1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
|
Return-Path: <roconnor@blockstream.io>
Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org
[172.17.192.35])
by mail.linuxfoundation.org (Postfix) with ESMTPS id 6E953D17
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 30 Jan 2018 19:12:54 +0000 (UTC)
X-Greylist: whitelisted by SQLgrey-1.7.6
Received: from mail-io0-f174.google.com (mail-io0-f174.google.com
[209.85.223.174])
by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 0AE30388
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 30 Jan 2018 19:12:52 +0000 (UTC)
Received: by mail-io0-f174.google.com with SMTP id d13so12634095iog.5
for <bitcoin-dev@lists.linuxfoundation.org>;
Tue, 30 Jan 2018 11:12:52 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=blockstream.io; s=google;
h=mime-version:from:date:message-id:subject:to;
bh=Bmun7Q+C9GQpqqRlw8/c6pBm7+JLT5O+MSBM9JzliyE=;
b=xq6XNZkHCI0kEGAYgPa2xsLEinpZUf/zZY1waRKKL/R0Ib/5WMyc8Ffq6tvJ/3RfiH
nmphnwAK7l5R8ZBJznCxjQlmk5ptK+3YZ7tBGygfUrYTf+QR7IGWUR0v8VxgYUFOcNtx
33Mds5In3b1bIj7IgygYeapKieWg8NvjlnqzQ=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:mime-version:from:date:message-id:subject:to;
bh=Bmun7Q+C9GQpqqRlw8/c6pBm7+JLT5O+MSBM9JzliyE=;
b=nLhSdI+ZnwmQmTxzg+7bWn+6y7xX2pUNf8VEknlEXLmUpqS89MX5RVD6f7abznH/7x
Wz3FIGzL1vXtFBBjHuDkCM8muKnDI6NVoHNG3PWyYuoRRQCaFOETBOJ4yxmdZrlPSFbN
8kJz1M3pVE4GVq85o4SBh59ZyXe2Y7hkHcwwr9KOMqO9xl/eUWg94xJhsLzFaj5iklyC
SE+3f45wz484gdYTelMjebn1MgcfwKj50NqE84xe83F4FvQT4yGtbrr/R81Kc3FKiEyZ
J72Ku7BpQf9QbOobwTPeR95s4B6XX9g+pHEhyYRr4QkgtKxonRhO/jxV+hClNIt7b7aI
b2Sg==
X-Gm-Message-State: AKwxytcYF23b/EoAusKhdNeuXy8RRJrNGO02KPX73foed24FJek6n/61
r71ODYlUxXAEe2ArpKVfClanLT3OAgYT5p/oGWL+oTwm
X-Google-Smtp-Source: AH8x225pb/uvVlr5okqu0E3XLeqkRNOPhzI0XXPkSJfyEM35Q2p+S5QwHORm6NTQQ1UUGMmM5wKD30HrexYBWPaD8JU=
X-Received: by 10.107.82.15 with SMTP id g15mr33760056iob.157.1517339572139;
Tue, 30 Jan 2018 11:12:52 -0800 (PST)
MIME-Version: 1.0
Received: by 10.2.120.10 with HTTP; Tue, 30 Jan 2018 11:12:31 -0800 (PST)
From: "Russell O'Connor" <roconnor@blockstream.io>
Date: Tue, 30 Jan 2018 14:12:31 -0500
Message-ID: <CAMZUoK=A0CXVw81TeKhRSwPOp39qwqwyQ0_zoKLq8kONko14Ng@mail.gmail.com>
To: Matt Corallo <lf-lists@mattcorallo.com>,
"Russell O'Connor via bitcoin-dev" <bitcoin-dev@lists.linuxfoundation.org>
Content-Type: multipart/alternative; boundary="089e08265de83390450564032640"
X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID, DKIM_VALID_AU, HTML_MESSAGE,
RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
smtp1.linux-foundation.org
Subject: [bitcoin-dev] Design approaches for Signature Aggregation
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Tue, 30 Jan 2018 19:12:54 -0000
--089e08265de83390450564032640
Content-Type: text/plain; charset="UTF-8"
On Sat, Jan 27, 2018 at 12:23 PM, Matt Corallo <lf-lists@mattcorallo.com>
wrote:
> Gah, please no. I see no material reason why cross-input signature
> aggregation shouldn't have the signatures in the first n-1 inputs replaced
> with something like a single-byte push where a signature is required to
> indicate aggregation, and the combined signature in the last input at
> whatever position the signature is required.
>
That would be the expedient approach.
I want to preface what I'm about to write by first stating that I think the
cross-input signature aggregation is the most important forthcoming
development for Bitcoin and I would be very happy to have any solution for
it deployed in any workable form. Also, it is difficult to discuss pros
and cons of various designs without concrete proposals, but perhaps we can
try to say some things about various design approaches while still saying
something useful.
I think there are some issues with the expedient proposal for signature
aggregation. The problems begin with the arbitrary choice of which input
witness will be the canonical choice for holding the aggregated signature.
We want to strictly define which input is the canonical choice for holding
the aggregated signature because we wish to avoid introducing new witness
malleability vectors. However, the definition of the canonical input is
somewhat complicated. Because not all inputs are necessarily participating
the aggregation, the canonical choice of input necessarily depends on the
run-time behavior of all the other input Scripts in the transaction. This
complicates the specification and makes the implementation somewhat
error-prone.
Furthermore designing the canonical choice of input for the aggregated
signature to support future extensions of new script versions or new
opcodes that may want to participate in signature aggregation (for example,
adding CHECKSIGFROMSTACK later) is going to be extraordinarily difficult, I
think. I don't know how it could even be done.
On the other hand, the extended-transaction approach supports a clean model
of script semantics whereby the signature aggregation is supported via a
new writer (aka logging) side-effect for Script[1]. In this model, rather
than the semantics of Script returning only failure or success, Script
instead results in either failure or conditional success plus a log of
additional constraints that need to be satisfied for the transaction to be
valid. In the case of signature aggregation, these constraints are of the
form "I require cryptographic evidence that there is a signature on message
M from public key P". The aggregated signature in the extension of the
transaction provides a witness that demonstrates all the constraints
emitted by all the scripts are satisfied.
Even in the extended-transaction approach, supporting future extensions of
new script versions or new opcodes that may want to participate in
signature aggregation is going to be very difficult. However, I do have
some half-baked ideas (that you will probably like even less) on how we
could support new script versions and new opcodes based on this idea of a
writer side-effect model of Script semantics. I hope that designing
support for extendable signature aggregation isn't infeasible.
I think that the cleaner semantic model of the extended-transaction
approach is by itself enough reason to prefer it over the expedient
approach, but reasonable people can disagree about this. However, there
are even larger issues lurking which appear when we start looking for
unintended semantic consequences of the expedient design. This is a common
problem with expedient approaches. It is hard enough to come up with a
design that enables a new feature, but it is even harder to come up with a
design that enables a new feature without enabling other, unintended
"features". I worry that people do not pay enough attention to the later,
after achieving the former. This sort of thing happened with OP_EVAL in bip
12. In that situation, the goal was to create a design that enabled pay to
script hash, and OP_EVAL does achieve that in a very straightforward way.
However, the unintended semantic consequences was that bip 12 also enable
unbounded recursion[2] and extended the class of functions definable by
script all the way to the entire class of all computable functions.
We can find unintended semantic consequences of the expedient approach to
signature aggregation by looking at the ways it fails to fit into the
writer side-effect model for signature aggregation.
A. Firstly, we notice that scripts can determine whether or not they are in
canonical position or not by checking the length of their signature data.
This is an effect that goes beyond the abilities of just allowing signature
aggregation. We can build scripts that can only be redeemed when they are,
or aren't the ones holding the aggregated signature.
B. In the presence of sufficient computation power[3], I expect that
scripts can recover the public keys and signed message data of the
aggregated data, using the same methods used in Enchancing Bitcoin
Transactions with Covenants
<http://fc17.ifca.ai/bitcoin/papers/bitcoin17-final28.pdf>. With this
ability, the script in canonical position can determine what messages are
being signed by other inputs, and which public keys they have chosen to
use. Perhaps a script could enforce a whitelist or blacklist of
approved/disapproved public keys that it is willing or unwilling to be
aggregated with, etc.
C. Scripts can subvert the use the public keys being aggregated themselves
for the purpose of communicate arbitrary data to other script inputs. With
aggregated CHECKSIGFROMSTACK, scripts can directly use signed messages for
this communication.
I'm not trying to say that the above are good or bad things, after all
signature aggregation is an interactive process so it is expected that
users could decide which keys they are willing to aggregate with. What I'm
trying to say is that the expedient proposal has a host of unintended
semantic consequences and the above list is only the ones that I can think
of off the top of my head. I do not even know the full extent of what we
will be enabling with this design but it seems to include adding a
subversive unidirectional cross-input communication channel for Script. Is
that really a feature we want to be bundling with a signature aggregation
proposal?
I believe that the extended-transaction design is the conservative design.
I conjecture that one can build a reduction from scripts supporting
signature aggregation in the extended-transaction design to scripts that
don't support signature aggregation, while preserving the same security
properties. (The proposed reduction would "simply" replace every aggregated
signature call with a non-aggregated signature call.) If this conjecture
holds, that means we can prove that the extended-transaction design is only
an optimization and doesn't have any further unintended semantic
consequences. In particular, we see that the expedient approach doesn't
have such a reduction proof because scripts that are using the expedient
design for cross-input communication cannot be modeled by scripts that
don't have the signature aggregation ability.
I would be disappointed if we end up taking the expedient approach to
signature aggregation (but still very happy that we get signature
aggregation), and there are probably other designs for signature
aggregation beyond the two designs I'm discussing here.
--
Russell
[1]For those familiar with using monads to model side-effects, we can model
the output of Script as a (M Bool) value where M is a writer monad over the
monoid of a set of formal constraints, or some other small variant of this
model. I know that the word monad makes some people's eyes glaze over, but
I'm not trying to use jargon here to exclude people; I'm trying to use
jargon here to be precise about what it means to formally model
computational side-effects for those who are familiar how to do that sort
of thing.
[2]Due to an attempt at a gas limit, OP_EVAL wasn't not intended to enable
unbounded computation in practice. However when talking about the formal
expressiveness of a programming language we usually discard these sorts of
limits, such as stack size limits, gas limits etc. Those limits are there
to prevent denial of service attacks against Bitcoin consensus. The limits
are not designed to enforce language and security properties through the
restriction of computational expressiveness.
[3]Here sufficient computation power means that we have access to functions
like CHECKSIGFROMSTACK and/or basic operations on elliptic curves and hash
functions. These are all pure functions that can be defined by logical
gates. Since bitcoin script has boolean logic operations, they technically
fall into scope of what is ostensibly definable by script. Nevertheless,
these sorts of functions could reasonably appear in a Bitcoin Script 2.0 as
they would make a host of new protocols practical.
--089e08265de83390450564032640
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
<div dir=3D"ltr">On Sat, Jan 27, 2018 at 12:23 PM, Matt Corallo <span dir=
=3D"ltr"><<a href=3D"mailto:lf-lists@mattcorallo.com" target=3D"_blank">=
lf-lists@mattcorallo.com</a>></span> wrote:<br><div class=3D"gmail_extra=
"><div class=3D"gmail_quote"><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex">Gah, please no. I see no material reason why cross-input signature aggr=
egation shouldn't have the signatures in the first n-1 inputs replaced =
with something like a single-byte push where a signature is required to ind=
icate aggregation, and the combined signature in the last input at whatever=
position the signature is required.<br></blockquote><div><br></div><div>Th=
at would be the expedient approach.</div><div><br></div><div>I want to pref=
ace what I'm about to write by first stating that I think the cross-inp=
ut signature aggregation is the most important forthcoming development for =
Bitcoin and I would be very happy to have any solution for it deployed in a=
ny workable form.=C2=A0 Also, it is difficult to discuss pros and cons of v=
arious designs without concrete proposals, but perhaps we can try to say so=
me things about various design approaches while still saying something usef=
ul.<br></div><div><br></div><div>I think there are some issues with the exp=
edient proposal for signature aggregation.=C2=A0 The problems begin with th=
e arbitrary choice of which input witness will be the canonical choice for =
holding the aggregated signature.=C2=A0 We want to strictly define which in=
put is the canonical choice for holding the aggregated signature because we=
wish to avoid introducing new witness malleability vectors.=C2=A0 However,=
the definition of the canonical input is somewhat complicated.=C2=A0 Becau=
se not all inputs are necessarily participating the aggregation, the canoni=
cal choice of input necessarily depends on the run-time behavior of all the=
other input Scripts in the transaction.=C2=A0 This complicates the specifi=
cation and makes the implementation somewhat error-prone.</div><div><br></d=
iv><div>Furthermore designing the canonical choice of input for the aggrega=
ted signature to support future extensions of new script versions or new op=
codes that may want to participate in signature aggregation (for example, a=
dding CHECKSIGFROMSTACK later) is going to be extraordinarily difficult, I =
think.=C2=A0 I don't know how it could even be done.<br></div><div><br>=
</div><div>On the other hand, the extended-transaction approach supports a =
clean model of script semantics whereby the signature aggregation is suppor=
ted via a new writer (aka logging) side-effect for Script[1].=C2=A0 In this=
model, rather than the semantics of Script returning only failure or succe=
ss, Script instead results in either failure or conditional success plus a =
log of additional constraints that need to be satisfied for the transaction=
to be valid.=C2=A0 In the case of signature aggregation, these constraints=
are of the form "I require cryptographic evidence that there is a sig=
nature on message M from public key P".=C2=A0 The aggregated signature=
in the extension of the transaction provides a witness that demonstrates a=
ll the constraints emitted by all the scripts are satisfied.</div><div><br>=
</div><div>Even in the extended-transaction approach, supporting future ext=
ensions of new script versions or new opcodes that may want to participate =
in signature aggregation is going to be very difficult.=C2=A0 However, I do=
have some half-baked ideas (that you will probably like even less) on how=
we could support new script versions and new opcodes based on this idea of=
a writer side-effect model of Script semantics.=C2=A0 I hope that designin=
g support for extendable signature aggregation isn't infeasible.<br></d=
iv><div><br></div><div>I think that the cleaner semantic model of the exten=
ded-transaction approach is by itself enough reason to prefer it over the e=
xpedient approach, but reasonable people can disagree about this.=C2=A0 How=
ever, there are even larger issues lurking which appear when we start looki=
ng for unintended semantic consequences of the expedient design.=C2=A0 This=
is a common problem with expedient approaches.=C2=A0 It is hard enough to =
come up with a design that enables a new feature, but it is even harder to =
come up with a design that enables a new feature without enabling other, un=
intended "features".=C2=A0 I worry that people do not pay enough =
attention to the later, after achieving the former. This sort of thing happ=
ened with OP_EVAL in bip 12.=C2=A0 In that situation, the goal was to creat=
e a design that enabled pay to script hash, and OP_EVAL does achieve that i=
n a very straightforward way.=C2=A0 However, the unintended semantic conseq=
uences was that bip 12 also enable unbounded recursion[2] and extended the =
class of functions definable by script all the way to the entire class of a=
ll computable functions.</div><div><br></div><div>We can find unintended se=
mantic consequences of the expedient approach to signature aggregation by l=
ooking at the ways it fails to fit into the writer side-effect model for si=
gnature aggregation. <br></div><div><br></div><div>A. Firstly, we notice th=
at scripts can determine whether or not they are in canonical position or n=
ot by checking the length of their signature data.=C2=A0 This is an effect =
that goes beyond the abilities of just allowing signature aggregation.=C2=
=A0 We can build scripts that can only be redeemed when they are, or aren&#=
39;t the ones holding the aggregated signature.</div><div><br></div><div>B.=
In the presence of sufficient computation power[3], I expect that scripts =
can recover the public keys and signed message data of the aggregated data,=
using the same methods used in <a href=3D"http://fc17.ifca.ai/bitcoin/pape=
rs/bitcoin17-final28.pdf" target=3D"_blank">Enchancing Bitcoin Transactions=
with Covenants</a>. With this ability, the script in canonical position ca=
n determine what messages are being signed by other inputs, and which publi=
c keys they have chosen to use.=C2=A0 Perhaps a script could enforce a whit=
elist or blacklist of approved/disapproved public keys that it is willing o=
r unwilling to be aggregated with, etc.</div><div><br></div><div>C. Scripts=
can subvert the use the public keys being aggregated themselves for the pu=
rpose of communicate arbitrary data to other script inputs.=C2=A0 With aggr=
egated CHECKSIGFROMSTACK, scripts can directly use signed messages for this=
communication.<br></div><div><br></div><div>I'm not trying to say that=
the above are good or bad things, after all signature aggregation is an in=
teractive process so it is expected that users could decide which keys they=
are willing to aggregate with.=C2=A0 What I'm trying to say is that th=
e expedient proposal has a host of unintended semantic consequences and the=
above list is only the ones that I can think of off the top of my head.=C2=
=A0 I do not even know the full extent of what we will be enabling with thi=
s design but it seems to include adding a subversive unidirectional cross-i=
nput communication channel for Script. Is that really a feature we want to =
be bundling with a signature aggregation proposal?</div><div><br></div><div=
>I believe that the extended-transaction design is the conservative design.=
=C2=A0 I conjecture that one can build a reduction from scripts supporting =
signature aggregation in the extended-transaction design to scripts that do=
n't support signature aggregation, while preserving the same security p=
roperties. (The proposed reduction would "simply" replace every a=
ggregated signature call with a non-aggregated signature call.)=C2=A0 If th=
is conjecture holds, that means we can prove that the extended-transaction =
design is only an optimization and doesn't have any further unintended =
semantic consequences.=C2=A0 In particular, we see that the expedient appro=
ach doesn't have such a reduction proof because scripts that are using =
the expedient design for cross-input communication cannot be modeled by scr=
ipts that don't have the signature aggregation ability.</div><div><br><=
/div><div>I would be disappointed if we end up taking the expedient approac=
h to signature aggregation (but still very happy that we get signature aggr=
egation), and there are probably other designs for signature aggregation be=
yond the two designs I'm discussing here.<br></div><div><br></div><div>=
-- <br></div><div>Russell<br></div><div><br></div><div>[1]For those familia=
r with using monads to model side-effects, we can model the output of Scrip=
t as a (M Bool) value where M is a writer monad over the monoid of a set of=
formal constraints, or some other small variant of this model.=C2=A0 I kno=
w that the word monad makes some people's eyes glaze over, but I'm =
not trying to use jargon here to exclude people; I'm trying to use jarg=
on here to be precise about what it means to formally model computational s=
ide-effects for those who are familiar how to do that sort of thing.</div><=
div><br></div><div>[2]Due to an attempt at a gas limit, OP_EVAL wasn't =
not intended to enable unbounded computation in practice.=C2=A0 However whe=
n talking about the formal expressiveness of a programming language we usua=
lly discard these sorts of limits, such as stack size limits, gas limits et=
c.=C2=A0 Those limits are there to prevent denial of service attacks agains=
t Bitcoin consensus.=C2=A0 The limits are not designed to enforce language =
and security properties through the restriction of computational expressive=
ness.<br></div><div><br></div><div>[3]Here sufficient computation power mea=
ns that we have access to functions like CHECKSIGFROMSTACK and/or basic ope=
rations on elliptic curves and hash functions.=C2=A0 These are all pure fun=
ctions that can be defined by logical gates. Since bitcoin script has boole=
an logic operations, they technically fall into scope of what is ostensibly=
definable by script.=C2=A0 Nevertheless, these sorts of functions could re=
asonably appear in a Bitcoin Script 2.0 as they would make a host of new pr=
otocols practical.<br></div></div></div></div>
--089e08265de83390450564032640--
|