Stealth Address and Key Management Techniques in Blockchain Systems

Nicolas T. Courtois, Rebekah Mercer

Abstract

Bitcoin is an open source payment system with a market capitalization of about 15 G$. During the years several key management solutions have been proposed to enhance bitcoin. The common characteristic of these techniques is that they allow to derive public keys independently of the private keys, and that these keys match. In this paper we overview the historical development of such techniques, specify and compare all major variants proposed or used in practical systems. We show that such techniques can be designed based on 2 distinct ECC arithmetic properties and how to combine both. A major trend in blockchain systems is to use by Stealth Address (SA) techniques to make different payments made to the same payee unlikable. We review all known SA techniques and show that early variants are less secure. Finally we propose a new SA method which is more robust against leakage and against various attacks.

References

  1. A. Mackenzie, S. Noether, M. C. T. (2015). Improving obfuscation in the cryptonote protocol. In online paper. https://lab.getmonero.org/pubs/MRL-0004.pdf.
  2. Courtois3b, N. (2015). Bitcoin key management: Hd wallets, bip032. In slides. http://www.nicolascourtois.com/bitcoin/paycoin dig sign key mng HD BIP032 3b.pdf.
  3. Courtois3d, N. (2015). What bitcoin private keys say to each other. In slides. http://www.nicolascourtois.com/bitcoin/paycoin dig sign combination attacks cold storage 3d.pdf.
  4. Courtois6, N. (2016). Anonymous crypto currency, stealth address, ring signatures, monero, comparison to zero.cash. In slides. http://www.nicolascourtois.com/bitcoin/paycoin privacy monero 6.pdf.
  5. dev. team Darkwallet (2014). Darkwallet/stealth. In part of Dark Wallet public development wiki. https://wiki.unsystem.net/en/index.php/DarkWallet/ Stealth.
  6. G. Gutoski, D. S. (2015). Hierarchical deterministic bitcoin wallets that tolerate key leakage. In Financial Cryptography, volume LNCS 8975, pages 497-504. https://eprint.iacr.org/2014/998.
  7. N.T. Courtois, P. Emirdag, F. V. (2014). Private key recovery combination attacks: On extreme fragility of popular bitcoin key management, wallet and cold storage solutions in presence of poor rng events. In Eprint. http://eprint.iacr.org/2014/848.
  8. N.T. Courtois, G. Song, R. C. (2016). Speed optimizations in bitcoin key recovery attacks. In will appear in proc. of CECC 2016. https://eprint.iacr.org/2016/103.pdf.
  9. S. Eskandari, D. Barrera, E. S. J. C. (2015). A first look at the usability of bitcoin key management. In In Workshop on Usable Security (USEC). https://people.inf.ethz.ch/barrerad/files/usec15- eskandari.pdf.
  10. sx library (2013). Stealth payments section 9,. In part of online manual for “sx library” . https://sx.dyne.org/stealth.html.
  11. Todd, P. (2014). [bitcoin-development] stealth addresses. In post of 04:06:05 -0800 Mon 06 Jan. http://www.mail-archive.com/bitcoindevelopment@lists.sourceforge.net/msg03613.html.
  12. user 'bytecoin', A. (17 April 2011). Untraceable transactions which can contain a secure message are inevitable. https://bitcointalk.org/index.php?topic=5965.0.
  13. van Saberhagen, N. (2013). Cryptonote v 2.0. In online paper. https://cryptonote.org/whitepaper.pdf.
  14. Wuille, P. (2014). Bip032 description, 15 jan. In the official specification of BIP032 . https://github.com/bitcoin/bips/blob/master/bip0032.mediawiki.
Download


Paper Citation


in Harvard Style

Courtois N. and Mercer R. (2017). Stealth Address and Key Management Techniques in Blockchain Systems . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 559-566. DOI: 10.5220/0006270005590566


in Bibtex Style

@conference{icissp17,
author={Nicolas T. Courtois and Rebekah Mercer},
title={Stealth Address and Key Management Techniques in Blockchain Systems},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={559-566},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006270005590566},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Stealth Address and Key Management Techniques in Blockchain Systems
SN - 978-989-758-209-7
AU - Courtois N.
AU - Mercer R.
PY - 2017
SP - 559
EP - 566
DO - 10.5220/0006270005590566