{"title":"Smart Contract-Based Social Recovery Wallet Management Scheme for Digital Assets","authors":"Allan B. Pedin, N. Siasi, Mohammad Sameni","doi":"10.1145/3564746.3587016","DOIUrl":null,"url":null,"abstract":"Social recovery schemes enable the recovery of decentralized digital assets like Bitcoin and Ethereum through a social network. These schemes suffer from security issues and limitations including centralization, a conspiracy of one's network, large transaction fees for the user and network, and verifiable connections between the user and the network. To mitigate these issues, the work proposes and implements a novel social recovery scheme based on verifiable secret sharing, smart contract code, encrypted communication, and biometric encryption. The security and performance analysis versus key existing implementations is evaluated in terms of security features and gas fees.","PeriodicalId":322431,"journal":{"name":"Proceedings of the 2023 ACM Southeast Conference","volume":"388 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 ACM Southeast Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3564746.3587016","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Social recovery schemes enable the recovery of decentralized digital assets like Bitcoin and Ethereum through a social network. These schemes suffer from security issues and limitations including centralization, a conspiracy of one's network, large transaction fees for the user and network, and verifiable connections between the user and the network. To mitigate these issues, the work proposes and implements a novel social recovery scheme based on verifiable secret sharing, smart contract code, encrypted communication, and biometric encryption. The security and performance analysis versus key existing implementations is evaluated in terms of security features and gas fees.