A Formal Treatment of Deterministic Wallets
- 6 November 2019
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM) in Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
- p. 651-668
- https://doi.org/10.1145/3319535.3354236
Abstract
No abstract availableKeywords
Funding Information
- National Research Center for Applied Cybersecurity (CRISP)
- DFG CRC 1119 CROSSING
- ERC Project ERCC (FP7/615074)
- German Federal Ministry of Education and Research (BMBF) iBlockchain
This publication has 14 references indexed in Scilit:
- Secure Two-party Threshold ECDSA from ECDSA AssumptionsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2018
- Automated Verification of Electrum WalletPublished by Springer Science and Business Media LLC ,2016
- Optimal Security Proofs for Signatures from Identification SchemesLecture Notes in Computer Science, 2016
- Threshold-Optimal DSA/ECDSA Signatures and an Application to Bitcoin Wallet SecurityLecture Notes in Computer Science, 2016
- Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable KeysPublished by Springer Science and Business Media LLC ,2016
- Black-Box Separations of Hash-and-Sign Signatures in the Non-Programmable Random Oracle ModelPublished by Springer Science and Business Media LLC ,2015
- Hierarchical Deterministic Bitcoin Wallets that Tolerate Key LeakagePublished by Springer Science and Business Media LLC ,2015
- Limitations of the Meta-reduction Technique: The Case of Schnorr SignaturesLecture Notes in Computer Science, 2013
- Short Signatures from the Weil PairingJournal of Cryptology, 2004
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993