0% found this document useful (0 votes)
71 views19 pages

Meta Wallet Presentation

The document proposes fortifying digital asset wallet security with post-quantum cryptography and zero-knowledge proofs. It discusses problems with existing wallet security against quantum attacks. The proposed solution incorporates post-quantum cryptography and zero-knowledge proofs to generate private keys on the client-side, allow password-based access instead of recovery phrases, and enable private key recovery. It aims to provide enhanced security while maintaining usability. The working mechanism uses a combination of elliptic curve cryptography, lattice-based cryptography, and secret sharing to securely generate and manage private keys.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
71 views19 pages

Meta Wallet Presentation

The document proposes fortifying digital asset wallet security with post-quantum cryptography and zero-knowledge proofs. It discusses problems with existing wallet security against quantum attacks. The proposed solution incorporates post-quantum cryptography and zero-knowledge proofs to generate private keys on the client-side, allow password-based access instead of recovery phrases, and enable private key recovery. It aims to provide enhanced security while maintaining usability. The working mechanism uses a combination of elliptic curve cryptography, lattice-based cryptography, and secret sharing to securely generate and manage private keys.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19

..

Fortifying Digital Asset Wallet Security with


Post-Quantum Cryptography and Zero-Knowledge Proof

Date:
Date: 2nd May 2023

Yathin Prakash Kethepalli


Dr. Shyama Prasad Mukherjee International
Institute of Information Technology, Naya Rony Joseph
Raipur 
Sai Raja Vajrala

International Institute of Information Technology, Naya Raipur


Content
• Introduction
• Problem Statement
• Background
• Objectives and Contributions
• Literature Review
• Proposed Solution
• Conclusion
• References

02-05-2023 International Institute of Information Technology, Naya Raipur 2


Problem Statement

The inadequacy of cryptographic techniques in digital asset wallets against


quantum computer attacks necessitates a secure and user-friendly approach
that incorporates post-quantum cryptography and zero-knowledge proof to
ensure wallet safety and maintain user trust.

02-05-2023 International Institute of Information Technology, Naya Raipur 3


02-05-2023 International Institute of Information Technology, Naya Raipur 4
Background on wallets

• Used for storing digital assets


• Symmetric key cryptography
• Seed generation based on Secret recovery phrase (SRP)
• 12/24 word SRP for key generation
• Transactions broadcast to the network

02-05-2023 International Institute of Information Technology, Naya Raipur 5


Seed generation based on SRP

Fig 1: Key generation in Traditional Wallets

02-05-2023 International Institute of Information Technology, Naya Raipur 6


Secret Recovery Phrase in Wallets

Wallet Address (For Txn)

}
Public Key

Private Key

Fig 2: Example of SRP used to access wallet


International Institute of Information Technology, Naya Raipur 7
02-05-2023
Literature Review
R.no Paper Title Methodology
1 Enhancing the Security of the Combining Blockchain and IPFS to store files. Using only AES to encrypt file
Blockchain and the File Contents contents.

2 Secure Distributed Cloud Storage Using a Ethereum Blockchain to store & transfer files using smart contracts.
based on the Blockchain Using only RSA for encryption.
Technology and Smart Contracts

3 Decentralized File Storage Uses Blockchain and IPFS to transfer files. Only peer-to-peer transfer is possible .
(Interplanetary File System) using No groups or global space.
Blockchain

4 A Secure File Sharing System Based Uses a secure file sharing system that brings a distributed access control and group
on IPFS and Blockchain key management. No global space.

02-05-2023 International Institute of Information Technology, Naya Raipur 8


Objectives

• Post-quantum security
• Client-side private key generation
• Password-based system (No 12/24 word SRP)
• Rekeying private key
• Private key Recovery

02-05-2023 International Institute of Information Technology, Naya Raipur 9


Working
Mechanism

02-05-2023 International Institute of Information Technology, Naya Raipur 10


Client Side Working Mechanism

Username
Hashed Username Hash
Password Function
Password
Hashed

02-05-2023 International Institute of Information Technology, Naya Raipur 11


Client Side Working Mechanism

Hashed Username Point


Point Hashon
Hashed Password Function
EC
EC
Alpha
exponentiation
True
Random value (Cr)
Random

02-05-2023 International Institute of Information Technology, Naya Raipur 12


Server Side Working Mechanism

EC Alpha
Beta
exponentiation Random value (Sr)

02-05-2023 International Institute of Information Technology, Naya Raipur 13


Client Side Working Mechanism

Beta EC
Gamma
Cr Inverse exponentiation
Lattice-based
Secret Sharing
Secret
Hashed Password

02-05-2023 International Institute of Information Technology, Naya Raipur 14


Working Mechanism

Fig 4: Block diagram of proposed solution

02-05-2023 International Institute of Information Technology, Naya Raipur 15


Working
Model
DEMO
02-05-2023 International Institute of Information Technology, Naya Raipur 16
Conclusion
• Promising solution for securing digital asset wallets
• Offer enhanced security features

Future Works
• Involving more lattice-based cryptography
• Implementing social recovery
• Push Notifications
• Mobile Application

02-05-2023 International Institute of Information Technology, Naya Raipur 17


References
1. A. F, F. S. “Improving SPV-Based Cryptocurrency Wallet,” in SpringerLink , doi:
https://doi.org/10.1007/978-981-15-1632-0_14
2. A. Di. L, D. F, G. A. “Arcula: A Secure Hierarchical Deterministic Wallet for Multi-
asset Blockchains,” in ‘Arxiv’, doi: https://doi.org/10.48550/arXiv.1906.05919
3. Mingxing Hu. “Post-Quantum Secure Deterministic Wallet: Stateless, Hot/Cold
Setting, and More Secure “ in IACR, doi: https://eprint.iacr.org/2023/062 .
4. C. -Y. Li, X. -B. Chen, Y. -L. Chen, Y. -Y. Hou and J. Li, "A New Lattice-Based
Signature Scheme in Post-Quantum Blockchain Network," in IEEE Access, vol. 7, pp.
2026-2033, 2019, doi: 10.1109/ACCESS.2018.2886554.

02-05-2023 International Institute of Information Technology, Naya Raipur 18


..

Thank You

Dr. Shyama Prasad Mukherjee International


Institute of Information Technology, Naya
Raipur 

International Institute of Information Technology, Naya Raipur 19


02-05-2023

You might also like