Jeremy [ARCHIVE] on Nostr: 📅 Original date posted:2021-07-12 📝 Original message: Another option would be ...
📅 Original date posted:2021-07-12
📝 Original message:
Another option would be to somehow encrypt this data in, say, an OP_RETURN
for any update transaction for each participant (perhaps worth breaking
update symmetry for efficiency on this...) that way if an update ever
happens on a state you don't have you can use your static key to decrypt
the relevant data for what PK_si signed off on.
--
@JeremyRubin <
https://twitter.com/JeremyRubin>
<
https://twitter.com/JeremyRubin>
On Mon, Jul 12, 2021 at 3:16 PM Jeremy <jlrubin at mit.edu> wrote:
> Without an exact implementation, one thing you could do to fix the lost
> state issue would be to make the scripts something like:
>
> [`<N+1> CLTV DROP PKu CHECKSIGVERIFY GETLOCKTIME <PK_root>
> BIP32DERIVE CHECKTRANSACTIONSIGNEDFROMSTACK`, `2016 CSV DROP PK_si
> CHECKSIG`]
>
> In order to upgrade to state M>= N+1 you'd have to publish a transaction
> signed with the BIP32 derived key for that update in the future.
>
> The downside is that you end up double publishing the txdata on the chain,
> but it at least ensure data availability.
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <
http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20210712/54e583d7/attachment.html>
Published at
2023-06-09 13:03:09Event JSON
{
"id": "2ab110c75fa8e93ba744314c42f5cc5f7a99ebf8ca86620383c2f64530e37c85",
"pubkey": "01f53a3166b3b23139201763777e070fcfed5555ad7555f7e90114c0c9e0e8b4",
"created_at": 1686315789,
"kind": 1,
"tags": [
[
"e",
"8a0e1cf8bfd207b00d21258bc21868551465e91d678978834dc2fb7ceb2cdcbd",
"",
"root"
],
[
"e",
"eafe3892a258f158af7351224d8f89f64d0cbfcf087464f2b3372c12a194fbad",
"",
"reply"
],
[
"p",
"01f53a3166b3b23139201763777e070fcfed5555ad7555f7e90114c0c9e0e8b4"
]
],
"content": "📅 Original date posted:2021-07-12\n📝 Original message:\nAnother option would be to somehow encrypt this data in, say, an OP_RETURN\nfor any update transaction for each participant (perhaps worth breaking\nupdate symmetry for efficiency on this...) that way if an update ever\nhappens on a state you don't have you can use your static key to decrypt\nthe relevant data for what PK_si signed off on.\n\n\n--\n@JeremyRubin \u003chttps://twitter.com/JeremyRubin\u003e\n\u003chttps://twitter.com/JeremyRubin\u003e\n\n\nOn Mon, Jul 12, 2021 at 3:16 PM Jeremy \u003cjlrubin at mit.edu\u003e wrote:\n\n\u003e Without an exact implementation, one thing you could do to fix the lost\n\u003e state issue would be to make the scripts something like:\n\u003e\n\u003e [`\u003cN+1\u003e CLTV DROP PKu CHECKSIGVERIFY GETLOCKTIME \u003cPK_root\u003e\n\u003e BIP32DERIVE CHECKTRANSACTIONSIGNEDFROMSTACK`, `2016 CSV DROP PK_si\n\u003e CHECKSIG`]\n\u003e\n\u003e In order to upgrade to state M\u003e= N+1 you'd have to publish a transaction\n\u003e signed with the BIP32 derived key for that update in the future.\n\u003e\n\u003e The downside is that you end up double publishing the txdata on the chain,\n\u003e but it at least ensure data availability.\n\u003e\n-------------- next part --------------\nAn HTML attachment was scrubbed...\nURL: \u003chttp://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20210712/54e583d7/attachment.html\u003e",
"sig": "4617fec8db0b5fd6c3f1096bb1fec698a6aaeb10134ca856577dc1aac3cb9baeb76cf02ad0a57c353a466a72edce943262b627846c2b72707938940f49be171a"
}