Publications-Theses
Article View/Open
Publication Export
-
題名 以硬體錢包實作以太坊相容區塊鏈之交易
Compose Transactions for Ethereum-Compatible Blockchains Using Hardware Wallets作者 簡佑臻
Chien, Yu-Jen貢獻者 陳恭
Chen, Kung
簡佑臻
Chien, Yu-Jen關鍵詞 區塊鏈
硬體錢包
冷錢包
以太坊兼容鏈
Ethereum-compatible blockchains
Hardware wallets
Cold wallets日期 2022 上傳時間 1-Aug-2022 17:23:40 (UTC+8) 摘要 近年來加密貨幣交易興起,各大知名的加密貨幣交易所,如Binance、FTX與Coinbase等,都透過提供簡易操作的加密貨幣錢包與多樣化服務,吸引加密貨幣持有者的使用,但這些便利性是透過交易所代管客戶加密貨幣的私鑰而達到的;一旦交易所遭到駭客入侵,取得其代管的客戶私鑰,將為客戶帶來重大的損失。為了防範此種問題,越來越多使用者開始採用熱錢包 (Hot wallet) 與冷錢包 (Cold wallet) ,其中以冷錢包提供的服務更具有安全保障。冷錢包,又稱硬體錢包,其功能是將加密貨幣帳戶的私鑰透過離線的硬體環境產生與儲存,降低其遭到駭客盜取私鑰的風險。因此,針對不同鏈的不同幣種,硬體錢包需要支援該幣種的交易格式、雜湊函數與數位簽章演算法,否則無法產出該筆交易之簽章。為加速硬體錢包支援新幣種的速度,本研究認為可以透過實作出以太坊兼容鏈的交易,提高實作效率。首先,本研究藉由庫幣科技提供之硬體錢包實作出以太坊兼容鏈的Avalanche C-Chain交易。其次,透過抽離出其與以太坊交易之相異處後,發展以太坊兼容鏈架構,據以實作出Aurora與Klaytn之交易,並比較新舊方法之流程上差異。在以太坊相容架構下,未來只需要兩個步驟就能使硬體錢包支援新鏈之交易,相較於目前的方法,可大幅縮短實作上的流程。
The cryptocurrency trading has gone viral in recent years. Major well-known cryptocurrency exchanges, such as Binance, FTX and Coinbase, have attracted cryptocurrency holders by providing easy-to-use cryptocurrency wallets and diversified services. However, such convenient services are achieved by hosting the private key of the client’s cryptocurrency wallet. Once the exchange is hacked and breached, the hackers obtain the customers’ private keys, bringing heavy losses to the customers. In order to prevent such problems, more and more users have begun to embrace hot wallets and cold wallets, among which the latter are considered to be more secure.A cold wallet, also known as a hardware wallet, is a device for offline storage of private keys. It generates and stores the private keys of cryptocurrency wallets through an offline hardware environment, reducing the risk of hackers stealing the private keys. Therefore, for different currencies of different blockchains, the hardware wallet needs to support the transaction format of the currency, such as the hash function and digital signature algorithm used, otherwise the signature of the transaction cannot be generated. In order to accelerate the speed of hardware wallets supporting new currencies, this study believes that the efficiency of implementation can be improved by implementing transactions on the Ethereum-compatible chains. First of all, this study uses the hardware wallet provided by CoolBitX to implement the transactions of Avalanche C-Chain, an Ethereum-compatible chain. After extracting the differences between Avalanche C-Chain and Ethereum transactions, we develop the Ethereum compatible chain structure, according to which the transactions on Aurora and Klaytn are implemented, and the process difference between the old and new method is compared. Under the Ethereum-compatible architecture, only two steps are needed in the future to enable the hardware wallet to support transactions on the new chain. Compared with the current method, the implementation process is greatly shortened.參考文獻 Aung, Y. N., & Tantidham, T. (2017). Review of Ethereum: Smart home case study. 2017 2nd International Conference on Information Technology (INCIT),Ava Labs. (2021). Avalanche Blockchain Consensus. Retrieved April 6, 2022 from https://docs.avax.network/learn/platform-overview/avalanche-consensus/#dags-directed-acyclic-graphsBamert, T., Decker, C., Wattenhofer, R., & Welten, S. (2014). Bluewallet: The secure bitcoin wallet. International Workshop on Security and Trust Management,Barber, S., Boyen, X., Shi, E., & Uzun, E. (2012). Bitter to Better — How to Make Bitcoin a Better Currency. In A. D. Keromytis, Financial Cryptography and Data Security Berlin, Heidelberg.Bartoletti, M., & Pompianu, L. (2017). An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns. In M. Brenner, K. Rohloff, J. Bonneau, A. Miller, P. Y. A. Ryan, V. Teague, A. Bracciali, M. Sala, F. Pintore, & M. Jakobsson, Financial Cryptography and Data Security Cham.Bogner, A., Chanson, M., & Meeuw, A. (2016). A decentralised sharing app running a smart contract on the ethereum blockchain. Proceedings of the 6th International Conference on the Internet of Things,Buterin, V. (2014). A next-generation smart contract and decentralized application platform. white paper, 3(37).Buterin, V. (2016). EIP-155: Simple replay attack protection. Ethereum Improvement Proposals, no. 155. Retrieved May 2, 2022 from https://eips.ethereum.org/EIPS/eip-155Chainlist.org. (n.d.). Chainlists. Retrieved April 10, 2022 from https://chainlist.org/zhCharoenwong, B., & Bernardi, M. (2022). A Decade of Cryptocurrency ‘Hacks’: 2011 – 2021. Available at SSRN: https://ssrn.com/abstract=3944435 or http://dx.doi.org/10.2139/ssrn.3944435Defi Llama. (n.d.). Total Value Locked All Chains. Retrieved March 20, 2022 from https://defillama.com/chainsEthereum Wiki. (n.d.). RLP. Retrieved April 9, 2022 from https://eth.wiki/fundamentals/rlpGentilal, M., Martins, P., & Sousa, L. (2017). TrustZone-backed bitcoin wallet. Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems,Hiltgen, A., Kramp, T., & Weigold, T. (2006). Secure internet banking authentication. IEEE security & privacy, 4(2), 21-29.Jakobsson, M., & Juels, A. (1999). Proofs of work and bread pudding protocols. In Secure information networks (pp. 258-272). Springer.Lamport, L., Shostak, R., & Pease, M. (2019). The Byzantine generals problem. In Concurrency: the Works of Leslie Lamport (pp. 203-226).Lazarenko, A., & Avdoshin, S. (2019). Financial Risks of the Blockchain Industry: A Survey of Cyberattacks. In K. Arai, R. Bhatia, & S. Kapoor, Proceedings of the Future Technologies Conference (FTC) 2018 Cham.Lim, I.-K., Kim, Y.-H., Lee, J.-G., Lee, J.-P., Nam-Gung, H., & Lee, J.-K. (2014). The analysis and countermeasures on security breach of bitcoin. International conference on computational science and its applications,McCorry, P., Möser, M., & Ali, S. T. (2018). Why Preventing a Cryptocurrency Exchange Heist Isn’t Good Enough. In V. Matyáš, P. Švenda, F. Stajano, B. Christianson, & J. Anderson, Security Protocols XXVI Cham.Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.Palatinus, M., & Rusnak, P. (2014). Multi-Account Hierarchy for Deterministic Wallets. Retrieved Jun 10, 2022 from https://github.com/bitcoin/bips/blob/master/bip-0044.mediawikiPoulsen, K. (2011). New Malware Steals Your Bitcoin. Retrieved March 20, 2022 from https://www.wired.com/2011/06/bitcoin-malware/Rezaeighaleh, H., & Zou, C. C. (2020). Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),Rusnak, P., & Palatinus, M. (2014). SLIP-0044 : Registered coin types for BIP-0044. Retrieved May 23, 2022 from https://github.com/satoshilabs/slips/blob/master/slip-0044.mdSzabo, N. (1997). Formalizing and securing relationships on public networks. First monday.TheBlockCrypto. (2022). Cryptocurrency Exchange Volume. Retrieved March 20, 2022 from https://www.theblockcrypto.com/data/crypto-markets/spot/cryptocurrency-exchange-volume-monthlyTidy, J. (2021). 數字貨幣市場上遭黑客攻擊的受害者. Retrieved May 23, 2022 from https://www.bbc.com/zhongwen/trad/business-58341055Vogelsteller, F., & Buterin, V. (2015). EIP-20: Token Standard. Retrieved May 10, 2022 from https://eips.ethereum.org/EIPS/eip-20Wood, G. (2022). ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER. Retrieved May 29, 2022 from https://ethereum.github.io/yellowpaper/paper.pdfWuille, P. (2012). Hierarchical Deterministic Wallets. Retrieved June 10, 2022 from https://github.com/bitcoin/bips/blob/master/bip-0032.mediawikiYavuz, E., Koç, A. K., Çabuk, U. C., & Dalkılıç, G. (2018). Towards secure e-voting using ethereum blockchain. 2018 6th International Symposium on Digital Forensic and Security (ISDFS), 描述 碩士
國立政治大學
資訊管理學系
109356032資料來源 http://thesis.lib.nccu.edu.tw/record/#G0109356032 資料類型 thesis dc.contributor.advisor 陳恭 zh_TW dc.contributor.advisor Chen, Kung en_US dc.contributor.author (Authors) 簡佑臻 zh_TW dc.contributor.author (Authors) Chien, Yu-Jen en_US dc.creator (作者) 簡佑臻 zh_TW dc.creator (作者) Chien, Yu-Jen en_US dc.date (日期) 2022 en_US dc.date.accessioned 1-Aug-2022 17:23:40 (UTC+8) - dc.date.available 1-Aug-2022 17:23:40 (UTC+8) - dc.date.issued (上傳時間) 1-Aug-2022 17:23:40 (UTC+8) - dc.identifier (Other Identifiers) G0109356032 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/141041 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊管理學系 zh_TW dc.description (描述) 109356032 zh_TW dc.description.abstract (摘要) 近年來加密貨幣交易興起,各大知名的加密貨幣交易所,如Binance、FTX與Coinbase等,都透過提供簡易操作的加密貨幣錢包與多樣化服務,吸引加密貨幣持有者的使用,但這些便利性是透過交易所代管客戶加密貨幣的私鑰而達到的;一旦交易所遭到駭客入侵,取得其代管的客戶私鑰,將為客戶帶來重大的損失。為了防範此種問題,越來越多使用者開始採用熱錢包 (Hot wallet) 與冷錢包 (Cold wallet) ,其中以冷錢包提供的服務更具有安全保障。冷錢包,又稱硬體錢包,其功能是將加密貨幣帳戶的私鑰透過離線的硬體環境產生與儲存,降低其遭到駭客盜取私鑰的風險。因此,針對不同鏈的不同幣種,硬體錢包需要支援該幣種的交易格式、雜湊函數與數位簽章演算法,否則無法產出該筆交易之簽章。為加速硬體錢包支援新幣種的速度,本研究認為可以透過實作出以太坊兼容鏈的交易,提高實作效率。首先,本研究藉由庫幣科技提供之硬體錢包實作出以太坊兼容鏈的Avalanche C-Chain交易。其次,透過抽離出其與以太坊交易之相異處後,發展以太坊兼容鏈架構,據以實作出Aurora與Klaytn之交易,並比較新舊方法之流程上差異。在以太坊相容架構下,未來只需要兩個步驟就能使硬體錢包支援新鏈之交易,相較於目前的方法,可大幅縮短實作上的流程。 zh_TW dc.description.abstract (摘要) The cryptocurrency trading has gone viral in recent years. Major well-known cryptocurrency exchanges, such as Binance, FTX and Coinbase, have attracted cryptocurrency holders by providing easy-to-use cryptocurrency wallets and diversified services. However, such convenient services are achieved by hosting the private key of the client’s cryptocurrency wallet. Once the exchange is hacked and breached, the hackers obtain the customers’ private keys, bringing heavy losses to the customers. In order to prevent such problems, more and more users have begun to embrace hot wallets and cold wallets, among which the latter are considered to be more secure.A cold wallet, also known as a hardware wallet, is a device for offline storage of private keys. It generates and stores the private keys of cryptocurrency wallets through an offline hardware environment, reducing the risk of hackers stealing the private keys. Therefore, for different currencies of different blockchains, the hardware wallet needs to support the transaction format of the currency, such as the hash function and digital signature algorithm used, otherwise the signature of the transaction cannot be generated. In order to accelerate the speed of hardware wallets supporting new currencies, this study believes that the efficiency of implementation can be improved by implementing transactions on the Ethereum-compatible chains. First of all, this study uses the hardware wallet provided by CoolBitX to implement the transactions of Avalanche C-Chain, an Ethereum-compatible chain. After extracting the differences between Avalanche C-Chain and Ethereum transactions, we develop the Ethereum compatible chain structure, according to which the transactions on Aurora and Klaytn are implemented, and the process difference between the old and new method is compared. Under the Ethereum-compatible architecture, only two steps are needed in the future to enable the hardware wallet to support transactions on the new chain. Compared with the current method, the implementation process is greatly shortened. en_US dc.description.tableofcontents 摘要 iiAbstract iii表次 v圖次 vi第一章 緒論 1第一節、 研究背景與動機 1第二節、 研究目的 2第三節、 研究貢獻 3第四節、 論文架構 3第二章 技術背景與文獻探討 5第一節、 區塊鏈技術 5第二節、 文獻探討 8第三節、 小結 11第三章 系統架構 13第一節、 線上簽署與組合以太坊交易之流程 13第二節、 硬體錢包建構區塊鏈交易之架構 14第三節、 硬體錢包建構區塊鏈交易之流程 16第四節、 選用之以太坊交易類型 17第四章 系統實作 19第一節、 Avalanche C-Chain交易之實作 19第二節、 以太坊兼容鏈之實作 28第三節、 系統實作評估 41第五章 結論與未來展望 46第一節、 結論 46第二節、 研究限制與未來建議 47參考文獻 48 zh_TW dc.format.extent 6499914 bytes - dc.format.mimetype application/pdf - dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0109356032 en_US dc.subject (關鍵詞) 區塊鏈 zh_TW dc.subject (關鍵詞) 硬體錢包 zh_TW dc.subject (關鍵詞) 冷錢包 zh_TW dc.subject (關鍵詞) 以太坊兼容鏈 zh_TW dc.subject (關鍵詞) Ethereum-compatible blockchains en_US dc.subject (關鍵詞) Hardware wallets en_US dc.subject (關鍵詞) Cold wallets en_US dc.title (題名) 以硬體錢包實作以太坊相容區塊鏈之交易 zh_TW dc.title (題名) Compose Transactions for Ethereum-Compatible Blockchains Using Hardware Wallets en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) Aung, Y. N., & Tantidham, T. (2017). Review of Ethereum: Smart home case study. 2017 2nd International Conference on Information Technology (INCIT),Ava Labs. (2021). Avalanche Blockchain Consensus. Retrieved April 6, 2022 from https://docs.avax.network/learn/platform-overview/avalanche-consensus/#dags-directed-acyclic-graphsBamert, T., Decker, C., Wattenhofer, R., & Welten, S. (2014). Bluewallet: The secure bitcoin wallet. International Workshop on Security and Trust Management,Barber, S., Boyen, X., Shi, E., & Uzun, E. (2012). Bitter to Better — How to Make Bitcoin a Better Currency. In A. D. Keromytis, Financial Cryptography and Data Security Berlin, Heidelberg.Bartoletti, M., & Pompianu, L. (2017). An Empirical Analysis of Smart Contracts: Platforms, Applications, and Design Patterns. In M. Brenner, K. Rohloff, J. Bonneau, A. Miller, P. Y. A. Ryan, V. Teague, A. Bracciali, M. Sala, F. Pintore, & M. Jakobsson, Financial Cryptography and Data Security Cham.Bogner, A., Chanson, M., & Meeuw, A. (2016). A decentralised sharing app running a smart contract on the ethereum blockchain. Proceedings of the 6th International Conference on the Internet of Things,Buterin, V. (2014). A next-generation smart contract and decentralized application platform. white paper, 3(37).Buterin, V. (2016). EIP-155: Simple replay attack protection. Ethereum Improvement Proposals, no. 155. Retrieved May 2, 2022 from https://eips.ethereum.org/EIPS/eip-155Chainlist.org. (n.d.). Chainlists. Retrieved April 10, 2022 from https://chainlist.org/zhCharoenwong, B., & Bernardi, M. (2022). A Decade of Cryptocurrency ‘Hacks’: 2011 – 2021. Available at SSRN: https://ssrn.com/abstract=3944435 or http://dx.doi.org/10.2139/ssrn.3944435Defi Llama. (n.d.). Total Value Locked All Chains. Retrieved March 20, 2022 from https://defillama.com/chainsEthereum Wiki. (n.d.). RLP. Retrieved April 9, 2022 from https://eth.wiki/fundamentals/rlpGentilal, M., Martins, P., & Sousa, L. (2017). TrustZone-backed bitcoin wallet. Proceedings of the Fourth Workshop on Cryptography and Security in Computing Systems,Hiltgen, A., Kramp, T., & Weigold, T. (2006). Secure internet banking authentication. IEEE security & privacy, 4(2), 21-29.Jakobsson, M., & Juels, A. (1999). Proofs of work and bread pudding protocols. In Secure information networks (pp. 258-272). Springer.Lamport, L., Shostak, R., & Pease, M. (2019). The Byzantine generals problem. In Concurrency: the Works of Leslie Lamport (pp. 203-226).Lazarenko, A., & Avdoshin, S. (2019). Financial Risks of the Blockchain Industry: A Survey of Cyberattacks. In K. Arai, R. Bhatia, & S. Kapoor, Proceedings of the Future Technologies Conference (FTC) 2018 Cham.Lim, I.-K., Kim, Y.-H., Lee, J.-G., Lee, J.-P., Nam-Gung, H., & Lee, J.-K. (2014). The analysis and countermeasures on security breach of bitcoin. International conference on computational science and its applications,McCorry, P., Möser, M., & Ali, S. T. (2018). Why Preventing a Cryptocurrency Exchange Heist Isn’t Good Enough. In V. Matyáš, P. Švenda, F. Stajano, B. Christianson, & J. Anderson, Security Protocols XXVI Cham.Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.Palatinus, M., & Rusnak, P. (2014). Multi-Account Hierarchy for Deterministic Wallets. Retrieved Jun 10, 2022 from https://github.com/bitcoin/bips/blob/master/bip-0044.mediawikiPoulsen, K. (2011). New Malware Steals Your Bitcoin. Retrieved March 20, 2022 from https://www.wired.com/2011/06/bitcoin-malware/Rezaeighaleh, H., & Zou, C. C. (2020). Efficient Off-Chain Transaction to Avoid Inaccessible Coins in Cryptocurrencies. 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),Rusnak, P., & Palatinus, M. (2014). SLIP-0044 : Registered coin types for BIP-0044. Retrieved May 23, 2022 from https://github.com/satoshilabs/slips/blob/master/slip-0044.mdSzabo, N. (1997). Formalizing and securing relationships on public networks. First monday.TheBlockCrypto. (2022). Cryptocurrency Exchange Volume. Retrieved March 20, 2022 from https://www.theblockcrypto.com/data/crypto-markets/spot/cryptocurrency-exchange-volume-monthlyTidy, J. (2021). 數字貨幣市場上遭黑客攻擊的受害者. Retrieved May 23, 2022 from https://www.bbc.com/zhongwen/trad/business-58341055Vogelsteller, F., & Buterin, V. (2015). EIP-20: Token Standard. Retrieved May 10, 2022 from https://eips.ethereum.org/EIPS/eip-20Wood, G. (2022). ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER. Retrieved May 29, 2022 from https://ethereum.github.io/yellowpaper/paper.pdfWuille, P. (2012). Hierarchical Deterministic Wallets. Retrieved June 10, 2022 from https://github.com/bitcoin/bips/blob/master/bip-0032.mediawikiYavuz, E., Koç, A. K., Çabuk, U. C., & Dalkılıç, G. (2018). Towards secure e-voting using ethereum blockchain. 2018 6th International Symposium on Digital Forensic and Security (ISDFS), zh_TW dc.identifier.doi (DOI) 10.6814/NCCU202201030 en_US
