Hierarchical deterministic bitcoin wallets that tolerate key leakage
From MaRDI portal
Publication:2948192
DOI10.1007/978-3-662-47854-7_31zbMATH Open1415.94436OpenAlexW2293367740MaRDI QIDQ2948192FDOQ2948192
Authors: Gus Gutoski, Douglas Stebila
Publication date: 29 September 2015
Published in: Financial Cryptography and Data Security (Search for Journal in Brave)
Full work available at URL: https://eprints.qut.edu.au/82221/1/hdwallet.pdf
Recommendations
- W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets
- Minimizing trust in hardware wallets with two factor signatures
- Speed optimizations in bitcoin key recovery attacks
- Simple Schnorr multi-signatures with applications to bitcoin
- On the security of ECDSA with additive key derivation and presignatures
Cites Work
Cited In (9)
- Speed optimizations in bitcoin key recovery attacks
- A secure hierarchical deterministic wallet with stealth address from lattices
- Title not available (Why is that?)
- Post-quantum key-blinding for authentication in anonymity networks
- Minimizing trust in hardware wallets with two factor signatures
- On the security of ECDSA with additive key derivation and presignatures
- W-OTS\textsuperscript{+} up my sleeve! A hidden secure fallback for cryptocurrency wallets
- Shared-custodial password-authenticated deterministic wallets
- Deterministic wallets for adaptor signatures
This page was built for publication: Hierarchical deterministic bitcoin wallets that tolerate key leakage
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948192)