Browse > Article
http://dx.doi.org/10.3837/tiis.2021.08.009

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing  

Li, Guojia (School of Cyberspace Security, Hangzhou Dianzi University)
You, Lin (School of Cyberspace Security, Hangzhou Dianzi University)
Hu, Gengran (School of Cyberspace Security, Hangzhou Dianzi University)
Hu, Liqin (School of Cyberspace Security, Hangzhou Dianzi University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.15, no.8, 2021 , pp. 2865-2878 More about this Journal
Abstract
As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.
Keywords
consortium blockchain; private key; threshold secret sharing; verifiability; biometrics;
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. Feng, K. Yu, A. K. Bashir, Y. D. Al-Otaibi, Y. Lu, S. Chen, D. Zhang, "Efficient and secure data sharing for 5G flying drones: a blockchain-enabled approach," IEEE Network, vol. 35, no. 1, pp. 130-137. Feb. 2021.   DOI
2 M. Guri, "Beatcoin: Leaking private keys from air-gapped cryptocurrency wallets," in Proc. of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, pp. 1308-1316, Aug. 2018.
3 N. Z. Aitzhan and D. Svetinovic, "Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 5, pp. 840-852, Oct. 2018.   DOI
4 D. Khovratovich and J. Law, "BIP32-Ed25519: Hierarchical Deterministic Keys over a Non-linear Keyspace," in Proc. of the 2017 IEEE European Symposium on Security and Privacy Workshops, Paris, pp. 27-31, Apr. 2017.
5 M. El Ghazouani, E. kiram, M. Ahmed, "Efficient Method Based on Blockchain Ensuring Data Integrity Auditing with Deduplication in Cloud," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3, pp. 32-38. Sep. 2020.   DOI
6 J. Zhou and R. Qu, "Study on the healing blockchain wallet protection mechanism against conspiracy attack," Computer Engineering, pp. 1-7, Apr. 2020.
7 F. Jurado, O. Delgado, A. Ortigosa, "Tracking News Stories Using Blockchain to Guarantee their Traceability and Information Analysis," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3, pp. 39-46. Sep. 2020.   DOI
8 M. Saez, "Blockchain-Enabled Platforms: Challenges and Recommendations," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3 pp. 73-89. Sep. 2020.   DOI
9 Y. Liu, R. Li, X. Liu, J. Wang, L. Zhang, C. Tang, and H. Kang, "An efficient method to enhance bitcoin wallet security," in Proc. of the 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen. pp. 26-29, Oct. 2017.
10 S. Eskandari, J. Clark, D. Barrera, and E. Stobert, "A first look at the usability of bitcoin key management," in Proc. of NDSS Symposium 2015, 2015.
11 G. Gutoski and D. Stebila, "Hierarchical deterministic bitcoin wallets that tolerate key leakage," in Proc. of the International Conference on Financial Cryptography and Data Security, Springer, pp. 497-504, Jul. 2015.
12 A. Ouaddah, H. Mousannif, A. Abou Elkalam, and A. A. Ouahman, "Access control in the internet of things: Big challenges and new opportunities," Computer Networks, vol. 112, pp. 237-262, Jan. 2017.   DOI
13 L. Harn and C.-F. Hsu, "Dynamic threshold secret reconstruction and its application to the threshold cryptography," Information Processing Letters, vol. 115, no. 11, pp. 851-857, Nov. 2015.   DOI
14 H. N. Dai, Z. Zheng, and Y. Zhang, "Blockchain for internet of things: A survey," IEEE Internet of Things Journal, vol. 6, no. 5, pp. 8076-8094, Oct. 2019.   DOI
15 A. Baldominos, JL. Lopez-Sanchez, M. Acevedo-Aguilar, "Blockverse: A Cloud Blockchain-based Platform for Tracking in Affiliate Systems," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, no. 3. Jun. 2020.
16 N. K. shetri, "1 blockchain's roles in meeting key supply chain management objectives," International Journal of Information Management, vol. 39, pp. 80-89, Apr. 2018.   DOI
17 G. Maxwell, A. Poelstra, Y. Seurin, and P. Wuille, "Simple schnorr multisignatures with applications to bitcoin," Designs, Codes and Cryptography, vol. 87, no. 9, pp. 2139-2164, Feb. 2019.   DOI
18 D. Boneh, R. Gennaro, and S. Goldfeder, "Using level-1 homomorphic encryption to improve threshold dsa signatures for bitcoin wallet security," in Proc. of the International Conference on Cryptology and Information Security in Latin America, Springer, pp. 352-377, Jul. 2017.
19 P. Dikshit and K. Singh, "Efficient weighted threshold ecdsa for securing bitcoin wallet," in Proc. of the 2017 ISEA Asia Security and Privacy (ISEASP), Surat, pp. 1-9, Feb. 2017.
20 A. Shamir, "How to share a secret," Communications of the ACM, vol. 22, no. 11, pp. 612-613, Nov. 1979.   DOI
21 H. S. Jennath, V. S. Anoop, S. Asharaf, "Blockchain for Healthcare: Securing Patient Data and Enabling Trusted Artificial Intelligence," International Journal of Interactive Multimedia and Artificial Intelligence, vol. 6, pp. 15-23. Dec. 2020.
22 S. Jamshidpour and Z. Ahmadian, "Security analysis of a dynamic threshold secret sharing scheme using linear subspace method," Information Processing Letters, vol. 163, p. 105994, Nov. 2020.   DOI
23 N. Zhang, Y.L. Zang, and J. Tian, "The integration of biometrics and cryptography-a new solution for secure identity authentication," Journal of Cryptologic Research, vol. 2, no. 2, pp. 159-176, Apr. 2015.
24 J. Han, M. Song, H. Eom, Y. Son, "An efficient multi-signature wallet in blockchain using bloom filter," in Proc. of the 36th Annual ACM Symposium on Applied Computing, pp. 273-281. Mar. 2021.
25 Nakamoto Satoshi, "Bitcoin: A peer-to-peer electronic cash system," Manubot, Nov. 2019.
26 C. Esposito, M. Ficco, B. B. Gupta, "Blockchain-based authentication and authorization for smart city applications," Information Processing and Management, vol. 58, no. 2, pp. 102468, Mar. 2021.   DOI
27 H. M. Kim, M. Laskowski, "Toward an ontology-driven blockchain design for supply-chain provenance," Intelligent Systems in Accounting, Finance and Management, vol. 25, no. 1, pp. 18-27, Mar. 2018.   DOI