Skip to main content

Abstract

There is a number of threats related to cryptoassets processed by exchange services: the threats range from unintentional data leaks, through fraudulent cryptocurrency exchanges and poorly implemented protocols, to broken private keys. In this paper an information system reducing the risks related to cryptoasset loss is proposed. Specific business model as well as technological countermeasures are applied. The novelty of the presented solution is in the transfer of the security risk to the insurer without transferring full control over the cryptoassets by taking advantage of multisignature and timelock technologies. The architecture for cryptoasset insurance system has been described along with a set of corresponding communication protocols, which are followed by a short discussion. The description of the solution is preceded by a risk analysis related to cryptoasset security and countermeasures analysis related to those risks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Sebastopol (2014)

    Google Scholar 

  2. Antonopoulos, A.M., Wood, G.: Mastering Ethereum: Building Smart Contracts and DApps. O’Reilly Media, Sebastopol (2019)

    Google Scholar 

  3. Biggs, J., Nelson, D.: Upbit is the seventh major crypto exchange hack of 2019. In: CoinDesk. https://www.coindesk.com/upbit-is-the-sixth-major-crypto-exchange-hack-of-2019. Accessed 17 Apr 2020

  4. BitInfoCharts Bitcoin, Ethereum Market Capitalization Historical Chart. https://bitinfocharts.com/comparison/marketcap-btc-eth.html. Accessed 31 Jan 2020

  5. Bleumer, G.: Threshold signature. In: Encyclopedia of Cryptography and Security – 2011 Edition, pp. 1294–1296. Springer, Boston (2011)

    Google Scholar 

  6. Brengel, M., Rossow, Ch.: Identifying key leakage of bitcoin users. In: International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 623–643. Springer, Cham (2018)

    Google Scholar 

  7. Coinbase: Crypto Asset Custody for Institutions. https://custody.coinbase.com. Accessed 17 Apr 2020

  8. Gemini: Institutional-grade crypto storage. Industry-leading security. https://gemini.com/custody. Accessed 17 Apr 2020

  9. Gennaro, R., Goldfeder, S, Narayanan, A.: Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. In: International Conference on Applied Cryptography and Network Security, pp. 156–174. Springer, Cham (2016)

    Google Scholar 

  10. Giudici, G., Milne, A., Vinogradov, D.: Cryptocurrencies: market analysis and perspectives. J. Ind. Bus. Econ. 47, 1–18 (2020)

    Google Scholar 

  11. Kaga, Y., et al.: A secure and practical signature scheme for blockchain based on biometrics. In: Liu, J., Samarati, P. (eds.) Information Security Practice and Experience, ISPEC 2017. Lecture Notes in Computer Science, vol. 10701. Springer, Cham (2017)

    Google Scholar 

  12. Kuchar, M.: Which cryptocurrency exchanges went out of business in 2019?. In: CryptoDaily, https://cryptodaily.co.uk/2020/02/crypto-exchanges-went-business. Accessed 17 Apr 2020

  13. Möser, M., Böhme, R., Breuker, D.: Towards risk scoring of Bitcoin transactions. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) Financial Cryptography and Data Security, FC 2014. Lecture Notes in Computer Science, vol. 8438. Springer, Heidelberg (2014)

    Google Scholar 

  14. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf. Accessed 31 Jan 2020

  15. Ahlswede, R.: Elliptic curve cryptosystems. In: Ahlswede, A., Althöfer, I., Deppe, C., Tamm, U. (eds.) Hiding Data – Selected Topics. FSPCN, vol. 12, pp. 225–336. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31515-7_4

    Chapter  Google Scholar 

  16. Palatinus, M., et al.: Mnemonic code for generating deterministic keys. https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki. Accessed 31 Jan 2020

  17. Rauchs, M., Blandin, A., Klein, K., Pieters, G., Recantini, M., Zhang, B.: 2nd Global Cryptoasset Benchmarking Study. University of Cambridge, Cambridge (2018)

    Book  Google Scholar 

  18. Rhodes, D.: Bitcoin Insurance Policies – What They Are and Do You Need Them. https://coincentral.com/bitcoin-insurance-policies/. Accessed 31 Jan 2020

  19. Shoup, V.: Practical threshold signatures. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 207–220. Springer, Berlin (2000)

    Google Scholar 

  20. Stathakopoulous, C., Cachin, C.: Threshold Signatures for Blockchain Systems. IBM Research, Zurich (2017)

    Google Scholar 

  21. Sustek, L.: Hardware security module. In: Encyclopedia of Cryptography and Security – 2011 Edition, pp. 535–538. Springer, Boston (2011)

    Google Scholar 

  22. Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger. https://ethereum.github.io/yellowpaper/paper.pdf. Accessed 31 Jan 2020

  23. Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Daniel Wilusz .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wilusz, D., Wójtowicz, A. (2021). Securing Cryptoasset Insurance Services with Multisignatures. In: Herrero, Á., Cambra, C., Urda, D., Sedano, J., Quintián, H., Corchado, E. (eds) 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). CISIS 2019. Advances in Intelligent Systems and Computing, vol 1267. Springer, Cham. https://doi.org/10.1007/978-3-030-57805-3_4

Download citation

Publish with us

Policies and ethics