summaryrefslogtreecommitdiff
path: root/65/eef021061ce7e1456f590b8c4106aa6d77aca9
blob: 3c6f5d5a135561dd35b738ff0b21aa11a7d43d88 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
Return-Path: <yurisvb@pm.me>
Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136])
 by lists.linuxfoundation.org (Postfix) with ESMTP id 4363AC0037
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Mon, 18 Dec 2023 22:44:05 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by smtp3.osuosl.org (Postfix) with ESMTP id 1EB9260F34
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Mon, 18 Dec 2023 22:44:05 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 1EB9260F34
Authentication-Results: smtp3.osuosl.org;
 dkim=pass (2048-bit key) header.d=pm.me header.i=@pm.me header.a=rsa-sha256
 header.s=protonmail3 header.b=mGk6zk6B
X-Virus-Scanned: amavisd-new at osuosl.org
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level: 
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H5=0.001,
 RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001]
 autolearn=ham autolearn_force=no
Received: from smtp3.osuosl.org ([127.0.0.1])
 by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id bw2Y40FoWEMq
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Mon, 18 Dec 2023 22:44:03 +0000 (UTC)
Received: from mail-4316.protonmail.ch (mail-4316.protonmail.ch [185.70.43.16])
 by smtp3.osuosl.org (Postfix) with ESMTPS id A4FCA60F08
 for <bitcoin-dev@lists.linuxfoundation.org>;
 Mon, 18 Dec 2023 22:44:03 +0000 (UTC)
DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org A4FCA60F08
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pm.me;
 s=protonmail3; t=1702939441; x=1703198641;
 bh=s0jhR0EzoSnDCaGeD/sNr13zY/ZfA4DpleoVJpKOJKY=;
 h=Date:To:From:Subject:Message-ID:In-Reply-To:References:
 Feedback-ID:From:To:Cc:Date:Subject:Reply-To:Feedback-ID:
 Message-ID:BIMI-Selector;
 b=mGk6zk6BdjzUmy0tc1VeiMHaOq+WD4XACUlBoJiK4/umc9bloTk2dMaP19Hd8X81K
 n0wGUhAT75zFk8IBjNHf8UXWoTmOwcAL4KUBFnirD8ihW+ClpaG9EsvXspHlbsgbNt
 /mLf/pWvqTlbX4qTTtSkDwYWhRlamZlK7ps5ccARlRKqQQ70ho3L9gzHoVsQtduCG3
 o3a1gJJ0QT5hlmgJZouCiPXEkDl1tknJ+XZpUoSygUmzVtdgLbOZ/jsscFVHEbYlNG
 QaBfL8rxQHqMbCJLnwp+rkLc8nmVYFmivgiDc1TQenR+QsgU3f3j/6lTAXbFAausZU
 tt1NWumkQbS5Q==
Date: Mon, 18 Dec 2023 22:43:48 +0000
To: Nagaev Boris <bnagaev@gmail.com>,
 Bitcoin Protocol Discussion <bitcoin-dev@lists.linuxfoundation.org>
From: yurisvb@pm.me
Message-ID: <1aHuuO-k0Qo7Bt2-Hu5qPFHXi4RgRASpf9hWshaypHtdN-N9jkubcvmf-aUcFEA6-7L9FNXoilIyydCs41eK4v67GVflEd9WIuEF9t5rE8w=@pm.me>
In-Reply-To: <CAFC_Vt7B1oV0_uAwKe3NQLWE2jdQ_MF1W4fnVqkf8s=YHyfVyQ@mail.gmail.com>
References: <nvbG12_Si7DVx9JbnnAvZbNdWk7hDQA23W1TXMkfYoU2iBA95Z1HzRnXgyiwFhDBmdi_rWL0dPllX1M9N9YZPDV47VgYADNd7CQA9CkAuX0=@pm.me>
 <CAFC_Vt5xqhuXjNVeSGE2Pn=0N0MuB6pOnREzGhSQSpk+hTUUSg@mail.gmail.com>
 <-lH1AcjRwuxfuqLPFOh_oga10Qm12fb7Se9imDeS5ft6CU3y8KTQa3tBP0twJJBFSHgj7FC8EIxvEser3oZdWvkeitRwERQl_cCdgAWtbTU=@pm.me>
 <CAFC_Vt7B1oV0_uAwKe3NQLWE2jdQ_MF1W4fnVqkf8s=YHyfVyQ@mail.gmail.com>
Feedback-ID: 15605746:user:proton
MIME-Version: 1.0
Content-Type: multipart/signed; protocol="application/pgp-signature";
 micalg=pgp-sha256;
 boundary="------b701f3bdd13ced714986bd6f94bf3f4db2563dbd8f4cb2758725eeef8fecdd6d";
 charset=utf-8
X-Mailman-Approved-At: Tue, 19 Dec 2023 02:21:17 +0000
Subject: [bitcoin-dev]  Lamport scheme (not signature) to economize on L1
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>, 
 <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>, 
 <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Mon, 18 Dec 2023 22:44:05 -0000

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------b701f3bdd13ced714986bd6f94bf3f4db2563dbd8f4cb2758725eeef8fecdd6d
Content-Type: multipart/mixed;boundary=---------------------621ec6e465cff0467f1a4463ed593878

-----------------------621ec6e465cff0467f1a4463ed593878
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;charset=utf-8

I beg to disagree: key owner broadcasts first bundle (let's call it this w=
ay) so that it is on any miner's best interest to include said bundle on t=
heir's attempted coinbase because they know if they don't any other compet=
ing miner will in the next block.

Once more I think it's worth mentioning the principle of weakest link: if =
cracking this Lamport chain within the stipulated few blocks time is harde=
r than the double-spending attack, by definition, it's (much!) more than h=
ard enough.

Consider a 12 bytes =3D 96 bits Lamport hash link (Less than half a Schnor=
r signature). Assume a cracking power of one order of magnitude higher tha=
n the current global hash rate of say 10^21 H/s. Already our assumption is=
 outrageously pessimistic for more that two reasons: 1) The whole premise =
of Bitcoin being secure is presumptive unfeasibility of that attack (weake=
st-link argument); 2) Memory-hard hashes, by definition, are ASIC-resistan=
t in the first place (so, being less efficient than ASICS, the CPUs necess=
ary to match that hashing power would be far *more* costly than today's to=
tal global mining hardware). In other words, we are giving away the hardne=
ss of the hash.

Let's assume a generous window of 1M seconds, so 10^27 hashes. Multiplying=
 that by log2(10), we have shy of 2^89 hashes (actually it's 2^ 'shy of 89=
', but again: erring on the side of safety). That divided by our 2^96 poss=
ible pre-images gives a probability of approximately 2^-6 < 0.02. This doe=
sn't sound very impressive, but an important thing to have in mind is that=
 this attack would destroy utility only of its specific victim (owner of t=
arget UTXO), unlikely the 50%+epsilon attack, in which the adversary may b=
lock whomever they want from ever having a transaction mined. Again, we ar=
e giving away over 11 days for good measure to safeguard against loss of c=
onnection.

More importantly, the economic viability of that attack: if your UTXO has =
less than ~50 times the cost of that operation, which we could lower bound=
 for, say, half of blocks rewards (again, generously assuming 100% ROI for=
 mining). Let's be generous once again disregard mining fees, which would =
give us (block reward)*(seconds)/((1+ROI)*(second per block)*(prob. succes=
s)) =3D 6.25*10^6 / (2*600*0.02)BTC ~ 260416 BTC.

So mine is an argument of economic viability: clearly adversary's economy =
of scale is positive, and it doesn't make sense to consider an adversary w=
ith more scale than that necessary for double spending. Even at that unrea=
listically large scale, however, and even assuming your adversary would ga=
in 1000 times more utility than what they make their victim loose, it woul=
d still be unworthy to conduct such attack to an UTXO of less than 1K BTC.

In retrospect, I'm beginning to think that 12 bytes is rather an overkill.

YSVB

Sent with Proton Mail secure email.

On Monday, December 18th, 2023 at 6:48 PM, Nagaev Boris <bnagaev@gmail.com=
> wrote:


> On Mon, Dec 18, 2023 at 2:22=E2=80=AFPM yurisvb@pm.me wrote:
> =


> > Most Wallets implement BIP39 with 12 words, which corresponds to 128 b=
its of entropy + 4 of checksum (so really only 128 bits).
> > =


> > 2 times that would get even to one Schnorr signature, as you say.
> > Going lower than 128 per hash is, IMO admissible under the same premis=
e of memory-hard hashes like Argon2, Scrypt, CryptoNight, Catena, Balloon =
Hashing, or Krypton8 (the latter of my authoring, a fully homomorphically =
encryptable memory-hard hash). You make hashing N times more time-costly u=
nder some conservative assumption and allow for the alleviation of log2(N)=
 bits from your key. It's widely adopted in passwords (Argon2, for instanc=
e, being the 2015 Password Hash Competition) since human memorization of p=
assword is a critical weak link in security and UX. BIP39 itself resorts t=
o PBKDF2 with 2048 iterations with the same goal, even though it's not mem=
ory-hard. But there is more:
> > =


> > By design, my proposed Lamport chain needs only to resist brute-force =
for a few blocks time, so key strength can be cheapened even further. Keep=
 in mind that before its first transaction, the public-key of an address i=
s not published, so the window of opportunity for brute-forcing a key with=
 lower strength really only opens upon the broadcasting of the transaction=
, and closes within a few blocks time.
> =


> =


> IIRC, miner M1 is the only party who verifies the ECC signature in the
> proposed protocol. If M1 is malicious, he can crack the short hash of
> an address in advance (spending as much time as needed). He should do
> it twice to know the next two hashes. Then mines the first transaction
> (in which he steals coins from the address) with the first hash and
> then publish the second hash a few blocks later to finalize the theft.
> =


> > YSVB
> > =


> > Sent with Proton Mail secure email.
> > =


> > On Monday, December 18th, 2023 at 5:45 PM, Nagaev Boris bnagaev@gmail.=
com wrote:
> > =


> > > Hey Yuri,
> > =


> > > On Mon, Dec 18, 2023 at 6:19=E2=80=AFAM Yuri S VB via bitcoin-dev
> > > bitcoin-dev@lists.linuxfoundation.org wrote:
> > =


> > > > down from 136 from ECC.
> > =


> > > Schnorr signature has size 64 bytes (serialized format consists of x
> > > coordinate of R and of s, 32 bytes each).
> > =


> > > > The whole point is that, in the typical use case in which pre-imag=
e of hash is, in fact, successfully broadcasted before maturity, commitmen=
t, the only ECC signature in this protocol is discarded, and only two Lamp=
ort hashes end up being buried at L1.
> > =


> > > Two SHA256 hashes are 64 bytes in total, the same as one schnorr sig=
nature.
> > =


> > > > To push economy even further, we could implement a memory-hard has=
h like Argon2 to do the same entropy-processing trade-off already utilized=
 for passwords, so we could have hashes of, say 12 bytes, making it 24 in =
total
> > =


> > > 12 bytes security for spending bitcoins is not enough, is it?
> > =


> > > --
> > > Best regards,
> > > Boris Nagaev
> =


> =


> =


> =


> --
> Best regards,
> Boris Nagaev
-----------------------621ec6e465cff0467f1a4463ed593878
Content-Type: application/pgp-keys; filename="publickey - yurisvb@pm.me - 0x535F445D.asc"; name="publickey - yurisvb@pm.me - 0x535F445D.asc"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="publickey - yurisvb@pm.me - 0x535F445D.asc"; name="publickey - yurisvb@pm.me - 0x535F445D.asc"

LS0tLS1CRUdJTiBQR1AgUFVCTElDIEtFWSBCTE9DSy0tLS0tCgp4c0JOQkYySmpSWUJDQUM1MXlo
K0s0MmF0c0V5MGdCTmgvaklXR1hzQnRFLzdJOGFuUmZkZTcvcWdHeXkKbEx4TXFZRE1OelUwN3c5
Z3VINllKRDdWdzNaUmxTVGVqNU9Hc2laOFJ2OUp4YXBYc0MxeDMrdHhOQkFQClYyVml1MVpsMnhK
Y29sTDkrem9SUmhmU25lVDVaZm1IQlpBSklKbmhOdU80ajhrRi9iNDRFaEZ3NkwvTgpGbE9rK1VC
SkVvS0FFQWttd09aWWpVTDd6MStRdzJBZkJIVGVwNFMzYmY4SmZMNDFOUVJsRnBSa3MrSkMKTjNa
c0ozZmZhNURjWjVqTGgyK2k5Mlg2eE8yVW5nM0hLYXhJYTVtbzB3cGVvQ1JQdUxNRjE2cjVQelJ4
CjJmNldzZVlUbWVmZWVYUGUzZEhyTTR4ai9ndHpBRGNxaFd6VVZLM21ZNTdPTXhVYjJ4MWdqZ1Z6
QUJFQgpBQUhOSFhsMWNtbHpkbUpBY0cwdWJXVWdQSGwxY21semRtSkFjRzB1YldVK3dzQjFCQkFC
Q0FBZkJRSmQKaVkwV0Jnc0pCd2dEQWdRVkNBb0NBeFlDQVFJWkFRSWJBd0llQVFBS0NSQXYzelY4
UzhOTVZkTkRCLzlRCnZRRlpZNkRzR3FMOTlkKzI2QjdHYmRCb0VjenUxL2NqTVpNdE9QeW9nSElF
eXllalR3R1RVN3ZYNEpWZQozRHZnbnd4U2xIYjQ2dDU2VGV3OU5rZ2V4MmFIb0hGRnJBd3MraTVa
ajdZN2lhL2l2RVozZE1KR3dNSUoKeVlQS08rdG1ockxNYWlSSFdnUnhtSG5mRnhUY1dFQ1dSZEk3
dDRJWFp3Rm9QN2Z3TVVVVXQrV3NTbzJSCnJhUVZEL3NTL2F2TlF5T2h6YTlLcVBQNjBZY3B2RUtj
UXArL2hyTjRRcFhVSkxiaDFZMVlqeUhlbDhnQgpRa3p2QzUwUjVxTzRlY2xxSy9FMEhESnlDWmZN
TThkV2o0REJrTWN2SzlsYjB5b3ZRMDFFTXp1NkU1NEcKYjZ0VFp1bktQTVpVd1J1SW5FY0hHMjV0
azdWUEM4clJTU0hqeDhTT3pzQk5CRjJKalJZQkNBQ3RiUWdNCldRSnMvTVdZbDR2THRLSlhYbFlS
T2h1YkVWbjRjTFdZSmVFWHpzSllCQWRlNWh0QlEzc212UjJ2NnVJegptejJpaXFsSkVVdmYwY2xM
WS9QVExoSGVTbWE5VTRodzRaRDNZKzV6WWxINURza2l1N3lLZTdIVmpEVmkKd1FJN25acWRvanJs
dDhCZENiOVNMaXRNaFRvR1crS2E1VCtUOWNmbWthMk1qa3pRSFBNTEJtdVJ6a2V2ClBkZFF6M0xB
MjMzZDNHREVTZklCYy91OC9YelBUNkZTZ3MzSEh4OEFJbFdQbEJaYmh6WmpQNlRLclRNRQpOSEtK
cmxTRlZKclErL25QU28ya0VSL0VDczF0aUJEY0JkamVPYWx6LzdRVWN0Rnp3NGdjS0RtMGpUeEkK
cVhWVlV3a2tuRkM4NDZMTjNBT2p0UWRyOVV3czVsTzhkeXBGQUJFQkFBSEN3RjhFR0FFSUFBa0ZB
bDJKCmpSWUNHd3dBQ2drUUw5ODFmRXZEVEZXS2VBZ0FxRXN1QXJMZFprYXBvZDI3K2hpcHZZNUcr
eVRLQW1NMApIVlhmQzJiMVdtNXQwQXhOVXVkMlJ1OTE1MHA3V09CRXpXYkxnNXdzOTc1M296dlZi
cFpIQU9uVGZOeXoKUUR5QWhmZ1hNQjIvdzRERXEwT2tlQVBRNXhsQWtISDZpUW1hSkZiYy9FRjRX
ZWZWeE92MnNRNDlRNks5Ci9Bb1FROG54RVh1RzRidXVrclEwTGVlTVAzNEdMWUhYK2JvWENHQmxI
MGhiZm5kc3VQbEdqYnBnWVErdQplclJGTlB4N1JtSWtnQjJ0WmhwZkZ3VGtid1c2TVFmWDM5Z3F1
SitwVEVKUnA5UmpJVjFZU2txSjZJUkgKQkc4eFBocGgzT3huaWJyWkdlbGdtakpNM2QwM1k5OSs3
OXBvdTRlY09BeWYyTHMrMVVTY2NDTzA2YnI4CldlcjJ3cmI0WXc9PQo9aHJheAotLS0tLUVORCBQ
R1AgUFVCTElDIEtFWSBCTE9DSy0tLS0tCg==
-----------------------621ec6e465cff0467f1a4463ed593878--

--------b701f3bdd13ced714986bd6f94bf3f4db2563dbd8f4cb2758725eeef8fecdd6d
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: ProtonMail

wsBzBAEBCAAnBYJlgMsQCZAv3zV8S8NMVRYhBFNfRF3t6Z4/pmFJQy/fNXxL
w0xVAAD/TAf+LEBLLfUxDy5yiw7jSBCLxNfrCXzyqUVs820hV0u6m7hGAGpN
1zWRVKWRqn81dzmv8xj0qcY/P8P3t2GlRb36jZSG9CzG5Au+Kt8zhZIdI5xf
6AtxlIFLMC8bCk5JIekfkwcjDQvwb7QrCQtdtB7Y5JGKkV89zbEfBih+Me0m
wXUe/FE9zaZyQvy0C+/C8DJm2MwCB4uUci9szv0ab+lsF6m9vHLWQPcuJ8xH
be51xA94Q5YN/UhDEAbQz0GkFiWij+mheWb8YyHcCVghN5JwK4JxOYNgfyJb
iaTFhjxaHxL91aER7zwRYzyJznOeoXAab7/WlPkfxPewHUHTwnQyBA==
=YBXU
-----END PGP SIGNATURE-----


--------b701f3bdd13ced714986bd6f94bf3f4db2563dbd8f4cb2758725eeef8fecdd6d--