Key-insulated and privacy-preserving signature scheme with publicly derived public key
Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algori...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7414 https://ink.library.smu.edu.sg/context/sis_research/article/8417/viewcontent/2018_956.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-8417 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-84172022-10-13T05:53:37Z Key-insulated and privacy-preserving signature scheme with publicly derived public key LIU, Zhen YANG, Guomin WONG, Duncan S. NGUYEN, Khoa WANG, Huaxiong Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algorithm have been widely adopted in the community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that an arbitrary number of derived keys can be generated from a master key. However, these algorithms suffer a vulnerability. In particular, when a minor fault happens (say, one derived key is compromised somehow), the damage is not limited to the leaked derived key only, instead, it spreads to the master key and all derived keys are compromised. In this paper, to provide a formal treatment for the problem, we introduce and formalize a new signature variant, called Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS), which forms a convenient and robust cryptographic tool for offering the virtues of deterministic wallet and stealth address, while eliminating the security vulnerabilities. Specifically, PDPKS allows anyone to derive new signature verification keys for a user, say Alice, based on her long-term public key, while only Alice can derive the signing keys corresponding to those verification keys. In terms of privacy, given a derived verification key and valid signatures with respect to it, an adversary is not able to tell which long-term public key, out of a set of known long-term public keys, is the one from which the verification key was derived. A distinguishing security feature of PDPKS, with the above functionality and privacy features, is that the derived keys are independent/insulated from each other, namely, compromising the signing key associated with a verification key does not allow an adversary to forge a valid signature for another verification key, even if both verification keys are derived from the same long-term public key. We formalize the notion of PDPKS and propose a practical and proven secure construction, which could be a convenient and secure cryptographic tool for building privacy-preserving cryptocurrencies and supporting promising use cases in practice, as it can be used to implement secure stealth addresses, and can be used to implement deterministic wallets and the related appealing use cases, without security concerns. 2019-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7414 info:doi/10.1109/EuroSP.2019.00025 https://ink.library.smu.edu.sg/context/sis_research/article/8417/viewcontent/2018_956.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Signature Scheme Publicly Derived Public Key Key-Insulated Security Privacy Cryptocurrency Stealth Addresses Deterministic Wallets Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Signature Scheme Publicly Derived Public Key Key-Insulated Security Privacy Cryptocurrency Stealth Addresses Deterministic Wallets Information Security |
spellingShingle |
Signature Scheme Publicly Derived Public Key Key-Insulated Security Privacy Cryptocurrency Stealth Addresses Deterministic Wallets Information Security LIU, Zhen YANG, Guomin WONG, Duncan S. NGUYEN, Khoa WANG, Huaxiong Key-insulated and privacy-preserving signature scheme with publicly derived public key |
description |
Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algorithm have been widely adopted in the community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that an arbitrary number of derived keys can be generated from a master key. However, these algorithms suffer a vulnerability. In particular, when a minor fault happens (say, one derived key is compromised somehow), the damage is not limited to the leaked derived key only, instead, it spreads to the master key and all derived keys are compromised. In this paper, to provide a formal treatment for the problem, we introduce and formalize a new signature variant, called Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS), which forms a convenient and robust cryptographic tool for offering the virtues of deterministic wallet and stealth address, while eliminating the security vulnerabilities. Specifically, PDPKS allows anyone to derive new signature verification keys for a user, say Alice, based on her long-term public key, while only Alice can derive the signing keys corresponding to those verification keys. In terms of privacy, given a derived verification key and valid signatures with respect to it, an adversary is not able to tell which long-term public key, out of a set of known long-term public keys, is the one from which the verification key was derived. A distinguishing security feature of PDPKS, with the above functionality and privacy features, is that the derived keys are independent/insulated from each other, namely, compromising the signing key associated with a verification key does not allow an adversary to forge a valid signature for another verification key, even if both verification keys are derived from the same long-term public key. We formalize the notion of PDPKS and propose a practical and proven secure construction, which could be a convenient and secure cryptographic tool for building privacy-preserving cryptocurrencies and supporting promising use cases in practice, as it can be used to implement secure stealth addresses, and can be used to implement deterministic wallets and the related appealing use cases, without security concerns. |
format |
text |
author |
LIU, Zhen YANG, Guomin WONG, Duncan S. NGUYEN, Khoa WANG, Huaxiong |
author_facet |
LIU, Zhen YANG, Guomin WONG, Duncan S. NGUYEN, Khoa WANG, Huaxiong |
author_sort |
LIU, Zhen |
title |
Key-insulated and privacy-preserving signature scheme with publicly derived public key |
title_short |
Key-insulated and privacy-preserving signature scheme with publicly derived public key |
title_full |
Key-insulated and privacy-preserving signature scheme with publicly derived public key |
title_fullStr |
Key-insulated and privacy-preserving signature scheme with publicly derived public key |
title_full_unstemmed |
Key-insulated and privacy-preserving signature scheme with publicly derived public key |
title_sort |
key-insulated and privacy-preserving signature scheme with publicly derived public key |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2019 |
url |
https://ink.library.smu.edu.sg/sis_research/7414 https://ink.library.smu.edu.sg/context/sis_research/article/8417/viewcontent/2018_956.pdf |
_version_ |
1770576334679965696 |