{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:13:02Z","timestamp":1774368782423,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T00:00:00Z","timestamp":1751068800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172411"],"award-info":[{"award-number":["62172411"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2336205"],"award-info":[{"award-number":["U2336205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100009592","name":"Beijing Municipal Science and Technology Commission, Adminitrative Commission of Zhongguancun Science Park","doi-asserted-by":"publisher","award":["Z231100005923047"],"award-info":[{"award-number":["Z231100005923047"]}],"id":[{"id":"10.13039\/501100009592","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cybersecurity"],"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>The breaches of the blockchain wallet keys greatly harm the security of blockchain transactions. To protect the secret keys, the known solutions, such as hierarchical deterministic wallets proposed in BIP32 or stealth addresses adopted in Monero, have been extensively researched. However, most of the existing works assume the key is safe, in the sense that it cannot be stolen or damaged, which is <jats:italic>not<\/jats:italic> true in practice. Moreover, current key revocation mechanisms either rely on centralized authorities, compromising decentralization, or require economic incentives to ensure nodes remain consistantly online. In this paper, we introduce Cocoon, the first blockchain wallet scheme that supports stealth addresses and provides a wallet revocation mechanism without the need for certificates. Cocoon not only ensures the privacy of wallet secret keys but also can individually revoke compromised keys with high performance. Our contributions are three-fold: First, we present the formal model and the related security definitions. Next, we give a generic construction based on the hierarchical identity-based signature, identity-based key encapsulation mechanism and non-interactive zero-knowledge proof. We then extend the scheme to the hierarchical setting for diverse scenarios. Finally, we give the implementation, and the results show that the scheme is practical.<\/jats:p>","DOI":"10.1186\/s42400-025-00380-7","type":"journal-article","created":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T03:02:12Z","timestamp":1751079732000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cocoon: certificateless blockchain wallet supporting both stealth address and revocation"],"prefix":"10.1186","volume":"8","author":[{"given":"Birou","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4221-1311","authenticated-orcid":false,"given":"Rui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Tao","sequence":"additional","affiliation":[]},{"given":"Shihan","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,28]]},"reference":[{"issue":"10","key":"380_CR1","doi-asserted-by":"publisher","first-page":"10796","DOI":"10.1007\/s11227-022-04906-5","volume":"79","author":"MM AbdulKader","year":"2023","unstructured":"AbdulKader MM, Kumar SG (2023) A privacy-preserving data transfer in a blockchain-based commercial real estate platform using random address generation mechanism. J Supercomput 79(10):10796\u201310822","journal-title":"J Supercomput"},{"key":"380_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102209","volume":"104","author":"YCE Adja","year":"2021","unstructured":"Adja YCE, Hammi B, Serhrouchni A, Zeadally S (2021) A blockchain-based certificate revocation management and status verification system. Computers & Security 104:102209","journal-title":"Computers & Security"},{"key":"380_CR3","first-page":"1017","volume-title":"CCS\u201920","author":"N Alkeilani Alkadri","year":"2020","unstructured":"Alkeilani Alkadri N, Das P, Erwig A, Faust S, Kr\u00e4mer J, Riahi S, Struck P (2020) Deterministic wallets in a quantum world. CCS\u201920. Virtual Event, USA, pp 1017\u20131031"},{"key":"380_CR4","first-page":"405","volume-title":"AISACRYPT\u201918","author":"M Backes","year":"2018","unstructured":"Backes M, Hanzlik L, Kluczniak K, Schneider J (2018) Signatures with flexible public key: introducing equivalence classes for public keys. AISACRYPT\u201918. Springer, Brisbane, Queensland, Australia, pp 405\u2013434"},{"key":"380_CR5","first-page":"213","volume-title":"CRYPTO\u201901","author":"D Boneh","year":"2001","unstructured":"Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. CRYPTO\u201901. Springer, Santa Barbara, CA, USA, pp 213\u2013229"},{"key":"380_CR40","unstructured":"bytecoin (2011) Untraceable transactions which can contain a secure message are inevitable. https:\/\/bitcointalk.org\/index.php?topic=5965.0"},{"key":"380_CR6","doi-asserted-by":"crossref","unstructured":"Chuang C, Hsu I, Lee T (2023) A two-party hierarchical deterministic wallets in practice. Cryptology ePrint Archive","DOI":"10.5220\/0012138700003555"},{"key":"380_CR7","doi-asserted-by":"crossref","unstructured":"Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. Technical report","DOI":"10.17487\/rfc5280"},{"key":"380_CR8","doi-asserted-by":"crossref","unstructured":"Courtois NT, Mercer R (2017) Stealth address and key management techniques in blockchain systems. In: ICISSP\u201917, pp. 559\u2013566","DOI":"10.5220\/0006270005590566"},{"key":"380_CR9","first-page":"1020","volume-title":"CCS\u201921","author":"P Das","year":"2021","unstructured":"Das P, Erwig A, Faust S, Loss J, Riahi S (2021) The exact security of BIP32 wallets. CCS\u201921. Republic of Korea, Virtual Event, pp 1020\u20131042"},{"key":"380_CR10","doi-asserted-by":"crossref","unstructured":"Das P, Faust S, Loss J (2019) A formal treatment of deterministic wallets. In: CCS\u201919, London, UK, pp. 651\u2013668","DOI":"10.1145\/3319535.3354236"},{"key":"380_CR11","unstructured":"Das P, Erwig A, Faust S, Loss J, Riahi S (2023) BIP32-Compatible Threshold Wallets. Cryptology ePrint Archive"},{"key":"380_CR29","first-page":"323","volume-title":"CANS\u201920","author":"A Di Luzio","year":"2020","unstructured":"Di Luzio A, Francati D, Ateniese G (2020) Arcula: a secure hierarchical deterministic wallet for multi-asset blockchains. CANS\u201920. Springer, Vienna, Austria, pp 323\u2013343"},{"key":"380_CR12","first-page":"520","volume-title":"AsiaCCS\u201917","author":"A Dmitrienko","year":"2017","unstructured":"Dmitrienko A, Noack D, Yung M (2017) Secure wallet-assisted offline bitcoin payments with double-spender revocation. AsiaCCS\u201917. Abu Dhabi, United Arab Emirates, pp 520\u2013531"},{"key":"380_CR13","first-page":"148","volume-title":"CT-RSA\u201910","author":"L Ducas","year":"2010","unstructured":"Ducas L (2010) Anonymity from asymmetry: New constructions for anonymous HIBE. CT-RSA\u201910. Springer, San Jose, CA, USA, pp 148\u2013164"},{"key":"380_CR14","first-page":"2722","volume-title":"CCS\u201921","author":"J Duman","year":"2021","unstructured":"Duman J, H\u00f6velmanns K, Kiltz E, Lyubashevsky V, Seiler G (2021) Faster lattice-based KEMs via a generic Fujisaki-Okamoto transform using prefix hashing. CCS\u201921. Republic of Korea, Virtual Event, pp 2722\u20132737"},{"key":"380_CR15","first-page":"487","volume-title":"ESORICS\u201922","author":"A Erwig","year":"2022","unstructured":"Erwig A, Riahi S (2022) Deterministic wallets for adaptor signatures. ESORICS\u201922. Springer, Copenhagen, Denmark, pp 487\u2013506"},{"key":"380_CR16","first-page":"127","volume-title":"ICBC\u201918","author":"X Fan","year":"2018","unstructured":"Fan X (2018) Faster dual-key stealth address for blockchain-based internet of things systems. ICBC\u201918. Springer, Seattle, WA, USA, pp 127\u2013138"},{"key":"380_CR17","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/s10207-019-00476-5","volume":"19","author":"C-I Fan","year":"2020","unstructured":"Fan C-I, Tseng Y-F, Su H-P, Hsu R-H, Kikuchi H (2020) Secure hierarchical bitcoin wallet scheme against privilege escalation attacks. Int J Inf Secur 19:245\u2013255","journal-title":"Int J Inf Secur"},{"key":"380_CR18","doi-asserted-by":"crossref","unstructured":"Fan J, Wang Z, Luo Y, Bai J, Li Y, Hao Y (2019) A new stealth address scheme for blockchain. In: TURC\u201919, pp. 1\u20137","DOI":"10.1145\/3321408.3321573"},{"key":"380_CR19","first-page":"151","volume-title":"ICCC\u201920","author":"C Feng","year":"2020","unstructured":"Feng C, Tan L, Xiao H, Yu K, Qi X, Wen Z, Jiang Y (2020) PDKSAP: Perfected double-key stealth address protocol without temporary key leakage in blockchain. ICCC\u201920. IEEE, Virtual Event, pp 151\u2013155"},{"key":"380_CR20","first-page":"315","volume-title":"ISC\u201920","author":"A Garba","year":"2020","unstructured":"Garba A, Bochem A, Leiding B (2020) BlockVoke-fast, blockchain-based certificate revocation for PKIs and the Web of Trust. ISC\u201920. Springer, pp 315\u2013333"},{"key":"380_CR21","unstructured":"Goldfeder, S, Gennaro R, Kalodner H, Bonneau J, Kroll JA, Felten EW, Narayanan A (2015) Securing Bitcoin wallets via a new DSA\/ECDSA threshold signature scheme"},{"key":"380_CR22","first-page":"497","volume-title":"FC\u201915","author":"G Gutoski","year":"2015","unstructured":"Gutoski G, Stebila D (2015) Hierarchical deterministic bitcoin wallets that tolerate key leakage. FC\u201915. Springer, San Juan, Puerto Rico, pp 497\u2013504"},{"key":"380_CR23","doi-asserted-by":"crossref","unstructured":"Hanzlik L, Loss J, Wagner B (2023) Token meets wallet: formalizing privacy and revocation for FIDO2. In: SP\u20192023, pp. 1491\u20131508 . IEEE","DOI":"10.1109\/SP46215.2023.10179373"},{"key":"380_CR24","doi-asserted-by":"crossref","unstructured":"Hu M (2023) Post-Quantum Secure Deterministic Wallet: Stateless, Hot\/Cold Setting, and More Secure. Cryptology ePrint Archive","DOI":"10.1186\/s42400-024-00216-w"},{"key":"380_CR25","first-page":"357","volume-title":"ESORICS\u201920","author":"W Liu","year":"2020","unstructured":"Liu W, Liu Z, Nguyen K, Yang G, Yu Y (2020) A lattice-based key-insulated and privacy-preserving signature scheme with publicly derived public key. ESORICS\u201920. Springer, Guildford, UK, pp 357\u2013377"},{"key":"380_CR26","first-page":"726","volume-title":"ESORICS\u201919","author":"Z Liu","year":"2019","unstructured":"Liu Z, Nguyen K, Yang G, Wang H, Wong DS (2019) A lattice-based linkable ring signature supporting stealth addresses. ESORICS\u201919. Springer, Luxembourg, pp 726\u2013746"},{"key":"380_CR27","first-page":"215","volume-title":"EuroS &P\u201919","author":"Z Liu","year":"2019","unstructured":"Liu Z, Yang G, Wong DS, Nguyen K, Wang H (2019) Key-insulated and privacy-preserving signature scheme with publicly derived public key. EuroS &P\u201919. IEEE, London, UK, pp 215\u2013230"},{"issue":"5","key":"380_CR28","doi-asserted-by":"publisher","first-page":"2934","DOI":"10.1109\/TDSC.2021.3078463","volume":"19","author":"Z Liu","year":"2021","unstructured":"Liu Z, Yang G, Wong DS, Nguyen K, Wang H, Ke X, Liu Y (2021) Secure deterministic wallet and stealth address: Key-insulated and privacy-preserving signature scheme with publicly derived public key. IEEE Trans Dependable Secure Comput 19(5):2934\u20132951","journal-title":"IEEE Trans Dependable Secure Comput"},{"key":"380_CR30","unstructured":"Mitsunari S (2024) MCL: a portable and fast pairing-based cryptography library. https:\/\/github.com\/herumi\/mcl"},{"key":"380_CR31","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"380_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5195\/ledger.2016.34","volume":"1","author":"S Noether","year":"2016","unstructured":"Noether S, Mackenzie A (2016) Monero Research Lab: Ring Confidential Transactions. Ledger 1:1\u201318","journal-title":"Ledger"},{"key":"380_CR33","unstructured":"Shoup V (2004) Sequences of games: a tool for taming complexity in security proofs. Cryptology ePrint Archive"},{"key":"380_CR34","unstructured":"Todd P (2014) [bitcoin-development] Stealth Addresses. In post of 04:06:05 -0800 Mon 06 Jan, http:\/\/www.mail-archive.com\/bitcoindevelopment@lists.sourceforge.net\/msg03613.html"},{"key":"380_CR35","unstructured":"Van Saberhagen N (2013) CryptoNote v 2.0. https:\/\/www.getmonero.org\/ru\/resources\/research-lab\/pubs\/whitepaper_annotated.pdf"},{"key":"380_CR36","unstructured":"Wood G (2014) Ethereum: a secure decentralised generalised transaction ledger. https:\/\/itsca-brokers.net\/wp-content\/uploads\/2022\/08\/Ethereum-Whitepaper.pdf"},{"key":"380_CR37","unstructured":"Wuille P (2012) Bip32: Hierarchical deterministic wallets. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0032.mediawiki"},{"key":"380_CR38","first-page":"89","volume-title":"ESORICS\u201922","author":"X Yin","year":"2022","unstructured":"Yin X, Liu Z, Yang G, Chen G, Zhu H (2022) Secure hierarchical deterministic wallet supporting stealth address. ESORICS\u201922. Springer, Copenhagen, Denmark, pp 89\u2013109"},{"key":"380_CR39","unstructured":"Yuen TH, Wei VK (2005) Constant-size hierarchical identity-based signature\/signcryption without random oracles. Cryptology ePrint archive"}],"container-title":["Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00380-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1186\/s42400-025-00380-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/s42400-025-00380-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,28]],"date-time":"2025-06-28T03:02:18Z","timestamp":1751079738000},"score":1,"resource":{"primary":{"URL":"https:\/\/cybersecurity.springeropen.com\/articles\/10.1186\/s42400-025-00380-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,28]]},"references-count":40,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["380"],"URL":"https:\/\/doi.org\/10.1186\/s42400-025-00380-7","relation":{},"ISSN":["2523-3246"],"issn-type":[{"value":"2523-3246","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,28]]},"assertion":[{"value":"3 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declaration"}},{"value":"The authors declare that they have no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"100"}}