Credits: Elliott Jin, Jonas Nick, Tim Ruffing
This is a technical specification of the MuSig2 multiplayer Schnorr signing algorithm. The algorithm is useful for all applications that create taproot outputs with a logic branch requiring n-of-n signers to sign.
Audience question: Does anyone think they might use MuSig2 when a specification and library support is available?
Credits: Ruben Somsen
This scheme makes it possible for a sender to derive a receiver pubkey for payment using a only single root key published by the receiver and transaction data. Note that to spend a typical UTXO, the sender reveals a public key. The sender uses this together with the published root key to DH-derive a shared secret, and in turn perturb the root key to get the payment key. The trade off is that wallets must analyze every new transaction to determine if it pays them, deriving many keys per transaction.
Audience question: Does anyone regularly use BIP47? Would scanning every transaction be burdensome in your use case?
Credits: Poulami Das, Andreas Erwig, Sebastian Faust, Julian Loss and Siavash Riahi
Researchers working in this area provide a definition of security for BIP32 and this paper derives a correction to the (assumed) 128-bit security of the seed, arriving at an estimate of 91 bits. The paper assumes 1% secret key leakage (e.g old keys) and does not explain a practical attack on the scheme.
Audience question: are you concerned about this finding?
Credits: Galaxy Digital
This is a very lucid explanation of the stratum protocols (V1 and V2), which lays out the problems that V2 solves.
Credits: OpenSSH contributors
SSH now uses a quantum-resistent algorithm for transport encryption in order to limit the usefulness of future quantum computers in cryptanalysis of communications made today.
Credits: Yehuda Lindell
This paper presents a simple new threshold Schnorr signing scheme which makes very conservative security assumptions and has good composition.
Credits: Olaoluwa Osuntokun
This is a data management system for asset metadata to mark up UTXOs. The design takes care to ensure that it is possible to route assets over LN.
There was a lot of talk at Bitcoin 2022 about DIDs. I have not seen one before so i thought it would be fun to see an example. DIDs underpin the much talked about tbDEX project from Block.
Apply our learnings from the DID section and explore how tbDEX is suppose to work. tbDEX is essentially built ontop of DIDs, so we need to understand how those work, and then we can examine how tbDEX uses those in their whitepaper.
Credits: Carl Dong
The libbitcoinkernel project has made progress in its attempts to seperate bitcoin’s consensus code into a seperate library from core and discussion has begun on its usefulness. Its aim of creating a functioning consensus kernal would allow for more robust changes to core, and for more node implementations to be feasible.
LNLink is a new noncustodial FOSS lightning wallet app that interfaces with C-lightning. The app has recently added bolt11/bolt12-offer generation, and demonstrated tip-jar functionality.
As of block 730034, 19000004.68097367 bitcoin have been mined