Private key encryption and recovery in blockchain

07/09/2019
by   Mehmet Aydar, et al.
0

The disruptive technology of blockchain can deliver secure solutions without the need for a central authority. In blockchain, assets that belong to a participant are controlled through the private key of an asymmetric key pair that is owned by the participant. Although, this lets blockchain network participants to have sovereignty on their assets, it comes with the responsibility of managing their own keys. Currently, there exists two major bottlenecks in managing keys; a) users don't have an efficient and secure way to store their keys, b) no efficient recovery mechanism exists in case the keys are lost. In this study, we propose secure methods to efficiently store and recover keys. For the first, we introduce an efficient encryption mechanism to securely encrypt and decrypt the private key using the owner's biometric signature. For the later, we introduce an efficient recovery mechanism using biometrics and secret sharing scheme. By applying the proposed key encryption and recovery mechanism, asset owners are able to securely store their keys on their devices and recover the keys in case they are lost.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
10/22/2017

Meta-Key: A Secure Data-Sharing Protocol under Blockchain-Based Decentralised Storage Architecture

In this paper a secure data-sharing protocol under blockchain-based dece...
research
10/16/2018

Fourier domain asymmetric cryptosystem for privacy protected multimodal biometric security

We propose a Fourier domain asymmetric cryptosystem for multimodal biome...
research
04/17/2021

Blockchain-Enabled End-to-End Encryption for Instant Messaging Applications

In the era of social media and messaging applications, people are becomi...
research
07/13/2020

The Blockchain Based Auditor on Secret key Life Cycle in Reconfigurable Platform

The growing sophistication of cyber attacks, vulnerabilities in high com...
research
09/21/2021

Comparative Analysis of Cryptographic Key Management Systems

Managing cryptographic keys can be a complex task for an enterprise and ...
research
10/01/2021

Enhancing Cold Wallet Security with Native Multi-Signature schemes in Centralized Exchanges

Currently, one of the most widely used protocols to secure cryptocurrenc...
research
09/19/2022

An Owner-managed Indirect-Permission Social Authentication Method for Private Key Recovery

In this paper, we propose a very secure and reliable owner-self-managed ...

Please sign up or login with your details

Forgot password? Click here to reset