Filters








19 Hits in 24.5 sec

Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet Security [chapter]

Rosario Gennaro, Steven Goldfeder, Arvind Narayanan
2016 Lecture Notes in Computer Science  
We also present a compelling application to use our scheme: securing Bitcoin wallets. Bitcoin thefts are on the rise, and threshold DSA is necessary to secure Bitcoin wallets.  ...  Our scheme is the first general threshold DSA scheme that does not require an honest majority and is useful for securing Bitcoin wallets.  ...  Threshold Security for Bitcoin wallets In this section, we give an overview of Bitcoin, discuss the threat model, and show that deploying our threshold signatures is the best solution to address these  ... 
doi:10.1007/978-3-319-39555-5_9 fatcat:hvws7ymevzhghhitjmfrh5ugsm

Two-factor authentication for the Bitcoin protocol

Christopher Mann, Daniel Loebenberger
2016 International Journal of Information Security  
We show how to realize two-factor authentication for a Bitcoin wallet employing the two-party ECDSA signature protocol adapted from MacKenzie & Reiter (2004) .  ...  Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking  ...  Acknowledgements We would like to thank Michael Nüsken for various useful comments and Mike Hearn for greatly improving the performance of a first version of the prototype by suggesting a bouncy castle  ... 
doi:10.1007/s10207-016-0325-1 fatcat:nf2a7td7j5bzrafo2s6xwmemo4

Two-Factor Authentication for the Bitcoin Protocol [chapter]

Christopher Mann, Daniel Loebenberger
2015 Lecture Notes in Computer Science  
We show how to realize two-factor authentication for a Bitcoin wallet employing the two-party ECDSA signature protocol adapted from MacKenzie & Reiter (2004) .  ...  Since we use a smart phone as the second authentication factor, our solution can be used with hardware already available to most users and the user experience is quite similar to the existing online banking  ...  Acknowledgements We would like to thank Michael Nüsken for various useful comments and Mike Hearn for greatly improving the performance of a first version of the prototype by suggesting a bouncy castle  ... 
doi:10.1007/978-3-319-24858-5_10 fatcat:ofsp6b6dkvef7cogecazmzzsce

Digital signature scheme for information non-repudiation in blockchain: a state of the art review

Weidong Fang, Wei Chen, Wuxiong Zhang, Jun Pei, Weiwei Gao, Guohui Wang
2020 EURASIP Journal on Wireless Communications and Networking  
Our works will facilitate to design efficient and secure digital signature algorithms in blockchain.  ...  A digital signature scheme is an effective approach to achieve nonrepudiation.  ...  Acknowledgements We are grateful to the anonymous reviewers who have contributed to the enhancement of the paper's completeness with their valuable suggestions.  ... 
doi:10.1186/s13638-020-01665-w fatcat:wnp4uxzixzfzngxnerlkbewame

Secure and Privacy-Aware Blockchain Design: Requirements, Challenges and Solutions

Sidra Aslam, Aleksandar Tošić, Michael Mrissa
2021 Journal of Cybersecurity and Privacy  
we suggest guidelines for future research.  ...  In some cases, addressing these issues requires blockchain data to be secured with mechanisms that allow on-demand (as opposed to full) disclosure.  ...  In [62] , the authors present a transaction-privacy bitcoin framework by using homomorphic encryption that is efficient and less complex because it has small unit of time in terms of key generation, encryption  ... 
doi:10.3390/jcp1010009 fatcat:narc2lqitbb75py56gg7equ36e

Secure Computation over Lattices and Elliptic Curves [article]

Brett Hemenway Falk, Daniel Noble
2020 IACR Cryptology ePrint Archive  
Both cryptosystems are also additively homomorphic, which allows for secure additions directly on ciphertexts.  ...  Traditional threshold cryptosystems have decentralized core cryptographic primitives like key generation, decryption and signatures.  ...  Acknowledgements This research was sponsored in part by ONR grant (N00014-15-1-2750) "SynCrypt: Automated Synthesis of Cryptographic Constructions".  ... 
dblp:journals/iacr/FalkN20 fatcat:wx3lxc5c2ncnbkwwcd6t7purh4

SoK of Used Cryptography in Blockchain [article]

Mayank Raikwar, Danilo Gligoroski, Katina Kralevska
2019 arXiv   pre-print
Additionally, we give a list of cryptographic concepts which have not yet been applied but have big potentials to improve the current blockchain solutions.  ...  Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only  ...  CoinParty [134] uses a threshold signature scheme for multi-party mixing of Bitcoins.  ... 
arXiv:1906.08609v3 fatcat:l62esrum3bhmfcdxzpx3h3he4e

Threshold Multi-Signature with an Offline Recovery Party [article]

Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2020 IACR Cryptology ePrint Archive  
The employment of a custodian service together with threshold-multi-party signatures helps to manage secret keys more safely and effectively, e.g. allowing the recovery of crypto-assets when users lose  ...  Second our multi-party signature is compatible with a deterministic derivation of public and private keys.  ...  The simplest approach to this solution are multi-sig wallets (available for some cryptocurrencies, like Bitcoin [25] ) where the signatures are normal ones, but funds may be moved out of that wallet only  ... 
dblp:journals/iacr/LongoMS20 fatcat:ld7pjtsytzcnjbdew5sdl3jmre

Blockchain-Based Multimedia Content Protection: Review and Open Challenges

Amna Qureshi, David Megías Jiménez
2020 Applied Sciences  
A taxonomy is developed to classify these applications with reference to the technical aspects of blockchain technology, content protection techniques, namely, encryption, digital rights management, digital  ...  In this paper, we provide a holistic survey of multimedia content protection applications in which blockchain technology is being used.  ...  Acknowledgments: The authors thank Alice Keefer Riva for proofreading the manuscript. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/app11010001 fatcat:fmtgrkgphfejfdxwpuatw4vkvu

Threshold ECDSA with an Offline Recovery Party [article]

Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2021 arXiv   pre-print
Starting from the threshold schemes for the ECDSA signature due to R. Gennaro and S.  ...  , but the verification algorithm remains identical to that of a signature issued using the centralized algorithm.  ...  We would like to thank Conio s.r.l. and its co-CEO Vincenzo di Nicola for their support.  ... 
arXiv:2007.04036v2 fatcat:5n2rmzsqrzamdbylowbp532e4e

Threshold ECDSA with an Offline Recovery Party

Michele Battagliola, Riccardo Longo, Alessio Meneghetti, Massimiliano Sala
2021 Mediterranean Journal of Mathematics  
Starting from the threshold scheme for the ECDSA signature due to Gennaro and Goldfeder, we present the first protocol that supports multiparty signatures with an offline participant during the key-generation  ...  the players, but the verification algorithm remains identical to that of a signature issued using the centralized algorithm.  ...  Acknowledgements The core of this work is contained in the first author's MSC thesis that would like to thank his two supervisors, the second and fourth author, and Telsy S.p.A. for their support during  ... 
doi:10.1007/s00009-021-01886-3 fatcat:srmoyonhg5aqvelztjsbtsjvv4

Glamdring: Automatic Application Partitioning for Intel SGX

Joshua Lind, Christian Priebe, Divya Muthukumaran, Dan O'Keeffe, Pierre-Louis Aublin, Florian Kelbert, Tobias Reiher, David Goltzsche, David M. Eyers, Rüdiger Kapitza, Christof Fetzer, Peter R. Pietzuch
2017 USENIX Annual Technical Conference  
to sensitive data; (ii) for data integrity, it uses backward slicing to identify functions that may affect sensitive data.  ...  We describe Glamdring, the first source-level partitioning framework that secures applications written in C using Intel SGX. A developer first annotates securitysensitive application data.  ...  Doctoral Training in High Performance Embedded and Distributed Systems (HiPEDS) (EP/L016796/1).  ... 
dblp:conf/usenix/LindPMOAKRGEKFP17 fatcat:bdi6qpq4jzdqrcjxd63ulxyv54

Efficient and Secure ECDSA Algorithm and its Applications: A Survey [article]

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2019 arXiv   pre-print
These algorithms heighten security against various attacks and at the same time improve performance to obtain efficiencies (time, memory, reduced computation complexity, and energy saving) in an environment  ...  institutions because these algorithms provide security and high performance when being used in many areas such as electronic-healthcare, electronic-banking, electronic-commerce, electronic-vehicular,  ...  Acknowledgements We would like to acknowledge and thank the efforts of Dr. Barbara Harmes, and Hawa Bahedh as well as the valuable feedback of the reviewers.  ... 
arXiv:1902.10313v1 fatcat:7k44pfghujbzdmoxpkynavzone

Efficient and Secure ECDSA Algorithm and its Applications: A Survey

Mishall Al-Zubaidie, Zhongwei Zhang, Ji Zhang
2022 International Journal of Communication Networks and Information Security  
These algorithmsheighten security against various attacks and the same time improve performanceto obtain efficiencies (time, memory, reduced computation complexity, and energy saving)in an environment  ...  because these algorithms provide security andhigh performance when being used in many areas such as electronic-healthcare, electronicbanking,electronic-commerce, electronic-vehicular, and electronic-governance  ...  Acknowledgements We would like to acknowledge and thank the efforts of Dr. Barbara Harmes, and Hawa Bahedh as well as the valuable feedback of the reviewers.  ... 
doi:10.17762/ijcnis.v11i1.3827 fatcat:4eer52qiafc5novxqrrq2bvyzy

UC Non-Interactive, Proactive, Threshold ECDSA [article]

Ran Canetti, Nikolaos Makriyannis, Udi Peled
2020 IACR Cryptology ePrint Archive  
Building on the Gennaro & Goldfeder and Lindell & Nof protocols (CCS '18), we present a threshold ECDSA protocol, for any number of signatories and any threshold, that improves as follows over the state  ...  Furthermore, it includes a periodic refresh mechanism and offers full proactive security. • The protocol realizes an ideal threshold signature functionality within the UC framework, in the global random  ...  These properties (low latency, compatibility with cold-wallet architectures, proactive security, and composable security) make the protocol ideal for threshold wallets for ECDSA-based cryptocurrencies.  ... 
dblp:journals/iacr/CanettiMP20 fatcat:2wykhdqdhbhdrjcrtuz72fwp5y
« Previous Showing results 1 — 15 out of 19 results