Skip to main content

Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain

  • 1755 Accesses

Part of the Lecture Notes in Computer Science book series (LNTCS,volume 11604)


In Bitcoin, the knowledge of private key equals to the ownership of bitcoin, which occurs two problems: the first problem is that the private key must be kept properly, and the second one is that once the private key is given, it can’t be taken back, hence the bitcoin system can only implement the transfer function. In this paper, we first propose a new digital signature algorithm and use it to design an online wallet, which can help the user derive the signature without obtaining the user’s private key. Secondly, using our proposed online wallet, we extend the application of private key so that the cryptocurrency system can implement the authorization function. In more detail, we define a new primitive that we call decentralized hierarchical authorized payment scheme (DHAP scheme). We next propose a concrete instantiation and prove its correctness. Finally, we analyze the security and usability of our scheme. For security, we prove our scheme to be secure under the random oracle model. For usability, we examine its performance and compare it with bitcoin’s performance.


  • Blockchain
  • Online wallet
  • Decentralized hierarchical authorized payment scheme

This is a preview of subscription content, access via your institution.

Buying options

USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-030-23597-0_29
  • Chapter length: 12 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
USD   84.99
Price excludes VAT (USA)
  • ISBN: 978-3-030-23597-0
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   109.99
Price excludes VAT (USA)
Fig. 1.
Fig. 2.


  1. Nakamoto, S.: Bitcoin: A Peer-To-Peer Electronic Cash System (2008).

  2. Eyal, I., Gencer, A.E., Sirer, E.G., et al.: Bitcoin-NG: a scalable blockchain protocol. In: 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp. 45–59 (2016)

    Google Scholar 

  3. Cachin, C.: Architecture of the hyperledger blockchain fabric. In: Workshop on Distributed Cryptocurrencies and Consensus Ledgers, p. 310 (2016)

    Google Scholar 

  4. Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015).

    Google Scholar 

  5. Yossi, G., Rotem, H., Silvio, M., et al.: Algorand: scaling Byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 51–68. ACM (2017)

    Google Scholar 

  6. Zhengtong, T.: Summary of typical token stolen case hacking methods in history.

  7. Kosba, A., Miller, A., Shi, E., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE Symposium on Security and Privacy (SP), pp. 839–858. IEEE (2016).

  8. Zhao, J.L., Fan, S., Yan, J.: Overview of business innovations and research opportunities in blockchain and introduction to the special issue. Financ. Innov. 1(2), 28 (2016)

    Google Scholar 

  9. Wuille, P.: BIP32: hierarchical deterministic wallets, February 2012.

  10. Gutoski, G., Stebila, D.: Hierarchical deterministic Bitcoin wallets that tolerate key leakage. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 497–504. Springer, Heidelberg (2015).

    Google Scholar 

  11. Armory: Armory Secure Wallet.

  12. Bitcoin CD: Bitcoin Core.

  13. Dmitrienko, A., Noack, D., Yung, M.: In: Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, pp. 520–531. ACM (2017)

    Google Scholar 

  14. Eskandari, S., Clark, J., Barrera, D., et al.: A first look at the usability of bitcoin key management. preprint arXiv arXiv: 1802.04351 (2018). Journal 2(5), 99–110 (2016)

  15. Kaliski, B.: PKCS 5: password-based cryptography specification version 2.0.

  16. Jin, A.T.B., Ling, D.N.C., Goh, A.: Biohashing: two factor authentication featuring fingerprint data and tokenised random number. Pattern Recogn. 11(37), 2245–2255 (2004)

    Google Scholar 

  17. Gennaro, R., Goldfeder, S., Narayanan, A.: Threshold-optimal DSA/ECDSA signatures and an application to bitcoin wallet security. In: Manulis, M., Sadeghi, A.-R., Schneider, S. (eds.) ACNS 2016. LNCS, vol. 9696, pp. 156–174. Springer, Cham (2016).

    Google Scholar 

  18. Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 3(4), 161–174 (1991)

    Google Scholar 

  19. Bellare, M., Rogaway, P.: Random oracles are practical-a paradigm for designing efficient protocols. In: Proceedings of the First ACM Conference on Computer and Communications Security, pp. 62–73. ACM (1993)

    Google Scholar 

  20. Bellare, M., Rogaway, P.: The exact security of digital signatures-how to sign with RSA and Rabin. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 399–416. Springer, Heidelberg (1996).

    Google Scholar 

Download references


This work is supported by National Key R&D Program of China (No. 2018YFB0803402), National Natural Science Foundation of China (No. 61702503) and National Natural Science Foundation of China (No. 61772516).

Author information

Authors and Affiliations


Corresponding author

Correspondence to Mingsheng Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Verify currency and authenticity via CrossMark

Cite this paper

Wei, Q., Li, S., Li, W., Li, H., Wang, M. (2019). Decentralized Hierarchical Authorized Payment with Online Wallet for Blockchain. In: Biagioni, E., Zheng, Y., Cheng, S. (eds) Wireless Algorithms, Systems, and Applications. WASA 2019. Lecture Notes in Computer Science(), vol 11604. Springer, Cham.

Download citation

  • DOI:

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-23596-3

  • Online ISBN: 978-3-030-23597-0

  • eBook Packages: Computer ScienceComputer Science (R0)