M of 2 DRAFT: Difference between revisions

From Bitcoin Wiki
Jump to navigation Jump to search
Piuk (talk | contribs)
No edit summary
Giszmo (talk | contribs)
Added to category BIP
 
(11 intermediate revisions by 2 users not shown)
Line 73: Line 73:
==Security==
==Security==


Although it may appear insecure totalling the sum of the public keys this is not actually the case.  
Although it may appear insecure totalling the sum of the public keys the author does not believe this to be the case.


The resulting target is a massively large uint256 number which you could theoretically brute force using as follows:
You could deduce the target value by looking at the the sum of M + pubKey1 + pubKey2 + N  from a previous transaction.


<pre>uint256 target = 0;
<pre>
uint256 nonce = 0;
uint256 target = Previously Redeemed M+P1+P2+N
while(SHA256(nonce) != target) {
uint256 myKeyA = SHA256();
   ++nonce;
uint256 myBogusKeyB = 0;
int n = 2;
int m = 1;
</pre>
 
Initially it might seem that you could use an A or B where B is a invalid key:
<pre>
while(m + myKeyA + myBogusKeyB + n != target) {
   ++myBogusKeyB;
}</pre>
}</pre>


Just because you can have two nonces doesn't make bruteforcing any easier.
However the additional SHA256 operations prevent you from doing this:
 
<pre>
myKeyA = SHA256(myKeyA);
while(m + myKeyA + SHA256(myBogusKeyB + n) != target) {
  ++myBogusKeyB;
}</pre>


<pre>uint256 target = 0;
Resulting in equal brute force time.
uint256 nonce = 0;
uint256 nonceTwo = rand();
while(SHA256(nonce) + SHA256(nonceTwo) != target) {
  ++nonce;
  ++nonceTwo;
} </pre>


What does affect security is ability to adjust M (either 1 or 2) without needing to generate a new SHA256 pair. This effectively halves the key space to 2^255 keys however it is still far far out of the realm of brute force possibility. Regardless use of a 20 byte hash limits the key space size to 2^160 so it actually has no effect on security at all.
What does affect security is ability to adjust M (either 1 or 2) without needing to generate a new SHA256 pair. This effectively halves the key space to 2^255 keys however it is still far far out of the realm of brute force possibility. Regardless use of a 20 byte hash limits the key space to 2^160 so it actually has no effect on security at all.


==Rationale==
==Rationale==
Line 115: Line 124:
The following is not part of the specification for this proposal but it is worth mentioning that using the same technique you can support both M-of-2 and M-of-3 transactions.
The following is not part of the specification for this proposal but it is worth mentioning that using the same technique you can support both M-of-2 and M-of-3 transactions.


   OP_2OVER OP_2OVER 3 OP_EQUAL OP_IF 3 OP_PICK OP_ADD OP_HASH256 OP_ENDIF OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
   OP_2OVER OP_2OVER OP_DUP 3 OP_EQUAL OP_IF 8 OP_PICK OP_ADD OP_HASH256 OP_ENDIF OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG


However this requires 14 bytes of additional op codes.
However this requires 14 bytes of additional op codes.
Line 121: Line 130:
==See Also==
==See Also==


* https://bitcointalk.org/index.php?topic=46538
* The [[BIP 0013|Address format for Pay to Script Hash BIP]]
* The [[BIP 0013|Address format for Pay to Script Hash BIP]]
* M-of-N Multisignature Transactions [[BIP 0011|BIP 11]]
* M-of-N Multisignature Transactions [[BIP 0011|BIP 11]]
[[Category:BIP|D]]

Latest revision as of 18:22, 29 January 2012

  BIP: Unassigned
  Title: M-of-2 scriptPubKey
  Author: Ben Reeves <support@pi.uk.com>
  Status: Draft
  Type: Unassigned
  Created: 15-01-2012

Abstract

This BIP describes a new standard type of scriptPubKey designed to allow immediate use of split key wallets.

Motivation

The purpose of this proposal is to provide split key wallet functionality without requiring changes to block validation rules or risking a fork in the blockchain.

Specification

A new standard scriptPubKey will be defined:

  OP_2OVER OP_2OVER OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG

Redeemed by a new standard scriptSig

  OP_0  <sig> 1 [pubkey] [pubkey] 2

This proposal only supports A + B or A or B split key transactions.

Use Cases

  • Split key wallets
  • Escrow Services - The author does not believe that (A + B) or C scripts are required for escrow transactions. Both parties must trust the holder of C anyway so that party can instead hold both A and B. The holders of A and B can either reach an agreement themselves or party C can act as the final arbitrator using A and B together.

Example Execution

Stack Code
<sig> 1 [pubkey1] [pubkey2] 2 OP_2OVER OP_2OVER OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 OP_2OVER OP_2OVER OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] OP_2OVER OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] [pubkey2] 2 OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] <sumA> OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 1 [pubkey1] <hashA> OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 1 <sumB> OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 1 <HashB> OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 <sumC> OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 <scriptHashA> <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG
<sig> 1 [pubkey1] [pubkey2] 2 OP_CHECKMULTISIG
1

Where scriptHash must be constructed in the following manor:

scriptHash = RIPMED160(M + SH256(SHA256(pubKey2 + 2) + pubKey1));

(+ means addition not concatenation)

Security

Although it may appear insecure totalling the sum of the public keys the author does not believe this to be the case.

You could deduce the target value by looking at the the sum of M + pubKey1 + pubKey2 + N from a previous transaction.

uint256 target = Previously Redeemed M+P1+P2+N 
uint256 myKeyA = SHA256();
uint256 myBogusKeyB = 0;
int n = 2;
int m = 1;

Initially it might seem that you could use an A or B where B is a invalid key:

while(m + myKeyA + myBogusKeyB + n != target) {
  ++myBogusKeyB;
}

However the additional SHA256 operations prevent you from doing this:

myKeyA = SHA256(myKeyA);
while(m + myKeyA + SHA256(myBogusKeyB + n) != target) {
  ++myBogusKeyB;
}

Resulting in equal brute force time.

What does affect security is ability to adjust M (either 1 or 2) without needing to generate a new SHA256 pair. This effectively halves the key space to 2^255 keys however it is still far far out of the realm of brute force possibility. Regardless use of a 20 byte hash limits the key space to 2^160 so it actually has no effect on security at all.

Rationale

This BIP replaces BIP 16, ("/P2SH/").

There is a general consensus that multi signature transactions need to be implemented ASAP without requiring the use extremely long "script addresses". A number of potential issues have been found with the proposals thus far:

  • CHV requires the scriptPubKey interacts with data from scriptSig which has not been push onto the stack
  • OP_EVAL essentially makes the scripting language turing complete, something which Satoshi deliberately avoided during its design.
  • P2SH requires that standard templates become a mandatory part of the scripting language, meaning they can never be fully depreciated in future.

All of the these solutions risk a fork in the blockchain and require at least 50% miners approval. This proposal requires no changes to the block validation rules and can be implemented immediately. However it only allows for the most common use cases of pay to script transactions and has limited flexibility. Additionally the resulting scriptPubKey is 6 bytes larger than the standard "pay to address" scriptPubKey in common use.

Backwards Compatibility

Old clients will not relay transactions using the new template, however they will preform the same validation as new clients.

M-of-3

The following is not part of the specification for this proposal but it is worth mentioning that using the same technique you can support both M-of-2 and M-of-3 transactions.

  OP_2OVER OP_2OVER OP_DUP 3 OP_EQUAL OP_IF 8 OP_PICK OP_ADD OP_HASH256 OP_ENDIF OP_ADD OP_HASH256 OP_ADD OP_HASH256 OP_ADD OP_RIPEMD160 <scriptHash> OP_EQUALVERIFY OP_CHECKMULTISIG

However this requires 14 bytes of additional op codes.

See Also