TY - GEN
T1 - Reminisce for Securing Private-Keys in Public
AU - Dolev, Shlomi
AU - Kumari, Komal
AU - Mehrotra, Sharad
AU - Schieber, Baruch
AU - Sharma, Shantanu
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2025.
PY - 2025
Y1 - 2025
N2 - The private key associated with a blockchain is the sole means of linking a cryptocurrency asset to its owner, and any loss or compromise of this key could result in significant consequences. Generally, crypto-wallets suggest a private key created from a string of words, which can be stored in a private record such as a piece of paper. The fact that the private record holds the secret words and can leak the private key poses security concerns. In addition, private records are susceptible to the risk of getting lost or destroyed, resulting in loss of assets. Furthermore, clients lack complete control over generating their private key, as the wallet itself creates it. Our approach enables clients to securely generate and manage their own private keys, minimizing the risk of key loss. We developed an open-source technique allowing clients to employ memorized secrets to store and retrieve their private keys. We utilize Bloom filters using hash functions, such as SHA-256, to store and retrieve the private key from the Bloom filter.
AB - The private key associated with a blockchain is the sole means of linking a cryptocurrency asset to its owner, and any loss or compromise of this key could result in significant consequences. Generally, crypto-wallets suggest a private key created from a string of words, which can be stored in a private record such as a piece of paper. The fact that the private record holds the secret words and can leak the private key poses security concerns. In addition, private records are susceptible to the risk of getting lost or destroyed, resulting in loss of assets. Furthermore, clients lack complete control over generating their private key, as the wallet itself creates it. Our approach enables clients to securely generate and manage their own private keys, minimizing the risk of key loss. We developed an open-source technique allowing clients to employ memorized secrets to store and retrieve their private keys. We utilize Bloom filters using hash functions, such as SHA-256, to store and retrieve the private key from the Bloom filter.
KW - bitcoin
KW - blockchain
KW - Bloom filter
KW - crypto-currency
KW - Crypto-wallets
KW - memorized secrets.
KW - public cloud
UR - http://www.scopus.com/inward/record.url?scp=85214248914&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85214248914&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-76934-4_11
DO - 10.1007/978-3-031-76934-4_11
M3 - Conference contribution
AN - SCOPUS:85214248914
SN - 9783031769337
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 168
EP - 177
BT - Cyber Security, Cryptology, and Machine Learning - 8th International Symposium, CSCML 2024, Proceedings
A2 - Dolev, Shlomi
A2 - Elhadad, Michael
A2 - Kutyłowski, Mirosław
A2 - Persiano, Giuseppe
PB - Springer Science and Business Media Deutschland GmbH
T2 - 8th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2024
Y2 - 19 December 2024 through 20 December 2024
ER -