2019 International Conference on Innovative Computing (ICIC) 2019
DOI: 10.1109/icic48496.2019.8966739
|View full text |Cite
|
Sign up to set email alerts
|

Security Of Cryptocurrency Using Hardware Wallet And QR Code

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0
2

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(18 citation statements)
references
References 10 publications
0
16
0
2
Order By: Relevance
“…However, similar to Bitcoin, the DeFi system suffers from the problem of improper key management. Existing key management methods, such as physical storage [35] [36], offline wallets [37] [38], and password-derived wallets [39], have some drawbacks. In Table 1, we summarize 9 forms of wallets, where local storage is the initial form of local file storage, hardware wallets, and QR code wallets both belong to physical storage wallets, and the remains belong to smart contract wallets.…”
Section: ) Inappropriate Key Managementmentioning
confidence: 99%
See 2 more Smart Citations
“…However, similar to Bitcoin, the DeFi system suffers from the problem of improper key management. Existing key management methods, such as physical storage [35] [36], offline wallets [37] [38], and password-derived wallets [39], have some drawbacks. In Table 1, we summarize 9 forms of wallets, where local storage is the initial form of local file storage, hardware wallets, and QR code wallets both belong to physical storage wallets, and the remains belong to smart contract wallets.…”
Section: ) Inappropriate Key Managementmentioning
confidence: 99%
“…Key Scheme [35] Improving collaborative key generation and signature [37] Combination with a cold and hot wallet for privacy [101] A practical way to public key encryption [102] A p2p wallet scheme with a routing protocol [103] A lightweight wallet based on TEE [104] A new scheme for creating sub-wallet keys [105] The shared key generated by T-ECDSA for signing [106] Combine signatures into one based on bloom filter…”
Section: Referencementioning
confidence: 99%
See 1 more Smart Citation
“…There are guarantees with Blockchain innovation in countering security shortcomings, expanding information honesty, and changing the way toward performing exchanges into a permanent, straightforward, and decentralized design. Further works need to develop security norms and dangers as bearings on square-based frameworks security [30].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Unfortunately, the described chain of actions has a weak link: the attacker does not need to compromise the wallet to steal funds -it is sufficient to tamper with the transaction data sent for signing by falsifying the address of the recipient of funds. A recent formal security analysis by Khan et al [5] formally proves that under normal cryptographic assumptions, the user of a hardware wallet plays a crucial role in its security. One way to target the user of the hardware crypto wallet is to substitute the transaction recipient address and covertly replace it in the clipboard of the operating system.…”
Section: Introductionmentioning
confidence: 99%