TY - GEN
T1 - Brief Announcement
T2 - 26th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2024
AU - Dolev, Shlomi
AU - Kumari, Komal
AU - Mehrotra, Sharad
AU - Schieber, Baruch
AU - Sharma, Shantanu
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025/1/1
Y1 - 2025/1/1
N2 - The private key associated with a blockchain is the sole means of linking a cryptocurrency asset to its owner, and any loss or compromise of this key could result in significant consequences. Typically, crypto-wallets generate a private key from a string of words, which users are advised to store in a private record, such as a piece of paper. This method poses several security risks, as the private record holding the secret words can leak the private key. Additionally, private records are vulnerable to being lost or destroyed, leading to the potential loss of assets. Moreover, clients have limited control over the generation of their private key, as the wallet generates it. Our approach empowers clients to securely generate and manage their own private keys, minimizing the risk of key loss. We have developed an open-source technique that allows clients to use memorized secrets to store and retrieve their private keys. Our method employs Bloom filters with hash functions, such as SHA-256, to store and retrieve the private key from the Bloom filter securely.
AB - The private key associated with a blockchain is the sole means of linking a cryptocurrency asset to its owner, and any loss or compromise of this key could result in significant consequences. Typically, crypto-wallets generate a private key from a string of words, which users are advised to store in a private record, such as a piece of paper. This method poses several security risks, as the private record holding the secret words can leak the private key. Additionally, private records are vulnerable to being lost or destroyed, leading to the potential loss of assets. Moreover, clients have limited control over the generation of their private key, as the wallet generates it. Our approach empowers clients to securely generate and manage their own private keys, minimizing the risk of key loss. We have developed an open-source technique that allows clients to use memorized secrets to store and retrieve their private keys. Our method employs Bloom filters with hash functions, such as SHA-256, to store and retrieve the private key from the Bloom filter securely.
UR - http://www.scopus.com/inward/record.url?scp=85207825236&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-74498-3_24
DO - 10.1007/978-3-031-74498-3_24
M3 - Conference contribution
AN - SCOPUS:85207825236
SN - 9783031744976
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 338
EP - 343
BT - Stabilization, Safety, and Security of Distributed Systems - 26th International Symposium, SSS 2024, Proceedings
A2 - Masuzawa, Toshimitsu
A2 - Katayama, Yoshiaki
A2 - Kim, Yonghwan
A2 - Kakugawa, Hirotsugu
A2 - Nakamura, Junya
PB - Springer Science and Business Media Deutschland GmbH
Y2 - 20 October 2024 through 22 October 2024
ER -