Contract Wallet Using Emails
- URL: http://arxiv.org/abs/2312.04173v1
- Date: Thu, 7 Dec 2023 09:48:25 GMT
- Title: Contract Wallet Using Emails
- Authors: Sora Suegami, Kyohei Shibano,
- Abstract summary: We propose a new construction for contract wallets, smart contract applications that allow users to control their crypto assets.
Users can manipulate their crypto assets by simply sending emails with no need to manage keys.
Unless the sender domain server forges the emails, the crypto assets remain secure in the proposed system.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We proposed a new construction for contract wallets, smart contract applications that allow users to control their crypto assets. Users can manipulate their crypto assets by simply sending emails with no need to manage keys. These emails are verified using zero-knowledge proof (ZKP) along with their attached digital signatures that the sender domain server (SDS) generates according to DomainKeys Identified Mail. Unless the SDS forges the emails, the crypto assets remain secure in the proposed system. Moreover, the existing SDSs can be used as is by outsourcing additional work to a third party that is not necessarily trusted. The system supports various functions to manipulate crypto assets. We produced a tool for variable-regex mapping (VRM) that enables developers to build a new function without ZKP skills. For example, using the tool, we built a demo application where users can exchange crypto assets via Uniswap only with emails. The published version of this paper is available at https://doi.org/10.1109/ICBC56567.2023.10174932.
Related papers
- Liquefaction: Privately Liquefying Blockchain Assets [6.323132738822794]
We present Liquefaction, a wallet platform that demonstrates the dangerous foundational assumption by systemically breaking it.
Liquefaction uses trusted execution environments (TEEs) to encumber private keys, i.e., attach rich, multi-user policies to their use.
It accomplishes these things privately, with no direct on-chain traces.
arXiv Detail & Related papers (2024-12-03T18:03:54Z) - Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments [7.8925011858865695]
We propose functional adaptor signatures (FAS), a cryptographic primitive and show how it can be used to enable functional sales.
We formalize the security properties of FAS, among which is a new notion called witness privacy to capture seller's privacy.
We present multiple variants of witness privacy, namely, witness hiding, witness indistinguishability, and zero-knowledge.
arXiv Detail & Related papers (2024-10-14T23:17:03Z) - VELLET: Verifiable Embedded Wallet for Securing Authenticity and Integrity [0.6144680854063939]
This paper proposes a new protocol to enhance the security of embedded wallets.
Our VELLET protocol introduces a wallet verifier that can match the audit trail of embedded wallets on smart contracts.
arXiv Detail & Related papers (2024-04-05T03:23:19Z) - zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials [2.8023129538522853]
zkLogin is a novel technique that leverages identity tokens issued by popular platforms to authenticate transactions.
At the heart of zkLogin lies a signature scheme allowing the signer to sign using their existing OpenID accounts.
ZkLogin provides strong security and privacy guarantees.
arXiv Detail & Related papers (2024-01-22T07:23:58Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - SigRec: Automatic Recovery of Function Signatures in Smart Contracts [40.20115707680234]
It is challenging to recover function signatures from contract bytecode, since neither debug information nor type information is present in the bytecode.
We develop SigRec, a new tool for recovering function signatures from contract bytecode without the need of source code and function signature databases.
arXiv Detail & Related papers (2023-05-11T18:03:39Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Serverless Electronic Mail [0.0]
We describe a simple approach to peer-to-peer electronic mail that would allow users to exchange messages without relying upon third-party mail server operators.
The system allows participants to establish and use multiple unlinked identities for communication with each other.
The design offers a robust, unintrusive method to use self-certifying Tor onion service names to bootstrap a web of trust.
arXiv Detail & Related papers (2020-07-09T07:35:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.