loading
Documentation
  • Login
  • Sign-Up

Research.Publish.Connect.

Paper

Stealth Address and Key Management Techniques in Blockchain Systems

Topics: Access and Usage Control; Authentication, Privacy and Security Models; Data and Software Security; Information Hiding; Privacy Enhancing Technologies; Security; Security and Trust in Pervasive Information Systems; Security Frameworks, Architectures and Protocols; Threat Awareness; Vulnerability Analysis and Countermeasures

Authors: Nicolas T. Courtois 1 and Rebekah Mercer 2

Affiliations: 1 University College London, United Kingdom ; 2 University College London and Clearmatics Technologies Ltd, United Kingdom

ISBN: 978-989-758-209-7

Keyword(s): Applied Cryptography, Bitcoin, DarkWallet, CryptoNote, ShadowCash, Key Management, Privacy, Anonymous Payment, Stealth Address Technique, Audit Capability, ECDSA, HD Wallets, BIP032, Leakage-resistant Cryptography.

Related Ontology Subjects/Areas/Topics: Computer-Supported Education ; Enterprise Information Systems ; Information and Systems Security ; Information Assurance ; Information Hiding ; Information Systems Analysis and Specification ; Information Technologies Supporting Learning ; Privacy Enhancing Technologies ; Security ; Security and Privacy

Abstract: Bitcoin is an open source payment system with a market capitalization of about 15 G$. During the years several key management solutions have been proposed to enhance bitcoin. The common characteristic of these techniques is that they allow to derive public keys independently of the private keys, and that these keys match. In this paper we overview the historical development of such techniques, specify and compare all major variants proposed or used in practical systems. We show that such techniques can be designed based on 2 distinct ECC arithmetic properties and how to combine both. A major trend in blockchain systems is to use by Stealth Address (SA) techniques to make different payments made to the same payee unlikable. We review all known SA techniques and show that early variants are less secure. Finally we propose a new SA method which is more robust against leakage and against various attacks.

PDF ImageFull Text

Download
Sign In Guest: Register as new SCITEPRESS user or Join INSTICC now for free.

Sign In SCITEPRESS user: please login.

Sign In INSTICC Members: please login. If not a member yet, Join INSTICC now for free.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 54.156.32.80. INSTICC members have higher download limits (free membership now)

In the current month:
Recent papers: 1 available of 1 total
2+ years older papers: 2 available of 2 total

Paper citation in several formats:
Courtois N. and Mercer R. (2017). Stealth Address and Key Management Techniques in Blockchain Systems.In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 559-566. DOI: 10.5220/0006270005590566

@conference{icissp17,
author={Nicolas T. Courtois and Rebekah Mercer},
title={Stealth Address and Key Management Techniques in Blockchain Systems},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={559-566},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006270005590566},
isbn={978-989-758-209-7},
}

TY - CONF

JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Stealth Address and Key Management Techniques in Blockchain Systems
SN - 978-989-758-209-7
AU - Courtois N.
AU - Mercer R.
PY - 2017
SP - 559
EP - 566
DO - 10.5220/0006270005590566

Sorted by: Show papers

Note: The preferred Subjects/Areas/Topics, listed below for each paper, are those that match the selected paper topics and their ontology superclasses.
More...

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.

Show authors

Note: The preferred Subjects/Areas/Topics, listed below for each author, are those that more frequently used in the author's papers.
More...