive  
Hierarchical Deterministic Wallet (HDW), proposed in Bitcoin Improvement Proposal 32 (BIP32), has attracted much attention and been widely used in the community, due to its virtues such as easy backup/  ...  In this work, we formally define the syntax and security models of Hierarchical Deterministic Wallet supporting Stealth Address (HDWSA), capturing the functionality and security (including safety and privacy  ...  Hierarchical Deterministic Wallet (HDW), proposed in BIP32 (Bitcoin Improvement Proposal 32) [28] , has been accepted as a standard in the Bitcoin community.  ... 
dblp:journals/iacr/YinLYCZ22 fatcat:6mr3zfh7tngzlclku6mei7ucam

Bitcoin Covenants: Three Ways to Control the Future [article]

Jacob Swambo and Spencer Hommel and Bob McElrath and Bryan Bishop
2020 arXiv   pre-print
key recovery.  ...  methods for dynamic fee allocation, the underlying cryptographic assumptions, and their feasibility in single-party, hierarchical and adversarial multi-party contexts.  ...  Using a deterministic random oracle enables a proof that the commitment signature was generated without a known private key.  ... 
arXiv:2006.16714v1 fatcat:j2wkgrlt7reedaiqa5menq5tvm

BlockSci: Design and applications of a blockchain analysis platform

Harry A. Kalodner, Malte Möser, Kevin Lee, Steven Goldfeder, Martin Plattner, Alishah Chator, Arvind Narayanan
2020 USENIX Security Symposium  
We describe BlockSci's design and present four analyses that illustrate its capabilities, shedding light on the security, privacy, and economics of cryptocurrencies.  ...  Such reuse may occur deliberately (e.g., when users import keys into wallets on both chains) or unintentionally (e.g., when hierarchical deterministic wallets continue to generate similar keys after the  ...  into a hot wallet), as compromise of keys on one chain would allow the attacker to steal coins on all chains that share those keys (cf. [18] ).  ... 
dblp:conf/uss/KalodnerMLGPCN20 fatcat:td7cjtukxva77f4ekth62bsvqi

Security and Privacy on Blockchain [article]

Rui Zhang, Rui Xue, Ling Liu
2019 arXiv   pre-print
Then we describe the basic security properties that are supported as the essential requirements and building blocks for Bitcoin like cryptocurrency systems, followed by presenting the additional security  ...  and privacy properties that are desired in many blockchain applications.  ...  The sum of all unspent bitcoin instances that the user has the key to access as the owner in her bitcoin wallet is the total balance of this user.  ... 
arXiv:1903.07602v2 fatcat:tyoyeyyvv5ggde3eqopytdqly4

Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey

Shu Yun Lim, Pascal Tankam Fotsing, Abdullah Almasri, Omar Musa, Miss Laiha Mat Kiah, Tan Fong Ang, Reza Ismail
2018 International Journal on Advanced Science, Engineering and Information Technology  
The ideal solution would be self-sovereign identity, a new form of identity management that is owned and controlled entirely by each individual user.  ...  This solution would include the individual's consolidated digital identity as well as their set of verified attributes that have been cryptographically signed by various trusted issuers.  ...  Jolocom Jolocom [44] aims to develop a solution to provide a decentralized identity based on hierarchically deterministic keys (HD keys).  ... 
doi:10.18517/ijaseit.8.4-2.6838 fatcat:shrmouxcgjhs3ddtkoofguo2g4

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses [article]

Ivan Homoliak, Sarad Venugopalan, Qingze Hum, Daniel Reijsbergen, Richard Schumi, Pawel Szalachowski
2020 arXiv   pre-print
However, despite their increasing popularity and adoption, there is a lack of standardized models that study blockchain-related security threats.  ...  One of them is the manner in which the keys are isolated -there are software wallets that store the keys within the user PC (e.g., Bitcoin Core, 18 MyEtherWallet 19 ) as well as hardware wallets that  ...  Next, the attacker has stolen private keys from the hot wallet.  ... 
arXiv:1910.09775v2 fatcat:xvxnekjhtbbt7dc4b3kxy3m6xi

D5.1 Key Technologies for IoT Data Management Benchmark

Gino Ciccone, Giuseppina Carpentieri, Cosimo Zotti, Alexandr Tardo, Marek Bednarczyk, Tadeusz Puźniakowski, Paweł Czapiewski, Stefan Köpsell, Kumar Sharad, José Luis Cárcel, Joan Meseguer, Ahmad Nimr (+9 others)
2021 Zenodo  
There are some major groups of wallets: • Cloud Wallets, cryptographic keys for funds are stored by third party that runs dedicated online service, usually categorized as hot wallets as they are not offline  ...  Wallet Backup The basic role of wallets is to keep safe the private keys which are necessary to spend the funds.  ...  As mentioned before, each Trust Point has a field that contains the hash of the previous Trust Point. This is intended to be used also for integrity verification of the Trust Points.  ... 
doi:10.5281/zenodo.5084813 fatcat:ssllddbo7rda7fadthu26ajrzu

Blockchain's adoption in IoT: The challenges, and a way forward

Imran Makhdoom, Mehran Abolhasan, Haider Abbas, Wei Ni
2019 Journal of Network and Computer Applications  
However, default limitations of Bitcoin blockchain, such as scalability, latency in TX confirmation, large storage, intensive computation and energy requirements, and privacy leakage infer that blockchain  ...  However, these messages 1090 are verified through the private/public key of the client.  ...  Concerning fault tolerance, BFT-based protocols are only capable of masking non-deterministic faults occurring on at the most f = (n − 1)/3 replicas [87] .  ... 
doi:10.1016/j.jnca.2018.10.019 fatcat:g6ya7prv6bdzbagaqcai2b4boa

The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses

Ivan Homoliak, Sarad Venugopalan, Daniel Reijsbergen, Qingze Hum, Richard Schumi, Pawel Szalachowski
2020 IEEE Communications Surveys and Tutorials  
However, despite their increasing popularity and adoption, there is a lack of standardized models that study blockchain-related security threats.  ...  One of them is the manner in which the keys are isolated -there are software wallets that store the keys within the user PC (e.g., Bitcoin Core, 18 MyEtherWallet 19 ) as well as hardware wallets that  ...  If a hosted wallet has full control over private keys, it is referred to as a server-side wallet (e.g., Coinbase 24 ) while in the case when keys are stored in the user's browser, a wallet is referred  ... 
doi:10.1109/comst.2020.3033665 fatcat:hcrsvvkb2ffmbdlspshy66wg2y

Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads [article]

Imdad Ullah, Salil S. Kanhere, Roksana Boreli
2020 arXiv   pre-print
We observe that the processing delay for traversing policies of various tree sizes, the encryption/decryption time of user profiling with various key-sizes and user profiles of various interests evaluates  ...  to an acceptable amount of processing time as that of the currently implemented ad systems.  ...  App Developer's wallet ID AP P , Advertiser's wallet AD ID , Billing Server's wallet BS ; and (Bitcoin) addresses, i.e. Add ID AP P , Add AD ID , Add BS .  ... 
arXiv:2008.10479v1 fatcat:2gu2kgpmd5cjfhlvohreedej54

Artificial Intelligence BlockCloud (AIBC) Technical Whitepaper [article]

Qi Deng
2019 arXiv   pre-print
The AIBC is an Artificial Intelligence and blockchain technology based large-scale decentralized ecosystem that allows system-wide low-cost sharing of computing and storage resources.  ...  A key benefit of the DPoEV is that it effectively eliminates the possibility of 51% attack based on the number of efforts (like Proof-of-Work in Bitcoin), or wealth accumulation (like Proof-of-Stake in  ...  , but Bitcoin.  ... 
arXiv:1909.12063v1 fatcat:rrbmupnb3bfrnexsvkuz4v73hi

Blockchain Technology for Intelligent Transportation Systems: A Systematic Literature Review

Rateb Jabbar, Eya Dhib, Ahmed ben Said, Moez Krichen, Noora Fetais, Esmat Zaidan, Kamel Barkaoui
2022 IEEE Access  
It is regarded as a decentralized, trustworthy, secure, transparent, and immutable solution that innovates data sharing and management.  ...  by Bitcoin implementation and common consensus protocols), and finally, the Blockchain 2.0 phase (characterized by the implementation of smart contracts, Ethereum, and Hyperledger).  ...  Keys are typically registered in a digital wallet on user terminals.  ... 
doi:10.1109/access.2022.3149958 fatcat:cz353bpluzgbfkpqt23vweinde

Review of Blockchain Potential Applications in the Electricity Sector and Challenges for Large Scale Adoption

Morsy Nour, Jose Pablo Chaves-Avila, Alvaro Sanchez-Miralles
2022 IEEE Access  
to these challenges that are being developed.  ...  It is expected that blockchain will play an important role in the transition to the smart grid.  ...  There are other solutions to prevent traceability, like hierarchical deterministic (HD) wallets. HD wallet uses an algorithm to create new public-private key pairs for every new transaction.  ... 
doi:10.1109/access.2022.3171227 fatcat:7yf5ntvpwbamjnmxxgbgfxpyau
« Previous Showing results 1 — 15 out of 48 results