Abstract
There is a number of threats related to cryptoassets processed by exchange services: the threats range from unintentional data leaks, through fraudulent cryptocurrency exchanges and poorly implemented protocols, to broken private keys. In this paper an information system reducing the risks related to cryptoasset loss is proposed. Specific business model as well as technological countermeasures are applied. The novelty of the presented solution is in the transfer of the security risk to the insurer without transferring full control over the cryptoassets by taking advantage of multisignature and timelock technologies. The architecture for cryptoasset insurance system has been described along with a set of corresponding communication protocols, which are followed by a short discussion. The description of the solution is preceded by a risk analysis related to cryptoasset security and countermeasures analysis related to those risks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media, Sebastopol (2014)
Antonopoulos, A.M., Wood, G.: Mastering Ethereum: Building Smart Contracts and DApps. O’Reilly Media, Sebastopol (2019)
Biggs, J., Nelson, D.: Upbit is the seventh major crypto exchange hack of 2019. In: CoinDesk. https://www.coindesk.com/upbit-is-the-sixth-major-crypto-exchange-hack-of-2019. Accessed 17 Apr 2020
BitInfoCharts Bitcoin, Ethereum Market Capitalization Historical Chart. https://bitinfocharts.com/comparison/marketcap-btc-eth.html. Accessed 31 Jan 2020
Bleumer, G.: Threshold signature. In: Encyclopedia of Cryptography and Security – 2011 Edition, pp. 1294–1296. Springer, Boston (2011)
Brengel, M., Rossow, Ch.: Identifying key leakage of bitcoin users. In: International Symposium on Research in Attacks, Intrusions, and Defenses, pp. 623–643. Springer, Cham (2018)
Coinbase: Crypto Asset Custody for Institutions. https://custody.coinbase.com. Accessed 17 Apr 2020
Gemini: Institutional-grade crypto storage. Industry-leading security. https://gemini.com/custody. Accessed 17 Apr 2020
Gennaro, R., Goldfeder, S, Narayanan, A.: Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security. In: International Conference on Applied Cryptography and Network Security, pp. 156–174. Springer, Cham (2016)
Giudici, G., Milne, A., Vinogradov, D.: Cryptocurrencies: market analysis and perspectives. J. Ind. Bus. Econ. 47, 1–18 (2020)
Kaga, Y., et al.: A secure and practical signature scheme for blockchain based on biometrics. In: Liu, J., Samarati, P. (eds.) Information Security Practice and Experience, ISPEC 2017. Lecture Notes in Computer Science, vol. 10701. Springer, Cham (2017)
Kuchar, M.: Which cryptocurrency exchanges went out of business in 2019?. In: CryptoDaily, https://cryptodaily.co.uk/2020/02/crypto-exchanges-went-business. Accessed 17 Apr 2020
Möser, M., Böhme, R., Breuker, D.: Towards risk scoring of Bitcoin transactions. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) Financial Cryptography and Data Security, FC 2014. Lecture Notes in Computer Science, vol. 8438. Springer, Heidelberg (2014)
Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf. Accessed 31 Jan 2020
Ahlswede, R.: Elliptic curve cryptosystems. In: Ahlswede, A., Althöfer, I., Deppe, C., Tamm, U. (eds.) Hiding Data – Selected Topics. FSPCN, vol. 12, pp. 225–336. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31515-7_4
Palatinus, M., et al.: Mnemonic code for generating deterministic keys. https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki. Accessed 31 Jan 2020
Rauchs, M., Blandin, A., Klein, K., Pieters, G., Recantini, M., Zhang, B.: 2nd Global Cryptoasset Benchmarking Study. University of Cambridge, Cambridge (2018)
Rhodes, D.: Bitcoin Insurance Policies – What They Are and Do You Need Them. https://coincentral.com/bitcoin-insurance-policies/. Accessed 31 Jan 2020
Shoup, V.: Practical threshold signatures. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 207–220. Springer, Berlin (2000)
Stathakopoulous, C., Cachin, C.: Threshold Signatures for Blockchain Systems. IBM Research, Zurich (2017)
Sustek, L.: Hardware security module. In: Encyclopedia of Cryptography and Security – 2011 Edition, pp. 535–538. Springer, Boston (2011)
Wood, G.: Ethereum: A Secure Decentralised Generalised Transaction Ledger. https://ethereum.github.io/yellowpaper/paper.pdf. Accessed 31 Jan 2020
Wójtowicz, A., Joachimiak, K.: Model for adaptable context-based biometric authentication for mobile devices. Pers. Ubiquit. Comput. 20(2), 195–207 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Wilusz, D., Wójtowicz, A. (2021). Securing Cryptoasset Insurance Services with Multisignatures. In: Herrero, Á., Cambra, C., Urda, D., Sedano, J., Quintián, H., Corchado, E. (eds) 13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020). CISIS 2019. Advances in Intelligent Systems and Computing, vol 1267. Springer, Cham. https://doi.org/10.1007/978-3-030-57805-3_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-57805-3_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-57804-6
Online ISBN: 978-3-030-57805-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)