ZmnSCPxj [ARCHIVE] on Nostr: š
Original date posted:2023-09-12 šļø Summary of this message: The actuary's ...
š
Original date posted:2023-09-12
šļø Summary of this message: The actuary's signature in a contract can be protected by using a specific 'R' value to prevent private key leakage. Loose interactivity is assumed, but there are still concerns about the actuary slashing the bond or participants not cooperating.
š Original message:
Good morning Antoine,
> Hi Zeeman
>
> > What we can do is to add the actuary to the contract that
> > controls the funds, but with the condition that the
> > actuary signature has a specific `R`.
>
> > As we know, `R` reuse --- creating a new signature for a
> > different message but the same `R` --- will leak the
> > private key.
>
> > The actuary can be forced to put up an onchain bond.
> > The bond can be spent using the private key of the actuary.
> > If the actuary signs a transaction once, with a fixed `R`,
> > then its private key is still safe.
>
> > However, if the actuary signs one transaction that spends
> > some transaction output, and then signs a different
> > transaction that spends the same transaction output, both
> > signatures need to use the same fixed `R`.
> > Because of the `R` reuse, this lets anyone who expected
> > one transaction to be confirmed, but finds that the other
> > one was confirmed, to derive the secret key of the
> > actuary from the two signatures, and then slash the bond
> > of the actuary.
>
> From my understanding, if an off-chain state N1 with a negotiated group of 40 is halted in the middle of the actuary's R reveals due to the 40th participant non-interactivity, there is no guarantee than a new off-chain state N1' with a new negotiated group of 39 (from which evicted 40th's output is absent) do not re-use R reveals on N1. So for the actuary bond security, I think the R reveal should only happen once all the group participants have revealed their own signature. It sounds like some loose interactivity is still assumed, i.e all the non-actuary participants must be online at the same time, and lack of contribution is to blame as you have a "flat" off-chain construction (i.e no layering of the promised off-chain outputs in subgroups to lower novation interactivity).
Yes, there is some loose interactivity assumed.
However:
* The actuary is always online and can gather signatures for the next state in parallel with signing new transactions on top of the next state.
* This is why `SIGHASH_ANYPREVOUT` is needed, as the transactions on top of the next state might spend either the actual next state (if the next state is successfully signed), or the current state plus additional transactions (i.e. the transaction that move from current state to next state) (if the next state fails to get fully signed and the participants decide to give up on the next state getting signed).
> More fundamentally, I think this actuarial system does not solve the "multi-party off-chain state correction" problem as there is no guarantee that the actuary does not slash the bond itself. And if the bond is guarded by users' pubkeys, there is no guarantee that the user will cooperate after the actuary equivocation is committed to sign a "fair" slashing transaction.
Indeed.
One can consider that the participants other than the actuary would generate a single public key known by the participants.
But then only one sockpuppet of the actuary is needed to add to the participant set.
Basically, the big issue is that the actuary needs to bond a significant amount of funds to each participant, and that bond is not part of the funding of the construction.
Other ways of ensuring single-use can be replaced, if that is possible.
Do you know of any?
Regards,
ZmnSCPxj
Published at
2023-09-19 10:29:43Event JSON
{
"id": "cf069585f8046967099ad11102ef8d8d6c8b0df7c80b421ceb6a4231b707bd51",
"pubkey": "4505072744a9d3e490af9262bfe38e6ee5338a77177b565b6b37730b63a7b861",
"created_at": 1695119383,
"kind": 1,
"tags": [
[
"e",
"01309a5021c6a93034d69f1f064146a4573d3b77d13565af34dc1a5aeb188b90",
"",
"root"
],
[
"e",
"6e25398c7c3e1425024a28bef6df388508eeda3d3eeb4da62d6715049cc531dd",
"",
"reply"
],
[
"p",
"6485bc56963b51c9043d0855cca9f78fcbd0ce135a195c3f969e18ca54a0d551"
]
],
"content": "š
Original date posted:2023-09-12\nšļø Summary of this message: The actuary's signature in a contract can be protected by using a specific 'R' value to prevent private key leakage. Loose interactivity is assumed, but there are still concerns about the actuary slashing the bond or participants not cooperating.\nš Original message:\nGood morning Antoine,\n\n\n\u003e Hi Zeeman\n\u003e \n\u003e \u003e What we can do is to add the actuary to the contract that\n\u003e \u003e controls the funds, but with the condition that the\n\u003e \u003e actuary signature has a specific `R`.\n\u003e \n\u003e \u003e As we know, `R` reuse --- creating a new signature for a\n\u003e \u003e different message but the same `R` --- will leak the\n\u003e \u003e private key.\n\u003e \n\u003e \u003e The actuary can be forced to put up an onchain bond.\n\u003e \u003e The bond can be spent using the private key of the actuary.\n\u003e \u003e If the actuary signs a transaction once, with a fixed `R`,\n\u003e \u003e then its private key is still safe.\n\u003e \n\u003e \u003e However, if the actuary signs one transaction that spends\n\u003e \u003e some transaction output, and then signs a different\n\u003e \u003e transaction that spends the same transaction output, both\n\u003e \u003e signatures need to use the same fixed `R`.\n\u003e \u003e Because of the `R` reuse, this lets anyone who expected\n\u003e \u003e one transaction to be confirmed, but finds that the other\n\u003e \u003e one was confirmed, to derive the secret key of the\n\u003e \u003e actuary from the two signatures, and then slash the bond\n\u003e \u003e of the actuary.\n\u003e \n\u003e From my understanding, if an off-chain state N1 with a negotiated group of 40 is halted in the middle of the actuary's R reveals due to the 40th participant non-interactivity, there is no guarantee than a new off-chain state N1' with a new negotiated group of 39 (from which evicted 40th's output is absent) do not re-use R reveals on N1. So for the actuary bond security, I think the R reveal should only happen once all the group participants have revealed their own signature. It sounds like some loose interactivity is still assumed, i.e all the non-actuary participants must be online at the same time, and lack of contribution is to blame as you have a \"flat\" off-chain construction (i.e no layering of the promised off-chain outputs in subgroups to lower novation interactivity).\n\nYes, there is some loose interactivity assumed.\n\nHowever:\n\n* The actuary is always online and can gather signatures for the next state in parallel with signing new transactions on top of the next state.\n * This is why `SIGHASH_ANYPREVOUT` is needed, as the transactions on top of the next state might spend either the actual next state (if the next state is successfully signed), or the current state plus additional transactions (i.e. the transaction that move from current state to next state) (if the next state fails to get fully signed and the participants decide to give up on the next state getting signed).\n\n\u003e More fundamentally, I think this actuarial system does not solve the \"multi-party off-chain state correction\" problem as there is no guarantee that the actuary does not slash the bond itself. And if the bond is guarded by users' pubkeys, there is no guarantee that the user will cooperate after the actuary equivocation is committed to sign a \"fair\" slashing transaction.\n\nIndeed.\n\nOne can consider that the participants other than the actuary would generate a single public key known by the participants.\nBut then only one sockpuppet of the actuary is needed to add to the participant set.\n\nBasically, the big issue is that the actuary needs to bond a significant amount of funds to each participant, and that bond is not part of the funding of the construction.\n\nOther ways of ensuring single-use can be replaced, if that is possible.\nDo you know of any?\n\nRegards,\nZmnSCPxj",
"sig": "654edaa336e2d69070f820d9ab229696fc5974f047a2121d543dfdb750b965f9a540536073cd80b12d1838e17ed5695ddc19000ff960e76ec3ec0540091d23e7"
}