Publication Type
Journal Article
Version
acceptedVersion
Publication Date
5-2025
Abstract
Hierarchical Deterministic Wallet (HDW) and Stealth Address (SA) are widely used in cryptocurrency communities due to their functionality and security. In the preliminary version of this work (ESORICS 2022), we formally define the syntax and security models of Hierarchical Deterministic Wallet supporting Stealth Address (HDWSA), capturing the functionality and security requirements imposed by the practice in cryptocurrency. We propose a concrete HDWSA construction and prove its security in the random oracle model. Note that when applied in blockchain, in practice, signature aggregation could reduce the cost of computation, storage, and communication dramatically. In this full version, we develop HDWSA definition to further support signature aggregation (referred to as HDWSA2). In particular, we first formally define HDWSA2, which, besides enjoying all the virtues of HDWSA on functionality and security, allows multiple signatures on different messages to be aggregated into one signature. We propose a concrete HDWSA2 construction and prove its security in the random oracle model. We implement our HDWSA2 construction and the experimental results show that verification of an aggregate signature is about 13× faster than sequential verification of all the individual signatures. We can reduce the size of signatures in a single block by about 60% after aggregation.
Keywords
Signature scheme, Signature aggregation, Hierarchical deterministic wallet, Stealth address, Blockchain, Cryptocurrency.
Discipline
E-Commerce | Information Security
Research Areas
Cybersecurity
Publication
IEEE Transactions on Dependable and Secure Computing
Volume
22
Issue
3
First Page
2624
Last Page
2641
ISSN
1545-5971
Identifier
10.1109/TDSC.2024.3520828
Publisher
Institute of Electrical and Electronics Engineers
Citation
YIN, Xin; LIU, Zhen; YANG, Guomin; CHEN, Guoxing; and ZHU, Haojin.
HDWSA2: A secure hierarchical deterministic wallet supporting stealth address and signature aggregation. (2025). IEEE Transactions on Dependable and Secure Computing. 22, (3), 2624-2641.
Available at: https://ink.library.smu.edu.sg/sis_research/10112
Copyright Owner and License
Authors
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
Additional URL
https://doi.org/10.1109/TDSC.2024.3520828