fed.dyne.org
  • Communities
  • Create Post
  • Create Community
  • heart
    Support Lemmy
  • search
    Search
  • Login
  • Sign Up
JaromilMA to Cryptography · 5 months ago

On the Proof of Ownership of Digital Wallets

www.mdpi.com

external-link
message-square
0
link
fedilink
  • cross-posted to:
  • cryptography@lemmy.ml
4
external-link

On the Proof of Ownership of Digital Wallets

www.mdpi.com

JaromilMA to Cryptography · 5 months ago
message-square
0
link
fedilink
  • cross-posted to:
  • cryptography@lemmy.ml
With the widespread adoption and increasing application of blockchain technology, cryptocurrency wallets used in Bitcoin and Ethereum play a crucial role in facilitating decentralized asset management and secure transactions. However, wallet security relies heavily on private keys, with insufficient attention to the risks of theft and exposure. To address this issue, Chaum et al. (ACNS’21) proposed a “proof of ownership” method using a “backup key” to prove ownership of private keys even when exposed. However, their interactive proof approach is inefficient in large-scale systems and vulnerable to side-channel attacks due to the long key generation time. Other related schemes also suffer from low efficiency and complex key management, increasing the difficulty of securely storing backup keys. In this paper, we present an efficient, non-interactive proof generation approach for ownership of secret keys using a single backup key. Our approach leverages non-interactive zero-knowledge proofs and symmetric encryption, allowing users to generate multiple proofs with one fixed backup key, simplifying key management. Additionally, our scheme resists quantum attacks and provides a fallback signature. Our new scheme can be proved to capture unforgeability under the computational indistinguishability from the Uniformly Random Distribution property of a proper hash function and soundness in the quantum random oracle model. Experimental results indicate that our approach achieves a short key generation time and enables an efficient proof generation scheme in large-scale decentralized systems. Compared with state-of-the-art schemes, our approach is applicable to a broader range of scenarios due to its non-interactive nature, short key generation time, high efficiency, and simplified key management system.
alert-triangle
You must log in or register to comment.

Cryptography

cryptography

Subscribe from Remote Instance

Create a post
You are not logged in. However you can subscribe from another Fediverse account, for example Lemmy or Mastodon. To do this, paste the following into the search field of your instance: !cryptography@fed.dyne.org

🔏 Cryptography, Cryptopolitics, Blockchain, Decentralization.

This is not a place for shilling currencies, market analysis and/or pump’n’dump schemes.

Questions and answers are encouraged. Be excellent to each other. 🕊️

Visibility: Public
globe

This community can be federated to other instances and be posted/commented in by their users.

  • 1 user / day
  • 1 user / week
  • 1 user / month
  • 20 users / 6 months
  • 5 local subscribers
  • 20 subscribers
  • 12 Posts
  • 4 Comments
  • Modlog
  • mods:
  • Settoletto 🍤
  • Jaromil
  • BE: 0.19.11
  • Modlog
  • Legal
  • Instances
  • Docs
  • Code
  • join-lemmy.org