BlueWallet: The Secure Bitcoin Wallet

  • Tobias Bamert
  • Christian Decker
  • Roger Wattenhofer
  • Samuel Welten
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8743)

Abstract

With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using malware to gain access to the private keys stored on the victims’ computers or smart phones. In order to protect the Bitcoin private keys, we propose the use of a hardware token for the authorization of transactions. We created a proof-of-concept Bitcoin hardware token: BlueWallet. The device communicates using Bluetooth Low Energy and is able to securely sign Bitcoin transactions. The device can also be used as an electronic wallet in combination with a point of sale and serves as an alternative to cash and credit cards.

Keywords

Bitcoin Transaction Security Wallet Public/Private Key Authorization 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Litke, P., Stewart, J.: Cryptocurrency-stealing malware landscape (2014) (retrieved March 2014)Google Scholar
  2. 2.
    Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008), http://bitcoin.org/bitcoin.pdf (retrieved March 2014)
  3. 3.
    Decker, C., Wattenhofer, R.: Information propagation in the bitcoin network. In: Peer-to-Peer Computing (P2P) (2013)Google Scholar
  4. 4.
    Standards for Efficient Cryptography (SEC): SEC 2: Recommended elliptic curve domain parameters. Technical report, Certicom Research (2000)Google Scholar
  5. 5.
    Jonathan Fildes: PS3 ECDSA security failure, http://www.bbc.co.uk/news/technology-12116051 (retrieved March 2014)
  6. 6.
    Dubuisson, O.: ASN. 1: communication between heterogeneous systems. Morgan Kaufmann (2001)Google Scholar
  7. 7.
    Karame, G., Androulaki, E., Capkun, S.: Two bitcoins at the price of one? double-spending attacks on fast payments in Bitcoin. IACR Cryptology ePrint Archive (2012)Google Scholar
  8. 8.
    Bamert, T., Decker, C., Elsen, L., Wattenhofer, R., Welten, S.: Have a Snack, Pay with Bitcoins. In: 13th IEEE International Conference on Peer-to-Peer Computing (P2P), Trento, Italy (2013)Google Scholar
  9. 9.
    Univision Technology Inc.: UG-2864HSWEG01 datasheet, SAS1-9046-B (2009) (retrieved March 2014)Google Scholar
  10. 10.
    Bluegiga: BLE113 datasheet v1.2 (2013) (retrieved March 2014)Google Scholar
  11. 11.
    STMicroelectronics: STM32F205xx STM32F207xx datasheet, Doc ID 15818 Rev 9 (2012) (retrieved March 2014)Google Scholar
  12. 12.
    Bronleewe, D.A.: Bitcoin NFC. Technical report, University of Texas (2011)Google Scholar
  13. 13.
    Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better — how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Boehm, F., Pesch, P.: Bitcoin: A First Legal Analysis - with Reference to German and American Law. In: Workshop on Bitcoin Research (2014)Google Scholar
  15. 15.
    Litke, P., Stewart, J.: Enterprise best practices for cryptocurrency adoption (2014) (retrieved March 2014)Google Scholar
  16. 16.
    Hiltgen, A., Kramp, T., Weigold, T.: Secure internet banking authentication. Security & Privacy (2006)Google Scholar
  17. 17.
    Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation (1987)Google Scholar
  18. 18.
    Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986)Google Scholar
  19. 19.
    Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security (2001)Google Scholar
  20. 20.
    Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. Microsoft Research (November 2013)Google Scholar
  21. 21.
    Gomez, C., Oller, J., Paradells, J.: Overview and evaluation of Bluetooth Low Energy: An emerging low-power wireless technology. Sensors (2012)Google Scholar
  22. 22.
    Kamath, S., Lindh, J.: Measuring Bluetooth Low Energy power consumption. Texas instruments application note AN092, Dallas (2010)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • Tobias Bamert
    • 1
  • Christian Decker
    • 1
  • Roger Wattenhofer
    • 1
  • Samuel Welten
    • 2
  1. 1.OpenSystems AGETH ZurichSwitzerland
  2. 2.BitSplitters GmbHSwitzerland

Personalised recommendations