Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events.
Nicolas T. CourtoisPinar EmirdagFilippo ValsordaPublished in: IACR Cryptol. ePrint Arch. (2014)
Keyphrases
- key management
- key distribution
- private key
- digital signature
- secret sharing scheme
- security protocols
- secret key
- signcryption scheme
- trusted third party
- wireless sensor networks
- public key
- resource constrained
- security mechanisms
- secret sharing
- ad hoc networks
- smart card
- diffie hellman
- security services
- digital watermarking
- standard model
- provably secure
- sensor networks
- wireless ad hoc networks
- elliptic curve
- security analysis
- watermarking technique
- credit card
- data storage
- fault tolerant
- bilinear pairings
- signature scheme