[Resource Topic] 2022/1623: WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership

Welcome to the resource topic for 2022/1623

WOTSwana: A Generalized Sleeve Construction for Multiple Proofs of Ownership

Authors: David Chaum, Mario Larangeira, Mario Yaksetig


The \mathcal{S}_{leeve} construction proposed by Chaum et al. (ACNS’21) introduces an extra security layer for digital wallets by allowing users to generate a “back up key” securely nested inside the secret key of a signature scheme, i.e., ECDSA. The “back up key”, which is secret, can be used to issue a “proof of ownership”, i.e., only the real owner of this secret key can generate a single proof, which is based on the WOTS+ signature scheme. The authors of \mathcal{S}_{leeve} proposed the formal technique for a single proof of ownership, and only informally outlined a construction to generalize it to multiple proofs. This work identifies that their proposed construction presents drawbacks, i.e., varying of signature size and signing/verifying computation complexity, limitation of linear construction, etc. Therefore we introduce WOTSwana, a generalization of \mathcal{S}_{leeve}, which is, more concretely, a more general scheme, i.e., an extra security layer that generates multiple proofs of ownership, and put forth a thorough formalization of two constructions: (1) one given by a linear concatenation of numerous WOTS+ private/public keys, and (2) a construction based on tree like structure, i.e., an underneath Merkle tree whose leaves are WOTS+ private/public key pairs. Furthermore, we present the security analysis for multiple proofs of ownership, showcasing that this work addresses the early mentioned drawbacks of the original construction. In particular, we extend the original security definition for \mathcal{S}_{leeve}. Finally, we illustrate an alternative application of our construction, by discussing the creation of an encrypted group chat messaging application.

ePrint: https://eprint.iacr.org/2022/1623

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .