License: Creative Commons Attribution 4.0 International license (CC BY 4.0)
When quoting this document, please refer to the following
DOI: 10.4230/OASIcs.Tokenomics.2021.4
URN: urn:nbn:de:0030-drops-159012
URL: http://dagstuhl.sunsite.rwth-aachen.de/volltexte/2022/15901/
Eyal, Ittay
On Cryptocurrency Wallet Design
Abstract
The security of cryptocurrency and decentralized blockchain-maintained assets relies on their owners safeguarding secrets, typically cryptographic keys. This applies equally to individuals keeping daily-spending amounts and to large asset management companies. Loss of keys and attackers gaining control of keys resulted in numerous losses of funds.
The security of individual keys was widely studied with practical solutions available, from mnemonic phrases to dedicated hardware. There are also techniques for securing funds by requiring combinations of multiple keys. However, to the best of our knowledge, a crucial question was never addressed: How is wallet security affected by the number of keys, their types, and how they are combined? This is the focus of this work.
We present a model where each key has certain probabilities for being safe, lost, leaked, or stolen (available only to an attacker). The number of possible wallets for a given number of keys is the Dedekind number, prohibiting an exhaustive search with many keys. Nonetheless, we bound optimal-wallet failure probabilities with an evolutionary algorithm.
We evaluate the security (complement of failure probability) of wallets based on the number and types of keys used. Our analysis covers a wide range of settings and reveals several surprises. The failure probability general trend drops exponentially with the number of keys, but has a strong dependency on its parity. In many cases, but not always, heterogeneous keys (not all with the same fault probabilities) allow for superior wallets than homogeneous keys. Nonetheless, in the case of 3 keys, the common practice of requiring any pair is optimal in many settings.
Our formulation of the problem and initial results reveal several open questions, from user studies of key fault probabilities to finding optimal wallets with very large numbers of keys. But they also have an immediate practical outcome, informing cryptocurrency users on optimal wallet design.
BibTeX - Entry
@InProceedings{eyal:OASIcs.Tokenomics.2021.4,
author = {Eyal, Ittay},
title = {{On Cryptocurrency Wallet Design}},
booktitle = {3rd International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2021)},
pages = {4:1--4:16},
series = {Open Access Series in Informatics (OASIcs)},
ISBN = {978-3-95977-220-4},
ISSN = {2190-6807},
year = {2022},
volume = {97},
editor = {Gramoli, Vincent and Halaburda, Hanna and Pass, Rafael},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/opus/volltexte/2022/15901},
URN = {urn:nbn:de:0030-drops-159012},
doi = {10.4230/OASIcs.Tokenomics.2021.4},
annote = {Keywords: cryptocurrency, wallet, key-management, authentication}
}
Keywords: |
|
cryptocurrency, wallet, key-management, authentication |
Collection: |
|
3rd International Conference on Blockchain Economics, Security and Protocols (Tokenomics 2021) |
Issue Date: |
|
2022 |
Date of publication: |
|
18.03.2022 |