{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T00:03:45Z","timestamp":1770681825944,"version":"3.49.0"},"reference-count":150,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,5,27]],"date-time":"2024-05-27T00:00:00Z","timestamp":1716768000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,5,27]]},"DOI":"10.1109\/icbc59979.2024.10634356","type":"proceedings-article","created":{"date-parts":[[2024,8,21]],"date-time":"2024-08-21T22:53:39Z","timestamp":1724280819000},"page":"747-765","source":"Crossref","is-referenced-by-count":5,"title":["Pragmatic Analysis of Key Management for Cryptocurrency Custodians"],"prefix":"10.1109","author":[{"given":"Yuto","family":"Takei","sequence":"first","affiliation":[{"name":"Tokyo Institute of Technology,Mercari, Inc"}]},{"given":"Kazuyuki","family":"Shudo","sequence":"additional","affiliation":[{"name":"Kyoto University"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/49.223881"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MARK.1979.8817296"},{"key":"ref3","doi-asserted-by":"crossref","volume-title":"A first look at the usability of bitcoin key management","author":"Eskandari","DOI":"10.14722\/usec.2015.23015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174959"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/356789.356794"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref7","article-title":"Financial Institution Key Management (Wholesale)","year":"1985","journal-title":"American Bankers Association"},{"key":"ref8","volume-title":"PGP Source Code and Internals","author":"Zimmermann","year":"1995"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2003.1195151"},{"key":"ref10","year":"2019","journal-title":"X.509 (10\/19): Information technology \u2013 Open Systems Interconnection \u2013 The Directory: Public-key and attribute certificate frameworks"},{"key":"ref11","article-title":"DigiNotar certificate authority breach crashes egovernment in the Netherlands","volume-title":"IEEE Spectrum","author":"Charette"},{"key":"ref12","first-page":"42","year":"2023","journal-title":"Baseline requirements for the issuance and management of publicly-trusted certificates - version 2.0.1"},{"key":"ref13","volume-title":"RFC 4033, DNS Security Introduction and Requirements","author":"Rose","year":"2005"},{"key":"ref14","volume-title":"Key signing ceremonies"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-57pt1r5"},{"key":"ref16","article-title":"SP 800-130, A Framework for Designing Cryptographic Key Management Systems","author":"Barker","year":"2013","journal-title":"National Institute of Standards and Technology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.140-3"},{"key":"ref18","article-title":"FIPS 186-5, Digital Signature Standard (DSS)","author":"Raimondo","year":"2023","journal-title":"National Institute of Standards and Technology"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4107"},{"key":"ref20","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCSP49186.2020.9315193"},{"key":"ref24","volume-title":"Sok: Design, vulnerabilities, and security measures of cryptocurrency wallets","author":"Erinle","year":"2023"},{"key":"ref25","volume-title":"How to launder $500 million in digital currency","author":"Alpeyev","year":"2018"},{"key":"ref26","volume-title":"Crypto exchange zaif hacked in $60 million bitcoin theft","author":"Zhao","year":"2018"},{"key":"ref27","volume-title":"QuadrigaCX: A review by staff of the Ontario Securities Commission","year":"2020"},{"key":"ref28","volume-title":"Exhibit A \u2013 Document #1242, Attachment #1","year":"2023"},{"key":"ref29","volume-title":"Petition for appointment of receiver, temporary injunction, and other permanent relief","author":"Detmer","year":"2023"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169412"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-9278-8_1"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65729-1_8"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883450"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2023.103607"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.6028\/nist.fips.199"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102090"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609966"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866324"},{"key":"ref42","volume-title":"Ethercombing: Finding secrets in popular places","year":"2019"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00227"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-68697-5_11"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6979"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"ref48","article-title":"IEEE standard for general requirements for cryptocurrency exchanges","year":"2020","journal-title":"IEEE Std 2140.1-2020"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.fsir.2021.100241"},{"key":"ref50","volume-title":"Exchanges which let you create multiple deposit addresses","year":"2020"},{"key":"ref51","volume-title":"Wallet attestations for virtual asset service providers and crypto-assets insurance","author":"Hardjono","year":"2020"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813674"},{"key":"ref53","volume-title":"Proof of reserves"},{"key":"ref54","volume-title":"Proof of reserves"},{"key":"ref55","first-page":"60","year":"2023","journal-title":"Accounting for and auditing of digital assets, practice aid"},{"issue":"27","key":"ref56","volume-title":"Cabinet office order on cryptoasset exchange service providers","year":"2017"},{"key":"ref57","first-page":"46","volume-title":"Guideline for supervision of crypto-asset exchange service providers","year":"2021"},{"key":"ref58","volume-title":"Japan was the safest place to be an ftx customer","author":"Koning","year":"2022"},{"key":"ref59","volume-title":"Mastering Bitcoin","author":"Antonopoulos","year":"2014"},{"key":"ref60","volume-title":"Blockchain size"},{"key":"ref61","volume-title":"Ethereum full node sync (archive) chart"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/ICIC48496.2019.8966739"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3301417.3312495"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445407"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2759766"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2018.08.029"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000025"},{"key":"ref68","volume-title":"Address poisoning scams"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/CNS53000.2021.9705033"},{"key":"ref70","article-title":"Hash visualization: a new technique to improve real-world security","volume-title":"International Workshop on Cryptographic Techniques and E-Commerce","volume":"25","author":"Perrig"},{"key":"ref71","volume-title":"MetaMask scammers take over government websites to target crypto investors","author":"Sarkar","year":"2023"},{"key":"ref72","volume-title":"Bloomberg\u2019s Miller Bitcoin gift stolen","author":"Ro","year":"2013"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30122-3_22"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"ref75","volume-title":"Hierarchical deterministic wallets","author":"Wuille"},{"key":"ref76","volume-title":"Mnemonic code for generating deterministic keys","author":"Palatinus"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/ICSLP.1996.607046"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_36"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461136"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM56090.2022.10000585"},{"key":"ref81","volume-title":"Securing digital currency with bitgo multi-signature and thales hsms - solution brief","year":"2020"},{"key":"ref82","volume-title":"How to sign ethereum eip-1559 transactions using aws kms","author":"Dornseifer","year":"2022"},{"key":"ref83","volume-title":"Tamper, secure transport, and purple ped keys"},{"key":"ref84","year":"2012","journal-title":"Information technology \u2013 Security techniques \u2013 Security requirements for cryptographic modules. International Organization for Standardization"},{"key":"ref85","volume-title":"Cryptographic module validation programs"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32009-5_36"},{"key":"ref87","volume-title":"Public comments received on draft nist sp 800-186: Recommendations for discrete logarithm-based cryptography: Elliptic curve domain parameters","year":"2020"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_24"},{"key":"ref90","volume-title":"Functionality modules"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/3342559.3365335"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_26"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11851-2_5"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM38437.2019.9014007"},{"key":"ref95","volume-title":"Ledger co-founder clarifies \u2018there is no backdoor\u2019 in \u2018Recover\u2019 firmware update","author":"Sarkar","year":"2023"},{"key":"ref96","volume-title":"Breaking Bitcoin hardware wallets","author":"Datko","year":"2017"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69659-1_13"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3273150"},{"key":"ref99","volume-title":"Software attacks on hardware wallets","author":"Volokitin","year":"2018"},{"key":"ref100","volume-title":"Case study: fake hardware cryptowallet","author":"Golovanov","year":"2023"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3031836.3031841"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/COINS51742.2021.9524133"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3456631"},{"key":"ref105","volume-title":"Sok: Sgx. fail: How stuff get exposed","author":"van Schaik","year":"2022"},{"key":"ref106","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood","year":"2014"},{"key":"ref107","volume-title":"Safe contracts"},{"key":"ref108","volume-title":"Why we need wide adoption of social recovery wallets","author":"Buterin","year":"2021"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54455-6_8"},{"key":"ref110","volume-title":"Security analysis methods on ethereum smart contract vulnerabilities: A survey","author":"Praitheeshan","year":"2019"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327567"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/2993600.2993611"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238177"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900656"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65745-1_2"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-27481-7_32"},{"key":"ref117","volume-title":"Accounts"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46885-4_68"},{"key":"ref120","volume-title":"Schnorr signatures for secp256k1","author":"Wuille"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-019-00608-x"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_8"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243859"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243788"},{"key":"ref125","article-title":"Threshold ECDSA in three rounds","author":"Doerner","year":"2023","journal-title":"Cryptology ePrint Archive, Paper 2023\/765"},{"key":"ref126","article-title":"Attacking threshold wallets","author":"Aumasson","year":"2020","journal-title":"Cryptology ePrint Archive, Paper 2020\/1052"},{"key":"ref127","volume-title":"Gg18 \/ gg20 tss beta parameter vulnerability","author":"Makriyannis","year":"2023"},{"key":"ref128","volume-title":"A. M. Antonopoulos","year":"2016"},{"key":"ref129","volume-title":"Segregated witness (consensus layer)","author":"Lombrozo"},{"key":"ref130","volume-title":"Eip-1559: Fee market change for eth 1.0 chain","author":"Buterin"},{"key":"ref131","volume-title":"The merge"},{"key":"ref132","volume-title":"Taproot: Segwit version 1 spending rules","author":"Wuille"},{"key":"ref133","volume-title":"Why you need a physical vault to secure a virtual currency","author":"Simonite","year":"2018"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00004"},{"key":"ref135","volume-title":"Technical specifications for construction and management of sensitive compartmented information facilities, version 1.5","year":"2020"},{"key":"ref136","volume-title":"Operating environment for EXTREME-COLD","author":"Takei"},{"key":"ref137","volume-title":"Root ksk ceremony operating environment"},{"key":"ref138","volume-title":"Other People\u2019s Money: A Study in the Social Psychology of Embezzlement","author":"Cressey","year":"1953"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.1"},{"key":"ref140","article-title":"Security bounds for the nist codebook-based deterministic random bit generator","author":"Campagna","year":"2006","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17656-3_6"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49890-3_25"},{"key":"ref143","volume-title":"PKCS #11 Cryptographic Token Interface Base Specification Version 3.0","author":"Zimman","year":"2020"},{"key":"ref144","volume-title":"Us 9,813,416 b2: Data security system with encryption","author":"Bolotin","year":"2017"},{"key":"ref145","volume-title":"Us 8,533,414 b2: Authentication and securing of write-once, read-many (worm) memory devices","author":"Yu","year":"2013"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0053419"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/IIH-MSP.2014.135"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40253-6_25"},{"key":"ref149","volume-title":"Complete Guide to the Theory and Practice of NFTs (translated)","author":"Takei","year":"2023"},{"key":"ref150","volume-title":"Token adoption grows as real-world assets move on-chain","author":"Jagati","year":"2023"}],"event":{"name":"2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Dublin, Ireland","start":{"date-parts":[[2024,5,27]]},"end":{"date-parts":[[2024,5,31]]}},"container-title":["2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10634319\/10634334\/10634356.pdf?arnumber=10634356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T04:41:57Z","timestamp":1725079317000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10634356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,27]]},"references-count":150,"URL":"https:\/\/doi.org\/10.1109\/icbc59979.2024.10634356","relation":{},"subject":[],"published":{"date-parts":[[2024,5,27]]}}}