Ajou University repository

Private key recovery on bitcoin with duplicated signaturesoa mark
Citations

SCOPUS

3

Citation Export

DC Field Value Language
dc.contributor.authorKo, Ju Seong-
dc.contributor.authorKwak, Jin-
dc.date.issued2020-01-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/31237-
dc.description.abstractIn the modern financial sector, interest in providing financial services that employ blockchain technology has increased. Blockchain technology is efficient and can operate without a trusted party to store all transaction information; additionally, it provides transparency and prevents the tampering of transaction information. However, new security threats can occur because blockchain technology shares all the transaction information. Furthermore, studies have reported that the private keys of users who use the same signature value two or more times can be recovered. Because private keys of blockchain identify users, private key leaks can result in attackers stealing the ownership rights to users' property. Therefore, as more financial services use blockchain technology, actions to counteract the threat of private key recovery must be continually investigated. Private key recovery studies are presented here. Based on these studies, duplicated signatures generated by blockchain users are defined. Additionally, scenarios that generate and use duplicated signatures are applied in an actual bitcoin environment to demonstrate that actual bitcoin users' private keys can be recovered.-
dc.description.sponsorshipThis research was supported by the MSIT(Ministry of Science and ICT), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2019-2016-0-00304) supervised by the IITP(Institute for Information & communications Technology Planning & Evaluation)-
dc.language.isoeng-
dc.publisherKorean Society for Internet Information-
dc.subject.meshDuplicated Signatures-
dc.subject.meshECDSA-
dc.subject.meshFinancial sectors-
dc.subject.meshFinancial service-
dc.subject.meshPrivate key-
dc.subject.meshSecurity threats-
dc.subject.meshTransaction information-
dc.subject.meshWithout a trusted parties-
dc.titlePrivate key recovery on bitcoin with duplicated signatures-
dc.typeArticle-
dc.citation.endPage1300-
dc.citation.startPage1280-
dc.citation.titleKSII Transactions on Internet and Information Systems-
dc.citation.volume14-
dc.identifier.bibliographicCitationKSII Transactions on Internet and Information Systems, Vol.14, pp.1280-1300-
dc.identifier.doi10.3837/tiis.2020.03.020-
dc.identifier.scopusid2-s2.0-85082757692-
dc.identifier.urlhttp://itiis.org/digital-library/23399-
dc.subject.keywordBitcoin-
dc.subject.keywordBlockchain-
dc.subject.keywordDuplicated Signatures-
dc.subject.keywordECDSA-
dc.subject.keywordPrivate Key Recovery-
dc.description.isoatrue-
dc.subject.subareaInformation Systems-
dc.subject.subareaComputer Networks and Communications-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

KWAK, JIN Image
KWAK, JIN곽진
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.