A Two-Party Hierarchical Deterministic Wallets in Practice

ChihYun Chuang, Ihung Hsu, TingFang Lee

2023

Abstract

The applications of Hierarchical Deterministic Wallet are rapidly growing in various areas such as cryptocurrency exchanges and hardware wallets. Improving privacy and security is more important than ever. In this study, we proposed a protocol that fully support a two-party computation of BIP32. Our protocol, similar to the distributed key generation, can generate each party’s secret share, the common chain-code, and the public key without revealing a seed and any descendant private keys. We also provided a simulation-based proof of our protocol assuming a rushing, static, and malicious adversary in the hybrid model. Our master key generation protocol produces up to total of two bit leakages from a honest party given the feature that the seeds will be re-selected after each execution. The proposed hardened child key derivation protocol leads up to a one bit leakage in the worst situation of simulation from a honest party and will be accumulated with each execution. Fortunately, in reality, this issue can be largely mitigated by adding some validation criteria of boolean circuits and masking the input shares before each execution. We then implemented the proposed protocol and ran in a single thread on a laptop which turned out with practically acceptable execution time. Lastly, the outputs of our protocol can be easily integrated with many threshold sign protocols.

Download


Paper Citation


in Harvard Style

Chuang C., Hsu I. and Lee T. (2023). A Two-Party Hierarchical Deterministic Wallets in Practice. In Proceedings of the 20th International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-666-8, SciTePress, pages 850-856. DOI: 10.5220/0012138700003555


in Bibtex Style

@conference{secrypt23,
author={ChihYun Chuang and Ihung Hsu and TingFang Lee},
title={A Two-Party Hierarchical Deterministic Wallets in Practice},
booktitle={Proceedings of the 20th International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2023},
pages={850-856},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012138700003555},
isbn={978-989-758-666-8},
}


in EndNote Style

TY - CONF

JO - Proceedings of the 20th International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - A Two-Party Hierarchical Deterministic Wallets in Practice
SN - 978-989-758-666-8
AU - Chuang C.
AU - Hsu I.
AU - Lee T.
PY - 2023
SP - 850
EP - 856
DO - 10.5220/0012138700003555
PB - SciTePress