A Two-Party Hierarchical Deterministic Wallets in Practice
ChihYun Chuang, Ihung Hsu, TingFang Lee
2023
Abstract
The applications of Hierarchical Deterministic Wallet are rapidly growing in various areas such as cryptocurrency exchanges and hardware wallets. Improving privacy and security is more important than ever. In this study, we proposed a protocol that fully support a two-party computation of BIP32. Our protocol, similar to the distributed key generation, can generate each party’s secret share, the common chain-code, and the public key without revealing a seed and any descendant private keys. We also provided a simulation-based proof of our protocol assuming a rushing, static, and malicious adversary in the hybrid model. Our master key generation protocol produces up to total of two bit leakages from a honest party given the feature that the seeds will be re-selected after each execution. The proposed hardened child key derivation protocol leads up to a one bit leakage in the worst situation of simulation from a honest party and will be accumulated with each execution. Fortunately, in reality, this issue can be largely mitigated by adding some validation criteria of boolean circuits and masking the input shares before each execution. We then implemented the proposed protocol and ran in a single thread on a laptop which turned out with practically acceptable execution time. Lastly, the outputs of our protocol can be easily integrated with many threshold sign protocols.
DownloadPaper Citation
in Harvard Style
Chuang C., Hsu I. and Lee T. (2023). A Two-Party Hierarchical Deterministic Wallets in Practice. In Proceedings of the 20th International Conference on Security and Cryptography - Volume 1: SECRYPT; ISBN 978-989-758-666-8, SciTePress, pages 850-856. DOI: 10.5220/0012138700003555
in Bibtex Style
@conference{secrypt23,
author={ChihYun Chuang and Ihung Hsu and TingFang Lee},
title={A Two-Party Hierarchical Deterministic Wallets in Practice},
booktitle={Proceedings of the 20th International Conference on Security and Cryptography - Volume 1: SECRYPT},
year={2023},
pages={850-856},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0012138700003555},
isbn={978-989-758-666-8},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 20th International Conference on Security and Cryptography - Volume 1: SECRYPT
TI - A Two-Party Hierarchical Deterministic Wallets in Practice
SN - 978-989-758-666-8
AU - Chuang C.
AU - Hsu I.
AU - Lee T.
PY - 2023
SP - 850
EP - 856
DO - 10.5220/0012138700003555
PB - SciTePress