Deegan et al. proposed two post-quantum HD wallet constructions in their paper, recovering BIP32's public key derivation functionality based on lattice assumptions, including schemes using ML-DSA and Raccoon-G. Deegan等人在论文中提出了两种后量子HD钱包构造,基于格假设恢复BIP32的公钥派生功能,包括使用ML-DSA和Raccoon-G的方案。
Notes
Two post-quantum HD wallet constructions recovering BIP32 public key derivation based on lattice assumptions
First uses ML-DSA for hardened derivation with proofs of unlinkability and unforgeability
Second uses Raccoon-G variant enabling non-hardened public key derivation via Gaussian-distributed secrets
Modified Raccoon-G to publish full unrounded public keys preserving linearity
Proved unlinkability and unforgeability under standard lattice assumptions
Introduced method for generating rerandomizable Raccoon-G key pairs from fixed randomness
提出两种后量子HD钱包构造,基于格假设恢复BIP32公钥派生功能
第一种使用ML-DSA支持硬化派生,证明不可链接性和不可伪造性
第二种使用Raccoon-G变体,通过高斯分布秘密实现非硬化公钥派生
修改Raccoon-G以发布完整未舍入公钥,保持线性特性
证明在标准格假设下的不可链接性和不可伪造性
引入从固定随机性生成可重随机化Raccoon-G密钥对的方法
零知识证明zkDaily
Q&A Deep Dive 💬今日要点 深入解析 💬
Sat星期六
03.07
2026
What is the core idea behind BIP32 hierarchical deterministic wallets? BIP32 分层确定性钱包的核心思想是什么?
BIP32 allows a user to derive an entire tree of key pairs deterministically from a single master seed, simplifying key management and backups. BIP32 允许用户从一个主种子生成一整棵密钥树,从而确定性地产生大量公私钥对,方便备份和管理。
Why is it difficult to support BIP32-style non-hardened derivation in post-quantum systems? 为什么在后量子密码体系中实现 BIP32 风格的非 hardened 派生是困难的?
Traditional HD wallets rely on the algebraic structure of elliptic curve public keys that allows simple linear operations to derive child keys. Most post-quantum signature schemes do not provide such structure. 现有 HD 钱包依赖椭圆曲线公钥的线性代数结构,使得子公钥可以通过简单运算从父公钥得到。而大多数后量子签名方案缺乏这种结构。
How does the paper argue unlinkability between derived keys? 论文如何证明派生密钥之间的不可链接性(unlinkability)?
The authors show that derived keys are statistically close to independently generated keys, making it infeasible for an observer to determine whether two keys originate from the same derivation path. 作者证明派生密钥的分布与独立生成的密钥在统计上非常接近,因此观察者无法区分两个密钥是否来自同一派生路径。