M of 2 DRAFT: Difference between revisions
No edit summary |
Added to category BIP |
||
(11 intermediate revisions by 2 users not shown) | |||
Line 73: | Line 73: | ||
==Security== | ==Security== | ||
Although it may appear insecure totalling the sum of the public keys this | Although it may appear insecure totalling the sum of the public keys the author does not believe this to be the case. | ||
You could deduce the target value by looking at the the sum of M + pubKey1 + pubKey2 + N from a previous transaction. | |||
<pre>uint256 target = | <pre> | ||
uint256 | uint256 target = Previously Redeemed M+P1+P2+N | ||
while( | uint256 myKeyA = SHA256(); | ||
++ | uint256 myBogusKeyB = 0; | ||
int n = 2; | |||
int m = 1; | |||
</pre> | |||
Initially it might seem that you could use an A or B where B is a invalid key: | |||
<pre> | |||
while(m + myKeyA + myBogusKeyB + n != target) { | |||
++myBogusKeyB; | |||
}</pre> | }</pre> | ||
However the additional SHA256 operations prevent you from doing this: | |||
<pre> | |||
myKeyA = SHA256(myKeyA); | |||
while(m + myKeyA + SHA256(myBogusKeyB + n) != target) { | |||
++myBogusKeyB; | |||
}</pre> | |||
Resulting in equal brute force time. | |||
What does affect security is ability to adjust M (either 1 or 2) without needing to generate a new SHA256 pair. This effectively halves the key space to 2^255 keys however it is still far far out of the realm of brute force possibility. Regardless use of a 20 byte hash limits the key space | What does affect security is ability to adjust M (either 1 or 2) without needing to generate a new SHA256 pair. This effectively halves the key space to 2^255 keys however it is still far far out of the realm of brute force possibility. Regardless use of a 20 byte hash limits the key space to 2^160 so it actually has no effect on security at all. | ||
==Rationale== | ==Rationale== | ||
Line 115: | Line 124: | ||
The following is not part of the specification for this proposal but it is worth mentioning that using the same technique you can support both M-of-2 and M-of-3 transactions. | The following is not part of the specification for this proposal but it is worth mentioning that using the same technique you can support both M-of-2 and M-of-3 transactions. | ||
OP_2OVER OP_2OVER 3 OP_EQUAL OP_IF | OP_2OVER OP_2OVER OP_DUP 3 OP_EQUAL OP_IF 8 OP_PICK OP_ADD OP_HASH256 OP_ENDIF OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG | ||
However this requires 14 bytes of additional op codes. | However this requires 14 bytes of additional op codes. | ||
Line 121: | Line 130: | ||
==See Also== | ==See Also== | ||
* The [[BIP 0013|Address format for Pay to Script Hash BIP]] | * The [[BIP 0013|Address format for Pay to Script Hash BIP]] | ||
* M-of-N Multisignature Transactions [[BIP 0011|BIP 11]] | * M-of-N Multisignature Transactions [[BIP 0011|BIP 11]] | ||
[[Category:BIP|D]] |
Latest revision as of 18:22, 29 January 2012
BIP: Unassigned Title: M-of-2 scriptPubKey Author: Ben Reeves <support@pi.uk.com> Status: Draft Type: Unassigned Created: 15-01-2012
Abstract
This BIP describes a new standard type of scriptPubKey designed to allow immediate use of split key wallets.
Motivation
The purpose of this proposal is to provide split key wallet functionality without requiring changes to block validation rules or risking a fork in the blockchain.
Specification
A new standard scriptPubKey will be defined:
OP_2OVER OP_2OVER OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
Redeemed by a new standard scriptSig
OP_0 <sig> 1 [pubkey] [pubkey] 2
This proposal only supports A + B or A or B split key transactions.
Use Cases
- Split key wallets
- Escrow Services - The author does not believe that (A + B) or C scripts are required for escrow transactions. Both parties must trust the holder of C anyway so that party can instead hold both A and B. The holders of A and B can either reach an agreement themselves or party C can act as the final arbitrator using A and B together.
Example Execution
Stack | Code |
---|---|
<sig> 1 [pubkey1] [pubkey2] 2 OP_2OVER OP_2OVER OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG | |
<sig> 1 [pubkey1] [pubkey2] 2 | OP_2OVER OP_2OVER OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] | OP_2OVER OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] [pubkey2] 2 | OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] <sumA> | OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] <hashA> | OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 1 <sumB> | OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 1 <HashB> | OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 <sumC> | OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 <scriptHashA> <scriptHash> | OP_EQUALVERIFY OP_CHECKMULTISIG |
<sig> 1 [pubkey1] [pubkey2] 2 | OP_CHECKMULTISIG |
1 |
Where scriptHash must be constructed in the following manor:
scriptHash = RIPMED160(M + SH256(SHA256(pubKey2 + 2) + pubKey1));
(+ means addition not concatenation)
Security
Although it may appear insecure totalling the sum of the public keys the author does not believe this to be the case.
You could deduce the target value by looking at the the sum of M + pubKey1 + pubKey2 + N from a previous transaction.
uint256 target = Previously Redeemed M+P1+P2+N uint256 myKeyA = SHA256(); uint256 myBogusKeyB = 0; int n = 2; int m = 1;
Initially it might seem that you could use an A or B where B is a invalid key:
while(m + myKeyA + myBogusKeyB + n != target) { ++myBogusKeyB; }
However the additional SHA256 operations prevent you from doing this:
myKeyA = SHA256(myKeyA); while(m + myKeyA + SHA256(myBogusKeyB + n) != target) { ++myBogusKeyB; }
Resulting in equal brute force time.
What does affect security is ability to adjust M (either 1 or 2) without needing to generate a new SHA256 pair. This effectively halves the key space to 2^255 keys however it is still far far out of the realm of brute force possibility. Regardless use of a 20 byte hash limits the key space to 2^160 so it actually has no effect on security at all.
Rationale
This BIP replaces BIP 16, ("/P2SH/").
There is a general consensus that multi signature transactions need to be implemented ASAP without requiring the use extremely long "script addresses". A number of potential issues have been found with the proposals thus far:
- CHV requires the scriptPubKey interacts with data from scriptSig which has not been push onto the stack
- OP_EVAL essentially makes the scripting language turing complete, something which Satoshi deliberately avoided during its design.
- P2SH requires that standard templates become a mandatory part of the scripting language, meaning they can never be fully depreciated in future.
All of the these solutions risk a fork in the blockchain and require at least 50% miners approval. This proposal requires no changes to the block validation rules and can be implemented immediately. However it only allows for the most common use cases of pay to script transactions and has limited flexibility. Additionally the resulting scriptPubKey is 6 bytes larger than the standard "pay to address" scriptPubKey in common use.
Backwards Compatibility
Old clients will not relay transactions using the new template, however they will preform the same validation as new clients.
M-of-3
The following is not part of the specification for this proposal but it is worth mentioning that using the same technique you can support both M-of-2 and M-of-3 transactions.
OP_2OVER OP_2OVER OP_DUP 3 OP_EQUAL OP_IF 8 OP_PICK OP_ADD OP_HASH256 OP_ENDIF OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
However this requires 14 bytes of additional op codes.
See Also
- The Address format for Pay to Script Hash BIP
- M-of-N Multisignature Transactions BIP 11