loading
Documents

Research.Publish.Connect.

Paper

Stealth Address and Key Management Techniques in Blockchain Systems

Topics: Access and Usage Control; Authentication, Privacy and Security Models; Data and Software Security; Information Hiding; Privacy Enhancing Technologies; Security; Security and Trust in Pervasive Information Systems; Security Frameworks, Architectures and Protocols; Threat Awareness; Vulnerability Analysis and Countermeasures

Authors: Nicolas T. Courtois 1 and Rebekah Mercer 2

Affiliations: 1 University College London, United Kingdom ; 2 University College London and Clearmatics Technologies Ltd, United Kingdom

ISBN: 978-989-758-209-7

Keyword(s): Applied Cryptography, Bitcoin, DarkWallet, CryptoNote, ShadowCash, Key Management, Privacy, Anonymous Payment, Stealth Address Technique, Audit Capability, ECDSA, HD Wallets, BIP032, Leakage-resistant Cryptography.

Related Ontology Subjects/Areas/Topics: Computer-Supported Education ; Enterprise Information Systems ; Information and Systems Security ; Information Assurance ; Information Hiding ; Information Systems Analysis and Specification ; Information Technologies Supporting Learning ; Privacy Enhancing Technologies ; Security ; Security and Privacy

Abstract: Bitcoin is an open source payment system with a market capitalization of about 15 G$. During the years several key management solutions have been proposed to enhance bitcoin. The common characteristic of these techniques is that they allow to derive public keys independently of the private keys, and that these keys match. In this paper we overview the historical development of such techniques, specify and compare all major variants proposed or used in practical systems. We show that such techniques can be designed based on 2 distinct ECC arithmetic properties and how to combine both. A major trend in blockchain systems is to use by Stealth Address (SA) techniques to make different payments made to the same payee unlikable. We review all known SA techniques and show that early variants are less secure. Finally we propose a new SA method which is more robust against leakage and against various attacks.

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.206.48.142

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Courtois, N. and Mercer, R. (2017). Stealth Address and Key Management Techniques in Blockchain Systems.In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 559-566. DOI: 10.5220/0006270005590566

@conference{icissp17,
author={Nicolas T. Courtois. and Rebekah Mercer.},
title={Stealth Address and Key Management Techniques in Blockchain Systems},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={559-566},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006270005590566},
isbn={978-989-758-209-7},
}

TY - CONF

JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Stealth Address and Key Management Techniques in Blockchain Systems
SN - 978-989-758-209-7
AU - Courtois, N.
AU - Mercer, R.
PY - 2017
SP - 559
EP - 566
DO - 10.5220/0006270005590566

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.