ARCHITECTURE OF A SECURE CRYPTOCURRENCY WALLETBASED ON AIR-GAP AND MULTISIGNATURE MECHANISMS
DOI:
https://doi.org/10.34185/1562-9945-5-162-2026-13Keywords:
cryptocurrency wallet, Air-Gap, cold storage, multisignature, PSBT, QR code, blockchain, offline signing, cross-platform applicationAbstract
The study addresses the vulnerabilities of cryptocurrency wallets to network attacks. A secure cross-platform architecture is proposed, integrating Air-Gap, PSBT, and M-of-N multisignature mechanisms. The solution implements isolated online and offline modules with transaction data exchange via QR codes. Results demonstrate that this architectural ap-proach effectively ensures private key isolation and enhances the security of digital asset transactions.
References
Chainalysis. (2025). 2025 Crypto Crime Mid-Year Update. Retrieved January 8, 2026, from https://www.chainalysis.com/blog/2025-crypto-crime-mid-year-update/
Bitcoin Improvement Proposal 174 (BIP‑174): Partially Signed Bitcoin Transaction For-mat. Retrieved January 8, 2026, from https://bips.dev/174/
Safe Foundation. (n.d.). Safe {Core}: Contracts Architecture. Retrieved January 8, 2026, from https://docs.safe.global/docs/contracts_architecture/
Guri, M. (2018). BeatCoin: Leaking Private Keys from Air-Gapped Cryptocurrency Wal-lets. arXiv. Retrieved January 8, 2026, from https://arxiv.org/pdf/1804.08714
Homoliak, I., Breitenbacher, D., Hujnak, O., Hartel, P., Binder, A., & Szalachowski, P. (2018). SmartOTPs: An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets (Ex-tended version). arXiv. https://doi.org/10.48550/arXiv.1812.03598
Homoliak, I., & Perešíni, M. (2024). SoK: Cryptocurrency Wallets – A Security Review and Classification based on Authentication Factors. In 2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
https://doi.org/10.1109/ICBC59979.2024.10634439
CertiK. (2024, December 17). Exploring PSBT in Bitcoin DeFi: Security Best Practices. CertiK Blog. Retrieved January 8, 2026, from
https://www.certik.com/resources/blog/exploring-psbt-in-bitcoin-defi-security-best-practices
Das, S., Camacho, P., Xiang, Z., Nieto, J., Bünz, B., & Ren, L. (2023). Threshold signa-tures from inner product argument: Succinct, weighted, and multi-threshold. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security (CCS ’23) (pp. 356–370). https://doi.org/10.1145/3576915.3623096
Dabrowski, A., Pfefer, K., Reichel, M., Mai, A., Weippl, E. R., & Franz, M. (2021). Better keep cash in your boots – Hardware wallets are the new single point of failure. In Proceedings of the 2021 ACM CCS Workshop on Decentralized Finance and Security (DeFi ’21) (pp. 1–8). https://doi.org/10.1145/3464967.3488588
Šorf, M., Švenda, P., & Chmielewski, Ł. (2025). Large-scale security analysis of hard-ware wallets. In Lecture Notes in Computer Science (Vol. 15995, pp. 360–377). Springer. https://doi.org/10.1007/978-3-032-00633-2_21
Haryadi, G. A., Rahaman, M. F., Subhan, M. R., Lee, J. M., & Kim, D.-S. (2022). Com-parative study of cryptocurrency wallet security: A hybrid, hot, and cold wallet approach. Re-searchGate. Retrieved January 8, 2026, from https://www.researchgate.net/publication/375187201_Comparative_Study_of_Cryptocurrency_Wallet_Security_A_Hybrid_Hot_and_Cold_Wallet_Approach
Lim, H.-J., Lee, S., Kim, M., & Lee, W. (2025). Comparative analysis of security fea-tures and risks in digital asset wallets. Electronics, 14(12), 2436. https://doi.org/10.3390/electronics14122436
National Institute of Standards and Technology. (2001). FIPS 197: Advanced Encryption Standard (AES). https://doi.org/10.6028/NIST.FIPS.197-upd1
Bitcoin Improvement Proposal 44 (BIP‑44): Multi‑Account Hierarchy for Deterministic Wallets. Retrieved January 8, 2026, from https://bips.dev/44/
Downloads
Published
Issue
Section
License
Copyright (c) 2026 System technologies

This work is licensed under a Creative Commons Attribution 4.0 International License.









