SlideShare a Scribd company logo
Scriptless Scripts With Mimblewimble
Andrew Poelstra
Research Director, Blockstream
grincon@wpsoftware.net
January 28, 2018
1 / 17
Mimblewimble and Scriptless Scripts
Mimblewimble, proposed in 2016 by Tom Elvis Jedusor
No scripts, only signatures.
“What script support is possible? We would need to translate
script operations into some sort of discrete logarithm
information.”
2 / 17
Kernels in Mimblewimble
Bitcoin (and Ethereum, etc.) uses a scripting language to
describe smart contracts and enforce their execution.
These scripts must be downloaded, parsed, validated by all full
nodes on the network. Can’t be compressed or aggregated.
The details of the script are visible forever, compromising
privacy and fungibility.
With scriptless scripts, the only visible things are public keys
(i.e. uniformly random curvepoints) and digital signatures.
3 / 17
Kernels in Mimblewimble
4 / 17
Kernels in Mimblewimble
5 / 17
Kernels in Mimblewimble
6 / 17
Kernels in Mimblewimble
7 / 17
Kernels in Mimblewimble
8 / 17
Adaptor Signatures
In a Schnorr multisignature, parties first exchange “public
nonces” then exchange “partial signatures”.
Partial signatures are objects that, when added to other
partial signatures, produce total signatures. This property is
publicly verifiable.
Given a secret t and commitment T = tG, you can offset
partial signatures by t. The offset signature and T together
are an adaptor signature.
With an adaptor signature, if you learn the partial signature
you’ll also learn t, and vice-versa.
9 / 17
Example: Atomic (Cross-chain) Swaps
Suppose Alice wants to trade 10 A-coins for 5 of Bob’s
B-coins.
On their respective chains, each moves the coins to outputs
that can only be spent by a 2-of-2 multisignature with both
Alice and Bob.
They do sign the multisignature protocols in parallel, except
that in both cases Bob gives Alice adaptor signatures using a
commitment T to a secret value t.
Bob replaces one of the signatures (s, R) with (s + t, R) and
publishes it, to take his coins. Alice sees this, learns t, then
does the same thing on the other chain to take her coins.
10 / 17
Features of Adaptor Signatures
By attaching auxiliary proofs to T to ensure t is some
necessary data for a separate protocol, arbitrary steps of
arbitrary protocols can be made equivalent to signature
production.
In particular, by using the same T in multiple adaptor
signatures it is possible to make arbitrary sets of signatures
atomic with other arbitrary sets, enabling multi-hop payment
channels.
You can re-blind commitments between hops while retaining
the atomicity, for improved privacy.
11 / 17
Features of Adaptor Signatures
After a signature hits the chain, anyone can make up a
commitment T and compute a corresponding “adaptor
signature” for it, so such schemes are deniable.
Unlike hash-preimages, the secret t is revealed only to a party
in possession of an adaptor signature, who can efficiently
prove knowledge of it. This gives a transferrable proof that a
protocol (e.g. a Lightning invoice) was completed correctly.
Existing multisignature outputs can be used with adaptor
signatures, no need to precommit to a specific protocol.
12 / 17
Limits of Adaptor Signatures
Seem to really only be useful for 2-signer protocols. This
includes 2-of-3 signatures.
Depends on publication of complete signatures; seems
incompatible with noninteractive signature aggregation or
BLS.
No clear way to do timelocks.
13 / 17
Interlude: Witness Encryption
If one party has a secret they want to associate to an adaptor
signature, they can encrypt this with t and provide a
zero-knowledge proof that the encryption has t as a key and
the secret is well-formed. (“Zero-Knowledge Contingent
Payments”, Maxwell 2011).
But what if the party wants to encrypt to a secret they don’t
know? For example, a third party’s signature (c.f. Discreet
Log Contracts, Dryja 2017) or a future Bitcoin block?
In 2013 we called general zk proofs “moon math”. Today we
use this term for witness encryption (Garg, Gentry, Sahai,
Waters 2013).
14 / 17
Timelocks in Mimblewimble
Absolute timelocks can be added to Mimblewimble by having
kernels sign a minimum blockheight before which they may
not be included in the blockchain.
Relative timelocks are much harder, because kernel signatures
are independent of transaction outputs, and transacton
outputs are not even guaranteed to be visible to verifiers.
Idea (Somsen, Friedenbach 2016, personal communication):
let kernels reference other kernels, use them as “timelock
references”.
Drawbacks: requires users plant extra kernels in the
blockchain; requires validators maintain an index of kernels.
15 / 17
Open Problems
Timelocks!!
Scriptless scripts with BLS.
Multiparty (3+ parties) scriptless scripts
Standards & Interoperability
16 / 17
Thank You
Andrew Poelstra <grincon@wpsoftware.net>
17 / 17

More Related Content

What's hot

Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
ppd1961
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
Shafiqah Emilia
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
Shahbaz Anjam
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
Hemin Essa
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
Mike Gates
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
Pratik Poddar
 
Cryptography
CryptographyCryptography
Cryptography
prasham95
 
Cryptography
CryptographyCryptography
Cryptography
Kushagro Dhar
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
Gokul Alex
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
Somaditya Basak
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
prasenjeetd
 
Cryptography
CryptographyCryptography
Cryptography
EmaSushan
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
Rashmi Burugupalli
 
Cryptography
CryptographyCryptography
Cryptography
KARNAN L S
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
Tata Consultancy Services
 
Introduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and IIIIntroduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and III
Maksim Djackov
 
Encryption
EncryptionEncryption
Encryption
Mahmoud Abdeen
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
MdFazleRabbi18
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
EC-Council
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 

What's hot (20)

Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
Transposition Chiper (Grid)
Transposition Chiper (Grid) Transposition Chiper (Grid)
Transposition Chiper (Grid)
 
Cryptanalysis and Attacks
Cryptanalysis and AttacksCryptanalysis and Attacks
Cryptanalysis and Attacks
 
Lecture 11
Lecture 11Lecture 11
Lecture 11
 
Introduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key InfrastructureIntroduction to Cryptography and the Public Key Infrastructure
Introduction to Cryptography and the Public Key Infrastructure
 
What is Cryptography?
What is Cryptography?What is Cryptography?
What is Cryptography?
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
A Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic ConceptsA Concise Introduction to Cryptographic Concepts
A Concise Introduction to Cryptographic Concepts
 
Cryptography (Revised Edition)
Cryptography (Revised Edition)Cryptography (Revised Edition)
Cryptography (Revised Edition)
 
Cryptography - A Brief History
Cryptography - A Brief HistoryCryptography - A Brief History
Cryptography - A Brief History
 
Cryptography
CryptographyCryptography
Cryptography
 
basic encryption and decryption
 basic encryption and decryption basic encryption and decryption
basic encryption and decryption
 
Cryptography
CryptographyCryptography
Cryptography
 
Elementry Cryptography
Elementry CryptographyElementry Cryptography
Elementry Cryptography
 
Introduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and IIIIntroduction to Cryptography Parts II and III
Introduction to Cryptography Parts II and III
 
Encryption
EncryptionEncryption
Encryption
 
Topic1 substitution transposition-techniques
Topic1 substitution transposition-techniquesTopic1 substitution transposition-techniques
Topic1 substitution transposition-techniques
 
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
TakeDownCon Rocket City: Cryptanalysis by Chuck Easttom
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 

Similar to Grincon U.S. 2019 Scriptless Scripts

IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET Journal
 
Zero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdfZero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdf
Konrad Kokosa
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
IOSR Journals
 
E017212836
E017212836E017212836
E017212836
IOSR Journals
 
Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...
Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...
Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...
Destry Saul
 
N33066069
N33066069N33066069
N33066069
IJERA Editor
 
Stefano Maestri - Blockchain and smart contracts, what they are and why you s...
Stefano Maestri - Blockchain and smart contracts, what they are and why you s...Stefano Maestri - Blockchain and smart contracts, what they are and why you s...
Stefano Maestri - Blockchain and smart contracts, what they are and why you s...
Codemotion
 
Slavisa web stories
Slavisa web storiesSlavisa web stories
Slavisa web stories
Slaviša Krstić
 
آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)
price act
 
Blockchain Experiments 1-11.pptx
Blockchain Experiments 1-11.pptxBlockchain Experiments 1-11.pptx
Blockchain Experiments 1-11.pptx
saiproject
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
mydrynan
 
Smart contract honeypots for profit (and fun) - bha
Smart contract honeypots for profit (and fun)  - bhaSmart contract honeypots for profit (and fun)  - bha
Smart contract honeypots for profit (and fun) - bha
PolySwarm
 
Python, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size ChangePython, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size Change
Portia Burton
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
Soham Kansodaria
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
AFRINIC
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
SecurityTube.Net
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the Banker
Bohdan Szymanik
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
Pavithra Muthu
 
Etherparty Pitch Dek
Etherparty Pitch DekEtherparty Pitch Dek
Etherparty Pitch Dek
craze3
 

Similar to Grincon U.S. 2019 Scriptless Scripts (20)

IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
IRJET- A Review on Implementation Techniques of Blockchain Enabled Smart Cont...
 
Zero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdfZero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdf
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 
E017212836
E017212836E017212836
E017212836
 
Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...
Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...
Tucson Blockchain Developers Meetup - Sept 27 - Signed messages in ethereum p...
 
N33066069
N33066069N33066069
N33066069
 
Stefano Maestri - Blockchain and smart contracts, what they are and why you s...
Stefano Maestri - Blockchain and smart contracts, what they are and why you s...Stefano Maestri - Blockchain and smart contracts, what they are and why you s...
Stefano Maestri - Blockchain and smart contracts, what they are and why you s...
 
Slavisa web stories
Slavisa web storiesSlavisa web stories
Slavisa web stories
 
آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)آموزش پرایس اکشن (price action)
آموزش پرایس اکشن (price action)
 
Blockchain Experiments 1-11.pptx
Blockchain Experiments 1-11.pptxBlockchain Experiments 1-11.pptx
Blockchain Experiments 1-11.pptx
 
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docxCryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
Cryptographic Tunneling and the OSI ModelWrite a paper consisting .docx
 
Smart contract honeypots for profit (and fun) - bha
Smart contract honeypots for profit (and fun)  - bhaSmart contract honeypots for profit (and fun)  - bha
Smart contract honeypots for profit (and fun) - bha
 
Python, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size ChangePython, Blockchain, and Byte-Size Change
Python, Blockchain, and Byte-Size Change
 
Digital signature(Cryptography)
Digital signature(Cryptography)Digital signature(Cryptography)
Digital signature(Cryptography)
 
Dnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defsDnssec tutorial-crypto-defs
Dnssec tutorial-crypto-defs
 
Cryptography Lecture by Sam Bowne
Cryptography Lecture by Sam BowneCryptography Lecture by Sam Bowne
Cryptography Lecture by Sam Bowne
 
BlockChain for the Banker
BlockChain for the BankerBlockChain for the Banker
BlockChain for the Banker
 
POST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHYPOST-QUANTUM CRYPTOGRAPHY
POST-QUANTUM CRYPTOGRAPHY
 
Etherparty Pitch Dek
Etherparty Pitch DekEtherparty Pitch Dek
Etherparty Pitch Dek
 

More from Karen Hsu

Grincon U.S. 2019 Lightning Round
Grincon U.S. 2019 Lightning RoundGrincon U.S. 2019 Lightning Round
Grincon U.S. 2019 Lightning Round
Karen Hsu
 
Grincon U.S. 2019 How to Mine Grin
Grincon U.S. 2019 How to Mine GrinGrincon U.S. 2019 How to Mine Grin
Grincon U.S. 2019 How to Mine Grin
Karen Hsu
 
Grincon U.S. 2019 The Future of Grin
Grincon U.S. 2019 The Future of GrinGrincon U.S. 2019 The Future of Grin
Grincon U.S. 2019 The Future of Grin
Karen Hsu
 
Grincon U.S. 2019 Introduction
Grincon U.S. 2019 IntroductionGrincon U.S. 2019 Introduction
Grincon U.S. 2019 Introduction
Karen Hsu
 
Grincon U.S. 2019 Proof of Work
Grincon U.S. 2019 Proof of WorkGrincon U.S. 2019 Proof of Work
Grincon U.S. 2019 Proof of Work
Karen Hsu
 
Grincon U.S. 2019 RSA Accumulators
Grincon U.S. 2019 RSA AccumulatorsGrincon U.S. 2019 RSA Accumulators
Grincon U.S. 2019 RSA Accumulators
Karen Hsu
 
Grincon U.S. 2019 Security concerns in mining
Grincon U.S. 2019 Security concerns in miningGrincon U.S. 2019 Security concerns in mining
Grincon U.S. 2019 Security concerns in mining
Karen Hsu
 
Grincon U.S. 2019 Grin Privacy and Scaling
Grincon U.S. 2019 Grin Privacy and ScalingGrincon U.S. 2019 Grin Privacy and Scaling
Grincon U.S. 2019 Grin Privacy and Scaling
Karen Hsu
 
Grincon U.S. 2019 Grin Security Audit Results
Grincon U.S. 2019 Grin Security Audit ResultsGrincon U.S. 2019 Grin Security Audit Results
Grincon U.S. 2019 Grin Security Audit Results
Karen Hsu
 
Grincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & Governance
Grincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & GovernanceGrincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & Governance
Grincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & Governance
Karen Hsu
 
Faster Payments on the Blockchain
Faster Payments on the BlockchainFaster Payments on the Blockchain
Faster Payments on the Blockchain
Karen Hsu
 
Test Data Management for healthcare
Test Data Management for healthcareTest Data Management for healthcare
Test Data Management for healthcare
Karen Hsu
 

More from Karen Hsu (12)

Grincon U.S. 2019 Lightning Round
Grincon U.S. 2019 Lightning RoundGrincon U.S. 2019 Lightning Round
Grincon U.S. 2019 Lightning Round
 
Grincon U.S. 2019 How to Mine Grin
Grincon U.S. 2019 How to Mine GrinGrincon U.S. 2019 How to Mine Grin
Grincon U.S. 2019 How to Mine Grin
 
Grincon U.S. 2019 The Future of Grin
Grincon U.S. 2019 The Future of GrinGrincon U.S. 2019 The Future of Grin
Grincon U.S. 2019 The Future of Grin
 
Grincon U.S. 2019 Introduction
Grincon U.S. 2019 IntroductionGrincon U.S. 2019 Introduction
Grincon U.S. 2019 Introduction
 
Grincon U.S. 2019 Proof of Work
Grincon U.S. 2019 Proof of WorkGrincon U.S. 2019 Proof of Work
Grincon U.S. 2019 Proof of Work
 
Grincon U.S. 2019 RSA Accumulators
Grincon U.S. 2019 RSA AccumulatorsGrincon U.S. 2019 RSA Accumulators
Grincon U.S. 2019 RSA Accumulators
 
Grincon U.S. 2019 Security concerns in mining
Grincon U.S. 2019 Security concerns in miningGrincon U.S. 2019 Security concerns in mining
Grincon U.S. 2019 Security concerns in mining
 
Grincon U.S. 2019 Grin Privacy and Scaling
Grincon U.S. 2019 Grin Privacy and ScalingGrincon U.S. 2019 Grin Privacy and Scaling
Grincon U.S. 2019 Grin Privacy and Scaling
 
Grincon U.S. 2019 Grin Security Audit Results
Grincon U.S. 2019 Grin Security Audit ResultsGrincon U.S. 2019 Grin Security Audit Results
Grincon U.S. 2019 Grin Security Audit Results
 
Grincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & Governance
Grincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & GovernanceGrincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & Governance
Grincon U.S. 2019 Layperson's Intro to Grin, Grin Value Prop & Governance
 
Faster Payments on the Blockchain
Faster Payments on the BlockchainFaster Payments on the Blockchain
Faster Payments on the Blockchain
 
Test Data Management for healthcare
Test Data Management for healthcareTest Data Management for healthcare
Test Data Management for healthcare
 

Recently uploaded

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
OpenMetadata
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
mz5nrf0n
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
Hornet Dynamics
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
Remote DBA Services
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Envertis Software Solutions
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
Neo4j
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
Octavian Nadolu
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
Ayan Halder
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
Rakesh Kumar R
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 

Recently uploaded (20)

OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024OpenMetadata Community Meeting - 5th June 2024
OpenMetadata Community Meeting - 5th June 2024
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
原版定制美国纽约州立大学奥尔巴尼分校毕业证学位证书原版一模一样
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
E-commerce Application Development Company.pdf
E-commerce Application Development Company.pdfE-commerce Application Development Company.pdf
E-commerce Application Development Company.pdf
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
Oracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptxOracle Database 19c New Features for DBAs and Developers.pptx
Oracle Database 19c New Features for DBAs and Developers.pptx
 
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise EditionWhy Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
Why Choose Odoo 17 Community & How it differs from Odoo 17 Enterprise Edition
 
GraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph TechnologyGraphSummit Paris - The art of the possible with Graph Technology
GraphSummit Paris - The art of the possible with Graph Technology
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
Artificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension FunctionsArtificia Intellicence and XPath Extension Functions
Artificia Intellicence and XPath Extension Functions
 
Using Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional SafetyUsing Xen Hypervisor for Functional Safety
Using Xen Hypervisor for Functional Safety
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
Fundamentals of Programming and Language Processors
Fundamentals of Programming and Language ProcessorsFundamentals of Programming and Language Processors
Fundamentals of Programming and Language Processors
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 

Grincon U.S. 2019 Scriptless Scripts

  • 1. Scriptless Scripts With Mimblewimble Andrew Poelstra Research Director, Blockstream grincon@wpsoftware.net January 28, 2018 1 / 17
  • 2. Mimblewimble and Scriptless Scripts Mimblewimble, proposed in 2016 by Tom Elvis Jedusor No scripts, only signatures. “What script support is possible? We would need to translate script operations into some sort of discrete logarithm information.” 2 / 17
  • 3. Kernels in Mimblewimble Bitcoin (and Ethereum, etc.) uses a scripting language to describe smart contracts and enforce their execution. These scripts must be downloaded, parsed, validated by all full nodes on the network. Can’t be compressed or aggregated. The details of the script are visible forever, compromising privacy and fungibility. With scriptless scripts, the only visible things are public keys (i.e. uniformly random curvepoints) and digital signatures. 3 / 17
  • 9. Adaptor Signatures In a Schnorr multisignature, parties first exchange “public nonces” then exchange “partial signatures”. Partial signatures are objects that, when added to other partial signatures, produce total signatures. This property is publicly verifiable. Given a secret t and commitment T = tG, you can offset partial signatures by t. The offset signature and T together are an adaptor signature. With an adaptor signature, if you learn the partial signature you’ll also learn t, and vice-versa. 9 / 17
  • 10. Example: Atomic (Cross-chain) Swaps Suppose Alice wants to trade 10 A-coins for 5 of Bob’s B-coins. On their respective chains, each moves the coins to outputs that can only be spent by a 2-of-2 multisignature with both Alice and Bob. They do sign the multisignature protocols in parallel, except that in both cases Bob gives Alice adaptor signatures using a commitment T to a secret value t. Bob replaces one of the signatures (s, R) with (s + t, R) and publishes it, to take his coins. Alice sees this, learns t, then does the same thing on the other chain to take her coins. 10 / 17
  • 11. Features of Adaptor Signatures By attaching auxiliary proofs to T to ensure t is some necessary data for a separate protocol, arbitrary steps of arbitrary protocols can be made equivalent to signature production. In particular, by using the same T in multiple adaptor signatures it is possible to make arbitrary sets of signatures atomic with other arbitrary sets, enabling multi-hop payment channels. You can re-blind commitments between hops while retaining the atomicity, for improved privacy. 11 / 17
  • 12. Features of Adaptor Signatures After a signature hits the chain, anyone can make up a commitment T and compute a corresponding “adaptor signature” for it, so such schemes are deniable. Unlike hash-preimages, the secret t is revealed only to a party in possession of an adaptor signature, who can efficiently prove knowledge of it. This gives a transferrable proof that a protocol (e.g. a Lightning invoice) was completed correctly. Existing multisignature outputs can be used with adaptor signatures, no need to precommit to a specific protocol. 12 / 17
  • 13. Limits of Adaptor Signatures Seem to really only be useful for 2-signer protocols. This includes 2-of-3 signatures. Depends on publication of complete signatures; seems incompatible with noninteractive signature aggregation or BLS. No clear way to do timelocks. 13 / 17
  • 14. Interlude: Witness Encryption If one party has a secret they want to associate to an adaptor signature, they can encrypt this with t and provide a zero-knowledge proof that the encryption has t as a key and the secret is well-formed. (“Zero-Knowledge Contingent Payments”, Maxwell 2011). But what if the party wants to encrypt to a secret they don’t know? For example, a third party’s signature (c.f. Discreet Log Contracts, Dryja 2017) or a future Bitcoin block? In 2013 we called general zk proofs “moon math”. Today we use this term for witness encryption (Garg, Gentry, Sahai, Waters 2013). 14 / 17
  • 15. Timelocks in Mimblewimble Absolute timelocks can be added to Mimblewimble by having kernels sign a minimum blockheight before which they may not be included in the blockchain. Relative timelocks are much harder, because kernel signatures are independent of transaction outputs, and transacton outputs are not even guaranteed to be visible to verifiers. Idea (Somsen, Friedenbach 2016, personal communication): let kernels reference other kernels, use them as “timelock references”. Drawbacks: requires users plant extra kernels in the blockchain; requires validators maintain an index of kernels. 15 / 17
  • 16. Open Problems Timelocks!! Scriptless scripts with BLS. Multiparty (3+ parties) scriptless scripts Standards & Interoperability 16 / 17
  • 17. Thank You Andrew Poelstra <grincon@wpsoftware.net> 17 / 17