Paper 2022/627

Secure Hierarchical Deterministic Wallet Supporting Stealth Address

Xin Yin, Shanghai Jiao Tong University
Zhen Liu, Shanghai Jiao Tong University
Guomin Yang, University of Wollongong
Guoxing Chen, Shanghai Jiao Tong University
Haojin Zhu, Shanghai Jiao Tong University
Abstract

Over the past decade, cryptocurrency has been undergoing a rapid development. Digital wallet, as the tool to store and manage the cryptographic keys, is the primary entrance for the public to access cryptocurrency assets. Hierarchical Deterministic Wallet (HDW), proposed in Bitcoin Improvement Proposal 32 (BIP32), has attracted much attention and been widely used in the community, due to its virtues such as easy backup/recovery, convenient cold-address management, and supporting trust-less audits and applications in hierarchical organizations. While HDW allows the wallet owner to generate and manage his keys conveniently, Stealth Address (SA) allows a payer to generate fresh address (i.e., public key) for the receiver without any interaction, so that users can achieve ``one coin each address" in a very convenient manner, which is widely regarded as a simple but effective way to protect user privacy. Consequently, SA has also attracted much attention and been widely used in the community. However, as so far, there is not a secure wallet algorithm that provides the virtues of both HDW and SA. Actually, even for standalone HDW, to the best of our knowledge, there is no strict definition of syntax and models that captures the functionality and security (i.e., safety of coins and privacy of users) requirements that practical scenarios in cryptocurrency impose on wallet. As a result, the existing wallet algorithms either have (potential) security flaws or lack crucial functionality features. In this work, we formally define the syntax and security models of Hierarchical Deterministic Wallet supporting Stealth Address (HDWSA), capturing the functionality and security (including safety and privacy) requirements imposed by the practice in cryptocurrency, which include all the versatile functionalities that lead to the popularity of HDW and SA as well as all the security guarantees that underlie these functionalities. We propose a concrete HDWSA construction and prove its security in the random oracle model. We implement our scheme and the experimental results show that the efficiency is suitable for typical cryptocurrency settings.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Preprint.
Keywords
Signature Scheme Hierarchical Deterministic Wallet Stealth Address Blockchain Cryptocurrency
Contact author(s)
yinxin @ sjtu edu cn
liuzhen @ sjtu edu cn
gyang @ uow edu au
guoxingchen @ sjtu edu cn
zhu-hj @ sjtu edu cn
History
2022-05-30: revised
2022-05-23: received
See all versions
Short URL
https://ia.cr/2022/627
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2022/627,
      author = {Xin Yin and Zhen Liu and Guomin Yang and Guoxing Chen and Haojin Zhu},
      title = {Secure Hierarchical Deterministic Wallet Supporting Stealth Address},
      howpublished = {Cryptology ePrint Archive, Paper 2022/627},
      year = {2022},
      note = {\url{https://eprint.iacr.org/2022/627}},
      url = {https://eprint.iacr.org/2022/627}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.