Figure 1: Point of view use of the QR-Video scanner.
Figure 2: Side view use of the QR-Video scanner.
5 CONCLUSION
We proposed a new cold wallet communication set-
ting: an optical (display to camera) channel. In our
solution, a cold wallet equipped with a display and a
camera can receive transactions through camera, dis-
play the transaction to the user for confirmation, sign
the confirmed transactions, and display the signature
on its display which is, in turn, acquired by a hot wal-
let’s camera. Due to the size of the data transmis-
sion from the hot to the cold wallet, we proposed a
novel encoding information encoding scheme - a QR
video, i.e., sequence of frames containing individual
QR codes. Our solution achieves transmission rates
over 150 kB per second. Thus, our cold wallet can au-
thorize transactions not connected to the internet nor
wired to another device (e.g., through a USB port).
REFERENCES
Arapinis, M., Gkaniatsou, A., Karakostas, D., and Kiayias,
A. (2019). A formal treatment of hardware wallets. In
Goldberg, I. and Moore, T., editors, FC 2019: 23rd
International Conference on Financial Cryptography
and Data Security, volume 11598 of Lecture Notes in
Computer Science, pages 426–445, Frigate Bay, St.
Kitts and Nevis. Springer, Heidelberg, Germany.
Breitner, J. and Heninger, N. (2019). Biased nonce sense:
Lattice attacks against weak ECDSA signatures in
cryptocurrencies. In Goldberg, I. and Moore, T., ed-
itors, FC 2019: 23rd International Conference on
Financial Cryptography and Data Security, volume
11598 of Lecture Notes in Computer Science, pages
3–20, Frigate Bay, St. Kitts and Nevis. Springer, Hei-
delberg, Germany.
Brengel, M. and Rossow, C. (2018). Identifying key leak-
age of bitcoin users. In Bailey, M., Holz, T., Stam-
atogiannakis, M., and Ioannidis, S., editors, Research
in Attacks, Intrusions, and Defenses, pages 623–643,
Cham. Springer International Publishing.
Courtois, N. T., Emirdag, P., and Valsorda, F. (2014). Pri-
vate key recovery combination attacks: On extreme
fragility of popular bitcoin key management, wallet
and cold storage solutions in presence of poor RNG
events. Cryptology ePrint Archive, Report 2014/848.
http://eprint.iacr.org/2014/848.
Das, P., Faust, S., and Loss, J. (2019). A formal treatment
of deterministic wallets. In Cavallaro, L., Kinder, J.,
Wang, X., and Katz, J., editors, ACM CCS 2019: 26th
Conference on Computer and Communications Secu-
rity, pages 651–668. ACM Press.
De, N. (2018). Crypto Wallet to Replace Private Keys With
Encrypted QR Codes. https://www.coindesk.com/
markets/2018/07/27/crypto-wallet-to-replace-
private-keys-with-encrypted-qr-codes/. [Online;
accessed August-2021].
Fan, C.-I., Tseng, Y.-F., Su, H.-P., Hsu, R.-H., and Kikuchi,
H. (2019). Secure hierarchical bitcoin wallet scheme
against privilege escalation attacks. International
Journal of Information Security, pages 1–11.
Gutoski, G. and Stebila, D. (2015). Hierarchical determinis-
tic bitcoin wallets that tolerate key leakage. In B
¨
ohme,
R. and Okamoto, T., editors, FC 2015: 19th Inter-
national Conference on Financial Cryptography and
Data Security, volume 8975 of Lecture Notes in Com-
puter Science, pages 497–504, San Juan, Puerto Rico.
Springer, Heidelberg, Germany.
Karakostas, D., Kiayias, A., and Larangeira, M. (2020). Ac-
count management in proof of stake ledgers. In Galdi,
C. and Kolesnikov, V., editors, Security and Cryptog-
raphy for Networks, pages 3–23, Cham. Springer In-
ternational Publishing.
Khan, A. G., Zahid, A. H., Hussain, M., and Riaz, U.
(2019). Security of cryptocurrency using hardware
wallet and qr code. In 2019 International Conference
on Innovative Computing (ICIC), pages 1–10. IEEE.
Marcedone, A., Pass, R., and shelat, a. (2019). Minimizing
trust in hardware wallets with two factor signatures.
In Goldberg, I. and Moore, T., editors, FC 2019: 23rd
International Conference on Financial Cryptography
and Data Security, volume 11598 of Lecture Notes in
Computer Science, pages 407–425, Frigate Bay, St.
Kitts and Nevis. Springer, Heidelberg, Germany.
Maxwell, G. et al. (2014). Deterministic wallets.
NGrave (2020). NGRAVE uses QR codes to keep
its hardware wallet 100% offline. https:
//medium.com/ngrave/ngrave-uses-qr-codes-to-
keep-its-hardware-wallet-100-offline-f1e18be317a2.
[Online; accessed August-2021].
Wuille, P. (2017). Hierarchical Deterministic Wal-
lets. https://github.com/bitcoin/bips/blob/master/bip-
0032.mediawiki. [Online; accessed July-2019].
SECRYPT 2022 - 19th International Conference on Security and Cryptography
290