{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T03:59:51Z","timestamp":1778903991395,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["CRYPTOLAYER-101044770"],"award-info":[{"award-number":["CRYPTOLAYER-101044770"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["DFG- SFB 1119- 236615297"],"award-info":[{"award-number":["DFG- SFB 1119- 236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German Federal Ministry of Education and Research and the Hessen State Ministry for Higher Education, Research and the Arts","award":["National Research Center for Applied Cybersecurity ATHENE"],"award-info":[{"award-number":["National Research Center for Applied Cybersecurity ATHENE"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,8,25]]},"DOI":"10.1145\/3708821.3710830","type":"proceedings-article","created":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T06:30:56Z","timestamp":1755066656000},"page":"856-872","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["BIP32-Compatible Threshold Wallets"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7404-8504","authenticated-orcid":false,"given":"Poulami","family":"Das","sequence":"first","affiliation":[{"name":"Least Authority\u00a0, Berlin, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8586-688X","authenticated-orcid":false,"given":"Andreas","family":"Erwig","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8625-4639","authenticated-orcid":false,"given":"Sebastian","family":"Faust","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-2559-7134","authenticated-orcid":false,"given":"Philipp-Florens","family":"Lehwalder","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7979-3810","authenticated-orcid":false,"given":"Julian","family":"Loss","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8224-4177","authenticated-orcid":false,"given":"Ziyan","family":"Qu","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4331-0469","authenticated-orcid":false,"given":"Siavash","family":"Riahi","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,8,24]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"2013. Version bytes for BIP32 extended public and private keys. https:\/\/electrum.readthedocs.io\/en\/latest\/xpub_version_bytes.html."},{"key":"e_1_3_3_2_3_2","unstructured":"2014. Ledger Support Ledger Nano OS. https:\/\/support.ledger.com\/hc\/en-us\/articles\/115005297709-Export-your-accounts."},{"key":"e_1_3_3_2_4_2","unstructured":"2014. Trezor Wiki Cryptocurrency standards Hierachical deterministic wallets. https:\/\/wiki.trezor.io\/Cryptocurrency_standards."},{"key":"e_1_3_3_2_5_2","unstructured":"2020. \u2019Bristol Fashion\u2019 MPC Circuits. (2020). https:\/\/nigelsmart.github.io\/MPC-Circuits\/"},{"key":"e_1_3_3_2_6_2","unstructured":"Anasuya Acharya Carmit Hazay Vladimir Kolesnikov and Manoj Prabhakaran. 2024. Malicious Security for SCALES: Outsourced Computation with Ephemeral Servers. Cryptology ePrint Archive Paper 2024\/383. https:\/\/eprint.iacr.org\/2024\/383"},{"key":"e_1_3_3_2_7_2","doi-asserted-by":"publisher","unstructured":"Nabil Alkeilani Alkadri Poulami Das Andreas Erwig Sebastian Faust Juliane Kr\u00e4mer Siavash Riahi and Patrick Struck. 2020. Deterministic Wallets in a Quantum World. 10.1145\/3372297.3423361","DOI":"10.1145\/3372297.3423361"},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","unstructured":"Myrto Arapinis Andriana Gkaniatsou Dimitris Karakostas and Aggelos Kiayias. 2019. A Formal Treatment of Hardware Wallets. 10.1007\/978-3-030-32101-7_26","DOI":"10.1007\/978-3-030-32101-7_26"},{"key":"e_1_3_3_2_9_2","unstructured":"Jean-Philippe Aumasson Adrian Hamelink and Omer Shlomovits. 2020. A Survey of ECDSA Threshold Signing. Cryptology ePrint Archive Paper 2020\/1390. https:\/\/eprint.iacr.org\/2020\/1390"},{"key":"e_1_3_3_2_10_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-28166-7_2"},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","unstructured":"Donald Beaver Silvio Micali and Phillip Rogaway. 1990. The Round Complexity of Secure Protocols (Extended Abstract). 503\u2013513. 10.1145\/100216.100287","DOI":"10.1145\/100216.100287"},{"key":"e_1_3_3_2_12_2","unstructured":"BitcoinExchangeGuide. 2018. CipherTrace Releases Report Exposing Close to $1 Billion Stolen in Crypto Hacks During 2018. https:\/\/coinexchangeguide.com\/ciphertrace-releases-report-exposing-close-to-1-billion-stolen-in_-crypto-hacks-during-2018\/."},{"key":"e_1_3_3_2_13_2","unstructured":"Constantin Blokh Nikolaos Makriyannis and Udi Peled. 2022. Efficient Asymmetric Threshold ECDSA for MPC-based Cold Storage. Cryptology ePrint Archive Paper 2022\/1296. https:\/\/eprint.iacr.org\/2022\/1296 https:\/\/eprint.iacr.org\/2022\/1296."},{"key":"e_1_3_3_2_14_2","unstructured":"Bloomberg. 2018. How to Steal $500 Million in Cryptocurrency. http:\/\/fortune.com\/2018\/01\/31\/coincheck-hack-how\/."},{"key":"e_1_3_3_2_15_2","doi-asserted-by":"publisher","unstructured":"Charlotte Bonte Nigel Smart and Titouan Tanguy. 2021. Thresholdizing HashEdDSA: MPC to the Rescue. International Journal of Information Security 20 (12 2021). 10.1007\/s10207-021-00539-6","DOI":"10.1007\/s10207-021-00539-6"},{"key":"e_1_3_3_2_16_2","unstructured":"Lennart Braun Daniel Demmler Thomas Schneider and Oleksandr Tkachenko. 2020. MOTION - A Framework for Mixed-Protocol Multi-Party Computation. Cryptology ePrint Archive Report 2020\/1137. https:\/\/eprint.iacr.org\/2020\/1137."},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423367"},{"key":"e_1_3_3_2_18_2","doi-asserted-by":"publisher","unstructured":"Guilhem Castagnos Dario Catalano Fabien Laguillaumie Federico Savasta and Ida Tucker. 2020. Bandwidth-Efficient Threshold EC-DSA. 266\u2013296. 10.1007\/978-3-030-45388-6_10","DOI":"10.1007\/978-3-030-45388-6_10"},{"key":"e_1_3_3_2_19_2","unstructured":"Guilhem Castagnos Dario Catalano Fabien Laguillaumie Federico Savasta and Ida Tucker. 2021. Bandwidth-efficient threshold EC-DSA revisited: Online\/Offline Extensions Identifiable Aborts Proactivity and Adaptive Security. Cryptology ePrint Archive Paper 2021\/291. https:\/\/eprint.iacr.org\/2021\/291 https:\/\/eprint.iacr.org\/2021\/291."},{"key":"e_1_3_3_2_20_2","doi-asserted-by":"publisher","unstructured":"David Chaum Claude Cr\u00e9peau and Ivan Damg\u00e5rd. 1988. Multiparty Unconditionally Secure Protocols (Extended Abstract). 11\u201319. 10.1145\/62212.62214","DOI":"10.1145\/62212.62214"},{"key":"e_1_3_3_2_21_2","doi-asserted-by":"publisher","unstructured":"David Chaum and Torben\u00a0P. Pedersen. 1993. Wallet Databases with Observers. 89\u2013105. 10.1007\/3-540-48071-4_7","DOI":"10.1007\/3-540-48071-4_7"},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.5220\/0012138700003555"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"publisher","unstructured":"Poulami Das Andreas Erwig Sebastian Faust Philipp-Florens Lehwalder Julian Loss Ziyan Qu and Siavash Riahi. 2023. BIP32-Compatible Threshold Wallets. Cryptology ePrint Archive Paper 2023\/312. 10.1145\/3708821.3710830","DOI":"10.1145\/3708821.3710830"},{"key":"e_1_3_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484807"},{"key":"e_1_3_3_2_25_2","doi-asserted-by":"publisher","unstructured":"Poulami Das Sebastian Faust and Julian Loss. 2019. A Formal Treatment of Deterministic Wallets. 651\u2013668. 10.1145\/3319535.3354236","DOI":"10.1145\/3319535.3354236"},{"key":"e_1_3_3_2_26_2","doi-asserted-by":"publisher","unstructured":"Yi Deng Shunli Ma Xinxuan Zhang Hailong Wang Xuyang Song and Xiang Xie. 2021. Promise \u03a3 -protocol: How to Construct Efficient Threshold ECDSA from Encryptions Based on Class Groups. Springer-Verlag. 10.1007\/978-3-030-92068-5_19","DOI":"10.1007\/978-3-030-92068-5_19"},{"key":"e_1_3_3_2_27_2","doi-asserted-by":"publisher","unstructured":"Yvo Desmedt and Yair Frankel. 1990. Threshold Cryptosystems. 307\u2013315. 10.1007\/0-387-34805-0_28","DOI":"10.1007\/0-387-34805-0_28"},{"key":"e_1_3_3_2_28_2","doi-asserted-by":"publisher","unstructured":"Yevgeniy Dodis. 2003. Efficient Construction of (Distributed) Verifiable Random Functions. 1\u201317. 10.1007\/3-540-36288-6_1","DOI":"10.1007\/3-540-36288-6_1"},{"key":"e_1_3_3_2_29_2","volume-title":"Computer Security \u2013 ESORICS 2022","author":"Erwig Andreas","unstructured":"Andreas Erwig and Siavash Riahi. [n. d.]. Deterministic Wallets for\u00a0Adaptor Signatures. In Computer Security \u2013 ESORICS 2022."},{"key":"e_1_3_3_2_30_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560633"},{"key":"e_1_3_3_2_31_2","doi-asserted-by":"publisher","unstructured":"Manuel Fersch Eike Kiltz and Bertram Poettering. 2017. On the One-Per-Message Unforgeability of (EC)DSA and Its Variants. 519\u2013534. 10.1007\/978-3-319-70503-3_17","DOI":"10.1007\/978-3-319-70503-3_17"},{"key":"e_1_3_3_2_32_2","doi-asserted-by":"publisher","unstructured":"Nils Fleischhacker Johannes Krupp Giulio Malavolta Jonas Schneider Dominique Schr\u00f6der and Mark Simkin. 2016. Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys. 301\u2013330. 10.1007\/978-3-662-49384-7_12","DOI":"10.1007\/978-3-662-49384-7_12"},{"key":"e_1_3_3_2_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP51992.2021.00017"},{"key":"e_1_3_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243859"},{"key":"e_1_3_3_2_35_2","doi-asserted-by":"publisher","unstructured":"Oded Goldreich Silvio Micali and Avi Wigderson. 1987. How to Play any Mental Game or A Completeness Theorem for Protocols with Honest Majority. 218\u2013229. 10.1145\/28395.28420","DOI":"10.1145\/28395.28420"},{"key":"e_1_3_3_2_36_2","unstructured":"Vipul Goyal and Yifan Song. 2020. Malicious Security Comes Free in Honest-Majority MPC. Cryptology ePrint Archive Paper 2020\/134. https:\/\/eprint.iacr.org\/2020\/134"},{"key":"e_1_3_3_2_37_2","unstructured":"Jens Groth and Victor Shoup. 2022. Design and analysis of a distributed ECDSA signing service. Cryptology ePrint Archive Paper 2022\/506. https:\/\/eprint.iacr.org\/2022\/506 https:\/\/eprint.iacr.org\/2022\/506."},{"key":"e_1_3_3_2_38_2","doi-asserted-by":"publisher","unstructured":"Gus Gutoski and Douglas Stebila. 2015. Hierarchical Deterministic Bitcoin Wallets that Tolerate Key Leakage. 497\u2013504. 10.1007\/978-3-662-47854-7_31","DOI":"10.1007\/978-3-662-47854-7_31"},{"key":"e_1_3_3_2_39_2","doi-asserted-by":"crossref","unstructured":"Shai Halevi Carmit Hazay Antigoni Polychroniadou and Muthuramakrishnan Venkitasubramaniam. 2021. Round-optimal secure multi-party computation. Journal of Cryptology 34 3 (2021) 19.","DOI":"10.1007\/s00145-021-09382-3"},{"key":"e_1_3_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417872"},{"key":"e_1_3_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00067"},{"key":"e_1_3_3_2_42_2","doi-asserted-by":"publisher","unstructured":"Yehuda Lindell and Ariel Nof. 2018. Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody(CCS \u201918). 10.1145\/3243734.3243788","DOI":"10.1145\/3243734.3243788"},{"key":"e_1_3_3_2_43_2","doi-asserted-by":"publisher","unstructured":"Adriano\u00a0Di Luzio Danilo Francati and Giuseppe Ateniese. 2020. Arcula: A Secure Hierarchical Deterministic Wallet for Multi-asset Blockchains. 323\u2013343. 10.1007\/978-3-030-65411-5_16","DOI":"10.1007\/978-3-030-65411-5_16"},{"key":"e_1_3_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"key":"e_1_3_3_2_45_2","doi-asserted-by":"publisher","unstructured":"Antonio Marcedone Rafael Pass and abhi shelat. 2019. Minimizing Trust in Hardware Wallets with Two Factor Signatures. 10.1007\/978-3-030-32101-7_25","DOI":"10.1007\/978-3-030-32101-7_25"},{"key":"e_1_3_3_2_46_2","doi-asserted-by":"publisher","unstructured":"Pascal Paillier. 1999. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. 223\u2013238. 10.1007\/3-540-48910-X_16","DOI":"10.1007\/3-540-48910-X_16"},{"key":"e_1_3_3_2_47_2","doi-asserted-by":"publisher","unstructured":"David Schultz Barbara Liskov and Moses Liskov. [n. d.]. MPSS: Mobile Proactive Secret Sharing. ACM Trans. Inf. Syst. Secur. 13 4 Article 34 ([n. d.]) 32\u00a0pages. 10.1145\/1880022.1880028","DOI":"10.1145\/1880022.1880028"},{"key":"e_1_3_3_2_48_2","unstructured":"Rhys Skellern. 2018. Cryptocurrency Hacks: More Than $2b USD lost between 2011-2018. https:\/\/medium.com\/ecomi\/cryptocurrency-hacks-more-than-2b-usd-lost-between-2011-2018_-67054b342219."},{"key":"e_1_3_3_2_49_2","unstructured":"Bitcoin Wiki. 2018. BIP32 proposal. https:\/\/en.bitcoin.it\/wiki\/BIP_0032."},{"key":"e_1_3_3_2_50_2","unstructured":"Yehuda Lindell. 2023. Cryptography and MPC in Coinbase Wallet as a Service (WaaS). https:\/\/coinbase.bynder.com\/m\/687ea39fd77aa80e\/original\/CB-MPC-Whitepaper.pdf."},{"key":"e_1_3_3_2_51_2","doi-asserted-by":"crossref","unstructured":"Xin Yin Zhen Liu Guomin Yang Guoxing Chen and Haojin Zhu. 2022. Secure Hierarchical Deterministic Wallet Supporting Stealth Address. Cryptology ePrint Archive Paper 2022\/627.","DOI":"10.1007\/978-3-031-17140-6_5"}],"event":{"name":"ASIA CCS '25: 20th ACM Asia Conference on Computer and Communications Security","location":"Hanoi Vietnam","acronym":"ASIA CCS '25","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 20th ACM Asia Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3708821.3710830","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,13]],"date-time":"2025-08-13T07:28:57Z","timestamp":1755070137000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3708821.3710830"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,24]]},"references-count":50,"alternative-id":["10.1145\/3708821.3710830","10.1145\/3708821"],"URL":"https:\/\/doi.org\/10.1145\/3708821.3710830","relation":{},"subject":[],"published":{"date-parts":[[2025,8,24]]},"assertion":[{"value":"2025-08-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}