1 of 12

Key Management types of Blockchain Wallets

NEC Corporation�Saki Otsuki

~Focusing on Biometric Key Management

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

2 of 12

Purpose of this session

To improve the Wallet Governance Study Report

  • Purpose of the report

Provide a comprehensive overview of the current state, challenges, and future directions of wallet governance, policy, and key management. ��

  • Table of contents��

This presentation

Presentation by Mitchell

2

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

3 of 12

Purpose of this presentation

To improve the key management section of the report

  • The purpose of the section and the purpose of today's presentation is to
    • Achieve a common understanding of the importance of key management�
    • Deepen customers‘ understanding of wallets with various key management types �
    • Share information about biometric key management and lay the foundations for future discussions ←Hear opinions from various standpoints

3

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

4 of 12

The role of keys in blockchain wallets

  • A blockchain wallet is a tool for managing and trading cryptocurrency or NFTs
  • Digital signatures are used to generate valid transactions
    • Access rights to signing keys = rights to transfer assets

  • This section deals with how to manage signing keys in a wallet

4

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

5 of 12

Key management considerations for blockchain wallets

  • Security
    • Is there a risk for the unauthroized access of signing keys?�E.g. Who is the management entity? What is the management medium? What is the access control method for signing keys?
  • Availability
    • Is the key accessible even in the event of a failure?�E.g. Cases include whether the storage device will be damaged, whether an internet connection is required, whether the management entity will continue to provide the service.
  • Convenience
    • Are there any mental or financial costs involved in managing keys?�E.g. Are there too many steps? Do you need to buy expensive dedicated devices?

It is difficult to balance security, availability and convenience of key management.

→Choose the appropriate key management method (wallet type) according to use case and desired functions.

5

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

6 of 12

Types of Blockchain wallets

  • Custodial wallet / Non-custodial wallet
    • Classification by management entity
  • Software wallet / Hardware wallet
    • Classification by management location
  • Multi-sig wallet, MPC (Multi-Party Computation) wallet
    • Types with enhanced key redundancy
  • Smart contract wallet
    • A type that is directly manipulated by a program implemented on the Ethereum chain�
  • Biometric wallet
    • A type that uses biometric information for key management

6

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

7 of 12

Biometric wallet (as defined by IKP-WG)

  • Biometric wallet is a generic term for wallets that use biometric information for key management
    • Biometric-locked… Use biometric information to activate the key
    • Biometric-bound…Use biometric information as a substitute for the key

  • Motivation for biometric key management
    • Biometric information has strong binding with its owner and is easy to use.
      • We never lose it.
      • No one can steal it.
      • We can’t lend it to someone else.

7

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

8 of 12

Common features of Biometric wallets

  • Security
    • Security depends on the accuracy of biometric authentication.
    • In practice, there is a risk of impersonation through copied photos or videos.
      • Preventing this requires system-level enhancements.
  • Availability
    • If biometric information input is mandatory, there is a single point of failure.
    • Biometric information cannot be used in some situations such as damage to biometric features or environmental factors like lighting.
  • Highly convenient�
  • Issue of privacy
    • Biometric information is essentially personal data that does not change.�

8

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

9 of 12

The difference between "Locked" and "Bound" wallet

  • The strength of the binding between the key and the owner

Example of Biometric-locked wallet��

Example of Biometric-bound wallet��

Wallet App.

Signed transaction

Signed transaction

Wallet App.

2.Activation

1.Matching

There is still a risk of unauthorized use or �loss of the key.

No confidential information is stored.

Weak binding

Strong binding

9

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

10 of 12

Discussion

  • About Biometric wallet
    • What do you think about it from the perspective of the developer/user?
    • Considerations and concerns when implementing in society�

I would be happy if you could speak slowly and clearly.

10

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

11 of 12

© NEC Corporation 2024

Restricted within the BGIN IKP-WG

12 of 12

Orchestrating Blue

Brighter Orange

© NEC Corporation 2024

Restricted within the BGIN IKP-WG