Cryptocurrency wallets: assessment and security
- URL: http://arxiv.org/abs/2303.12940v1
- Date: Mon, 6 Mar 2023 08:52:01 GMT
- Title: Cryptocurrency wallets: assessment and security
- Authors: Ehsan Nowroozi, Seyedsadra Seyedshoari, Yassine Mekdad, Erkay Savas,
Mauro Conti
- Abstract summary: Hot and cold digital wallets are considered as two types of this wallet.
Digital wallets need an online connection fall into the first group, whereas digital wallets can operate without internet connection belong to the second group.
- Score: 22.2119274519877
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Digital wallet as a software program or a digital device allows users to
conduct various transactions. Hot and cold digital wallets are considered as
two types of this wallet. Digital wallets need an online connection fall into
the first group, whereas digital wallets can operate without internet
connection belong to the second group. Prior to buying a digital wallet, it is
important to define for what purpose it will be utilized. The ease with which a
mobile phone transaction may be completed in a couple of seconds and the speed
with which transactions are executed are reflection of efficiency. One of the
most important elements of digital wallets is data organization. Digital
wallets are significantly less expensive than classic methods of transaction,
which entails various charges and fees. Constantly, demand for their usage is
growing due to speed, security, and the ability to conduct transactions between
two users without the need of a third party. As the popularity of digital
currency wallets grows, the number of security concerns impacting them
increases significantly. The current status of digital wallets on the market,
as well as the options for an efficient solution for obtaining and utilizing
digital wallets. Finally, the digital wallets' security and future improvement
prospects are discussed in this chapter.
Related papers
- Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Offline Digital Euro: a Minimum Viable CBDC using Groth-Sahai proofs [0.0]
Current digital payment solutions are fragile and offer less privacy than traditional cash.
No transaction can be executed during server malfunctions or power outages.
This thesis proposes a design and a first implementation for an offline-first digital euro.
arXiv Detail & Related papers (2024-07-01T09:55:14Z) - Understanding crypter-as-a-service in a popular underground marketplace [51.328567400947435]
Crypters are pieces of software whose main goal is to transform a target binary so it can avoid detection from Anti Viruses (AVs) applications.
The crypter-as-a-service model has gained popularity, in response to the increased sophistication of detection mechanisms.
This paper provides the first study on an online underground market dedicated to crypter-as-a-service.
arXiv Detail & Related papers (2024-05-20T08:35:39Z) - IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies [49.1574468325115]
Decentralized finance (DeFi) is a disruptive-based financial infrastructure.
This paper seeks to answer two main questions 1) What are the common IT elements in the DeFi?
And 2) How the elements to the IT strategic alignment in DeFi?
arXiv Detail & Related papers (2024-05-17T10:19:20Z) - zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials [2.8023129538522853]
zkLogin is a novel technique that leverages identity tokens issued by popular platforms to authenticate transactions.
At the heart of zkLogin lies a signature scheme allowing the signer to sign using their existing OpenID accounts.
ZkLogin provides strong security and privacy guarantees.
arXiv Detail & Related papers (2024-01-22T07:23:58Z) - How does post-quantum cryptography affect Central Bank Digital Currency? [0.0]
Central Bank Digital Currency (CBDC) is an emerging trend in digital payments.
CBDC wallets are generally protected through cryptographic algorithms that safeguard against double spending and ensure non-repudiation.
With the advent of quantum computing, these algorithms are threatened by new attack vectors.
arXiv Detail & Related papers (2023-08-30T06:44:20Z) - Demonstration of quantum-digital payments [36.136619420474766]
We show how quantum light can secure daily digital payments by generating inherently unforgeable quantum cryptograms.
Unlike previously proposed protocols, our solution does not depend on long-term quantum storage or trusted agents and authenticated channels.
It is practical with near-term technology and may herald an era of quantum-enabled security.
arXiv Detail & Related papers (2023-05-23T20:20:14Z) - When Quantum Information Technologies Meet Blockchain in Web 3.0 [86.91054991998273]
We introduce a quantum blockchain-driven Web 3.0 framework that provides information-theoretic security for decentralized data transferring and payment transactions.
We discuss the potential applications and challenges of implementing quantum blockchain in Web 3.0.
arXiv Detail & Related papers (2022-11-29T05:38:42Z) - Decentralized Digital Currency System using Merkle Hash Trees [0.2624902795082451]
We propose a novel Decentralized Digital Currency System (DDCS) that makes use of Merkle Hash-Trees as Authenticated Data Structures.
$delta$-Money is intended as a replacement for physical currency and has in-built security features that rival crypto-currencies.
arXiv Detail & Related papers (2022-05-06T14:31:18Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Digital Twins: State of the Art Theory and Practice, Challenges, and
Open Research Questions [62.67593386796497]
This work explores the various DT features and current approaches, the shortcomings and reasons behind the delay in the implementation and adoption of digital twin.
The major reasons for this delay are the lack of a universal reference framework, domain dependence, security concerns of shared data, reliance of digital twin on other technologies, and lack of quantitative metrics.
arXiv Detail & Related papers (2020-11-02T19:08:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.