Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage
- 2.5k Downloads
A Bitcoin wallet is a set of private keys known to a user and which allow that user to spend any Bitcoin associated with those keys. In a hierarchical deterministic (HD) wallet, child private keys are generated pseudorandomly from a master private key, and the corresponding child public keys can be generated by anyone with knowledge of the master public key. These wallets have several interesting applications including Internet retail, trustless audit, and a treasurer allocating funds among departments. A specification of HD wallets has even been accepted as Bitcoin standard BIP32.
Unfortunately, in all existing HD wallets—including BIP32 wallets—an attacker can easily recover the master private key given the master public key and any child private key. This vulnerability precludes use cases such as a combined treasurer-auditor, and some in the Bitcoin community have suspected that this vulnerability cannot be avoided.
We propose a new HD wallet that is not subject to this vulnerability. Our HD wallet can tolerate the leakage of up to m private keys with a master public key size of O(m). We prove that breaking our HD wallet is at least as hard as the so-called “one more” discrete logarithm problem.
KeywordsHash Function Discrete Logarithm Problem Security Proof Fractional Reserve Elliptic Curve Digital Signature Algorithm
Research at the Perimeter Institute is supported by the Government of Canada through Industry Canada and by the Province of Ontario through the Ministry of Research and Innovation. GG also acknowledges support from CryptoWorks21. DS is supported by Australian Research Council (ARC) Discovery Project DP130104304.
- 1.Electrum lightweight Bitcoin wallet, November 2011. https://electrum.org/
- 3.Coinkite (2014). https://coinkite.com
- 5.Buterin, V.: Deterministic wallets, their advantages and their understated flaws. Bitcoin Magazine, November 2013. http://bitcoinmagazine.com/8396/deterministic-wallets-advantages-flaw/
- 6.Certicom Research: SEC 2: Recommended Elliptic Curve Domain Parameters, v2.0 (2000). http://www.secg.org/
- 8.Koblitz, N., Menezes, A.: Intractable problems in cryptography. In: Proceedings of the 9th Conference on Finite Fields and Their Applications, vol. 518, pp. 279–300. Contemporary Mathematics (2010)Google Scholar
- 9.Maxwell, G.: Deterministic wallets, June 2011. https://bitcointalk.org/index.php?topic=19137
- 10.Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf
- 11.National Institute of Standards and Technology: FIPS-186-4: Digital Signature Standard (DSS), July 2013. http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.186-4.pdf
- 12.Wuille, P.: BIP32: Hierarchical Deterministic Wallets, February 2012. https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki