summaryrefslogtreecommitdiff
path: root/97/317434fe7db5d0d4ca27e114477d14210e6bd8
blob: 5922164a5deca6da4ceaadd96ce0666a74ba0474 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
Return-Path: <akaramaoun@gmail.com>
Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org
	[172.17.192.35])
	by mail.linuxfoundation.org (Postfix) with ESMTPS id 1FC48BEB
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Thu, 22 Dec 2016 18:29:10 +0000 (UTC)
X-Greylist: whitelisted by SQLgrey-1.7.6
Received: from mail-wm0-f48.google.com (mail-wm0-f48.google.com [74.125.82.48])
	by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 88C902A2
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Thu, 22 Dec 2016 18:29:09 +0000 (UTC)
Received: by mail-wm0-f48.google.com with SMTP id t79so193705447wmt.0
	for <bitcoin-dev@lists.linuxfoundation.org>;
	Thu, 22 Dec 2016 10:29:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
	h=mime-version:sender:from:date:message-id:subject:to;
	bh=vGJwk7vk7Q3k7uR8u6Z6HxgvsN4DnhPo+NOEvWaRp8A=;
	b=EcXVfNNcfn6TojbO9qv2bjJdHVDfbP28cZcSdGFSkP9/P7bn2uyE7e7rrCpBymXG+v
	1kP22xeNq/asy4L2xiov5wiIqxwMtEZ8Zxgc5Udvm5G3n+IQAMDUNIW8VHjUdnBoGUzd
	EDGIB/2ehd0Eg8ZnBDyNIks3RuJXciPML8vmY2K6p58gnN+8CzIqWa5UzNiVllG4TCiw
	oQJtYu5Zei7oOg/tFGAir7uxB+Cb8uycpKagaAyxEHWTHXGd0IgJGVrczb9ZwGC+RbM/
	ClkZ85Debp69BfjN1dp4hVLDrlvaqhUw5jHrleHJrfIPgHDsHyKNvjrYqSpvu26a9DOA
	jEuw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
	d=1e100.net; s=20161025;
	h=x-gm-message-state:mime-version:sender:from:date:message-id:subject
	:to; bh=vGJwk7vk7Q3k7uR8u6Z6HxgvsN4DnhPo+NOEvWaRp8A=;
	b=lKF0Xp4YMF9F1DhRJ+/Ca+MRdbmzFoBibKCMRP8399UbkVGZD5EaNkp2bJOqTQ7Fdd
	9bkmwGjNmo1kgJzBMuahWd06KwhAVN/UGoktL5o3vTQL1BRDM1evdIXTCrkNlkw4qcTX
	yHxvpsVGq/BRZpVvyoFaYcQavKGOy4uVs6eLRLEGMSZhwm5vrU3sK4DQY+NOUk58Nx7q
	RXuxBPUx05zlkn4vmoPRkWVR+3iLgjW3BdVqn+xOOf0bXx3ArBVJRtiQhGVl2bCxGOMg
	C1GMPmJZWvyuJ/NG/fcocubvt0mWegZQ3q34/ATMHZ2urVH2TuKAoCLm6on3p/uB4ex1
	Et0g==
X-Gm-Message-State: AIkVDXJY6tgsYUSa/l/I+peWeGyXrEef7R3EGtariYbmHjRHMpzXn8RZjkmNVvumRvTyFhxFa9R16RKiumK7Sw==
X-Received: by 10.28.9.80 with SMTP id 77mr10952961wmj.68.1482431347988; Thu,
	22 Dec 2016 10:29:07 -0800 (PST)
MIME-Version: 1.0
Sender: akaramaoun@gmail.com
Received: by 10.28.186.132 with HTTP; Thu, 22 Dec 2016 10:29:07 -0800 (PST)
From: Andrew <onelineproof@gmail.com>
Date: Thu, 22 Dec 2016 18:29:07 +0000
X-Google-Sender-Auth: -zOJdmOBathGILaXhOj4OVELXSc
Message-ID: <CAL8tG=n6NnTaeV71-sWi3Bvk_8E8F20_69f90k-Shrc4XXUQog@mail.gmail.com>
To: Bitcoin Dev <bitcoin-dev@lists.linuxfoundation.org>
Content-Type: text/plain; charset=UTF-8
X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIM_SIGNED,
	DKIM_VALID, DKIM_VALID_AU, FREEMAIL_FROM,
	RCVD_IN_DNSWL_NONE autolearn=ham version=3.3.1
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
	smtp1.linux-foundation.org
X-Mailman-Approved-At: Thu, 22 Dec 2016 18:30:25 +0000
Subject: [bitcoin-dev] Multisig with hashes instead of pubkeys
X-BeenThere: bitcoin-dev@lists.linuxfoundation.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Bitcoin Protocol Discussion <bitcoin-dev.lists.linuxfoundation.org>
List-Unsubscribe: <https://lists.linuxfoundation.org/mailman/options/bitcoin-dev>,
	<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=unsubscribe>
List-Archive: <http://lists.linuxfoundation.org/pipermail/bitcoin-dev/>
List-Post: <mailto:bitcoin-dev@lists.linuxfoundation.org>
List-Help: <mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=help>
List-Subscribe: <https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev>,
	<mailto:bitcoin-dev-request@lists.linuxfoundation.org?subject=subscribe>
X-List-Received-Date: Thu, 22 Dec 2016 18:29:10 -0000

Hi

Is there a worked out scriptPubKey for doing multisig with just hashes
of the participants? I think it is doable and it is more secure to a
compromised ECDSA. I'm thinking something like this for the
scriptPubKey:
 2 OP_SWAP OP_SWAP OP_SWAP OP_DUP OP_HASH160 <pubKeyHash1>
OP_EQUALVERIFY OP_DUP OP_HASH160 <pubKeyHash2> OP_EQUALVERIFY OP_DUP
OP_HASH160 <pubKeyHash3> OP_EQUALVERIFY 3 OP_CHECKMULTISIG

and <sigs><pubkeys> for the scriptSig

Can anyone confirm or send me a link to the worked out script?

Thanks

-- 
PGP: B6AC 822C 451D 6304 6A28  49E9 7DB7 011C D53B 5647