Key-insulated and privacy-preserving signature scheme with publicly derived public key

Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algori...

Full description

Saved in:
Bibliographic Details
Main Authors: LIU, Zhen, YANG, Guomin, WONG, Duncan S., NGUYEN, Khoa, WANG, Huaxiong
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/7414
https://ink.library.smu.edu.sg/context/sis_research/article/8417/viewcontent/2018_956.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-8417
record_format dspace
spelling sg-smu-ink.sis_research-84172022-10-13T05:53:37Z Key-insulated and privacy-preserving signature scheme with publicly derived public key LIU, Zhen YANG, Guomin WONG, Duncan S. NGUYEN, Khoa WANG, Huaxiong Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algorithm have been widely adopted in the community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that an arbitrary number of derived keys can be generated from a master key. However, these algorithms suffer a vulnerability. In particular, when a minor fault happens (say, one derived key is compromised somehow), the damage is not limited to the leaked derived key only, instead, it spreads to the master key and all derived keys are compromised. In this paper, to provide a formal treatment for the problem, we introduce and formalize a new signature variant, called Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS), which forms a convenient and robust cryptographic tool for offering the virtues of deterministic wallet and stealth address, while eliminating the security vulnerabilities. Specifically, PDPKS allows anyone to derive new signature verification keys for a user, say Alice, based on her long-term public key, while only Alice can derive the signing keys corresponding to those verification keys. In terms of privacy, given a derived verification key and valid signatures with respect to it, an adversary is not able to tell which long-term public key, out of a set of known long-term public keys, is the one from which the verification key was derived. A distinguishing security feature of PDPKS, with the above functionality and privacy features, is that the derived keys are independent/insulated from each other, namely, compromising the signing key associated with a verification key does not allow an adversary to forge a valid signature for another verification key, even if both verification keys are derived from the same long-term public key. We formalize the notion of PDPKS and propose a practical and proven secure construction, which could be a convenient and secure cryptographic tool for building privacy-preserving cryptocurrencies and supporting promising use cases in practice, as it can be used to implement secure stealth addresses, and can be used to implement deterministic wallets and the related appealing use cases, without security concerns. 2019-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/7414 info:doi/10.1109/EuroSP.2019.00025 https://ink.library.smu.edu.sg/context/sis_research/article/8417/viewcontent/2018_956.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Signature Scheme Publicly Derived Public Key Key-Insulated Security Privacy Cryptocurrency Stealth Addresses Deterministic Wallets Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Signature Scheme
Publicly Derived Public Key
Key-Insulated Security
Privacy
Cryptocurrency
Stealth Addresses
Deterministic Wallets
Information Security
spellingShingle Signature Scheme
Publicly Derived Public Key
Key-Insulated Security
Privacy
Cryptocurrency
Stealth Addresses
Deterministic Wallets
Information Security
LIU, Zhen
YANG, Guomin
WONG, Duncan S.
NGUYEN, Khoa
WANG, Huaxiong
Key-insulated and privacy-preserving signature scheme with publicly derived public key
description Since the introduction of Bitcoin in 2008, cryptocurrency has been undergoing a quick and explosive development. At the same time, privacy protection, one of the key merits of cryptocurrency, has attracted much attention by the community. A deterministic wallet algorithm and a stealth address algorithm have been widely adopted in the community, due to their virtues on functionality and privacy protection, which come from a key derivation mechanism that an arbitrary number of derived keys can be generated from a master key. However, these algorithms suffer a vulnerability. In particular, when a minor fault happens (say, one derived key is compromised somehow), the damage is not limited to the leaked derived key only, instead, it spreads to the master key and all derived keys are compromised. In this paper, to provide a formal treatment for the problem, we introduce and formalize a new signature variant, called Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key (PDPKS), which forms a convenient and robust cryptographic tool for offering the virtues of deterministic wallet and stealth address, while eliminating the security vulnerabilities. Specifically, PDPKS allows anyone to derive new signature verification keys for a user, say Alice, based on her long-term public key, while only Alice can derive the signing keys corresponding to those verification keys. In terms of privacy, given a derived verification key and valid signatures with respect to it, an adversary is not able to tell which long-term public key, out of a set of known long-term public keys, is the one from which the verification key was derived. A distinguishing security feature of PDPKS, with the above functionality and privacy features, is that the derived keys are independent/insulated from each other, namely, compromising the signing key associated with a verification key does not allow an adversary to forge a valid signature for another verification key, even if both verification keys are derived from the same long-term public key. We formalize the notion of PDPKS and propose a practical and proven secure construction, which could be a convenient and secure cryptographic tool for building privacy-preserving cryptocurrencies and supporting promising use cases in practice, as it can be used to implement secure stealth addresses, and can be used to implement deterministic wallets and the related appealing use cases, without security concerns.
format text
author LIU, Zhen
YANG, Guomin
WONG, Duncan S.
NGUYEN, Khoa
WANG, Huaxiong
author_facet LIU, Zhen
YANG, Guomin
WONG, Duncan S.
NGUYEN, Khoa
WANG, Huaxiong
author_sort LIU, Zhen
title Key-insulated and privacy-preserving signature scheme with publicly derived public key
title_short Key-insulated and privacy-preserving signature scheme with publicly derived public key
title_full Key-insulated and privacy-preserving signature scheme with publicly derived public key
title_fullStr Key-insulated and privacy-preserving signature scheme with publicly derived public key
title_full_unstemmed Key-insulated and privacy-preserving signature scheme with publicly derived public key
title_sort key-insulated and privacy-preserving signature scheme with publicly derived public key
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/7414
https://ink.library.smu.edu.sg/context/sis_research/article/8417/viewcontent/2018_956.pdf
_version_ 1770576334679965696