This page is read only. You can view the source, but not change it. Ask your administrator if you think this is wrong. ====== Privacy-friendly Monero transaction signing on a hardware wallet [IFIPSEC 2020] ====== ~~NOTOC~~ <grid> <col xs="12" sm="8" lg="8"> <TEXT size="large"> \_{{fa>user}}\_\_//Authors:// Dusan Klinec and Vashek Matyas {{fa>user-circle-o}}\_//Primary contact:// Dusan Klinec %%<%%<ph4r05@mail.muni.cz>%%>%% {{fa>bullhorn}}\_//Conference:// [[https://sec2020.um.si/|IFIPSEC 2020]] </TEXT> </col> <col xs="12" sm="4" lg="4"> <TEXT align="right"> <button type="warning" icon="fa fa-file-pdf-o">[[https://crocs.fi.muni.cz/_media/publications/pdf/2020-ifipsec-klinec.pdf|Pre-print PDF]]</button> \_ <button icon="fa fa-file-image-o">[[|Presentation]]</button> \_ <button collapse="bibtex" icon="fa fa-file-code-o">BiBTeX</button> \_ <button type="primary" icon="fa fa-github">[[https://github.com/ph4r05/monero-tx-paper|Github]]</button> </TEXT> </col> </grid> <collapse id="bibtex" collapsed="true"> @InProceedings{2020-ifipsec-klinec, Author = {Dusan Klinec and Vashek Matyas}, Title = {Privacy-Friendly Monero Transaction Signing on a Hardware Wallet}, BookTitle = {{ICT} Systems Security and Privacy Protection - 35th {IFIP} {TC} 11 International Conference, {SEC} 2020, Maribor, Slovenia, September 21-23, 2020, Proceedings}, Series = {{IFIP} Advances in Information and Communication Technology}, Volume = {580}, Pages = {338--351}, Publisher = {Springer}, Year = {2020}, DOI = {10.1007/978-3-030-58201-2\_23} Keywords = {Monero, Bulletproofs, hardware wallets, cryptocurrency, cryptoimplementations} } </collapse> <panel type="default" title="Abstract"> Keeping cryptocurrency spending keys safe and being able to use them when signing a transaction is a well-known problem, addressed by hardware wallets. Our work focuses on a transaction signing process for privacy-centric cryptocurrency Monero, in the hardware wallets. We designed, implemented, and analyzed a privacy-preserving transaction signing protocol that runs on a hardware wallet and protects the spending keys. Moreover, we also implemented a privacy-preserving multi-party version of the Bulletproof zero-knowledge prover algorithm, which runs on a hardware wallet with constant memory. We present the protocols and evaluate their performance on a real hardware wallet. </panel> ===== Further research ===== ===== Key points =====