MarcoFalke
a7597ec2c3
Update bip-0119.mediawiki
...
fix links
2020-01-25 12:10:07 -05:00
Luke Dashjr
0042dec548
Merge pull request #875 from JeremyRubin/ctv
...
BIP 119: CHECKTEMPLATEVERIFY
2020-01-24 01:43:06 +00:00
Jeremy Rubin
117f4186e7
Fix Links to images in BIP-119
2020-01-23 16:56:03 -08:00
Jeremy Rubin
1db62a07c5
Assign CTV BIP #119
2020-01-23 16:51:50 -08:00
Luke Dashjr
33308e75f8
Merge BIPs 340-342
2020-01-24 00:01:16 +00:00
Luke Dashjr
97ef6783df
Merge remote-tracking branch 'origin-pull/876/head' into HEAD
2020-01-24 00:00:01 +00:00
Luke Dashjr
802520e05a
Merge commit 'origin-pull/876/head^^^^^^' into HEAD
2020-01-23 23:59:43 +00:00
Luke Dashjr
d81cf9da5e
Merge branch 'master' into HEAD
2020-01-23 23:59:10 +00:00
Jeremy Rubin
c36e492f05
Add Backwards Compatibility section to OP_CHECKTEMPLATEVERIFY BIP and change 'Implementations' header to 'Reference Implementation'
2020-01-20 20:17:28 -08:00
Jeremy Rubin
1a42897287
Add BIP for CheckTemplateVerify
2020-01-20 20:17:28 -08:00
Pieter Wuille
9cf4038f17
fix BIP links
2020-01-20 07:35:26 -08:00
Luke Dashjr
6a802329e4
Merge pull request #877 from kallewoof/linter-http-only
...
linter: avoid false positives such as C++ lambda exprs by only detect…
2020-01-20 05:14:50 +00:00
Karl-Johan Alm
1d20ad8a42
linter: avoid false positives such as C++ lambda exprs by only detecting links starting with 'http'
2020-01-20 14:07:27 +09:00
Pieter Wuille
9de7dfccfa
Add to README
2020-01-19 14:48:58 -08:00
Pieter Wuille
c3b91dcc22
Fixes to headers
2020-01-19 14:48:58 -08:00
Pieter Wuille
fa305e5abd
Make buildtable.pl support Requires: field
2020-01-19 14:48:58 -08:00
Pieter Wuille
e1914b8173
fixes
2020-01-19 14:48:58 -08:00
Pieter Wuille
eb641cbdb5
Address jonas' comments
2020-01-19 14:47:33 -08:00
Pieter Wuille
1faa4b19bc
Rename BIPs
2020-01-19 14:47:33 -08:00
Pieter Wuille
57ed6cb342
Abstract out common signature message calculation
2020-01-19 14:47:33 -08:00
Pieter Wuille
d9ec5f43da
Update acknowledgements, remove authors
2020-01-19 14:47:33 -08:00
Pieter Wuille
cd8ea88987
Delete precompiled file
2020-01-19 14:47:33 -08:00
Anthony Towns
1e99e205a8
go back to leaf_version but different rationale
2020-01-19 14:47:33 -08:00
Pieter Wuille
ff8a36200b
Redefine leaf versions to be incrementally increasing from 0
2020-01-19 14:47:33 -08:00
Tim Ruffing
41f8993a4b
Clarify nonce generation
...
- Separate nonce generation into getting a random byte string and converting it to a suitable scalar ...
- ... to make clear that the byte string can be generated differently.
- Make the warning a little bit more prominent and improve writing
2020-01-19 14:47:33 -08:00
Pieter Wuille
92e3d6ca87
Update Post-History field for taproot/tapscript
2020-01-19 14:47:33 -08:00
Pieter Wuille
f429750036
Update authors
2020-01-19 14:47:33 -08:00
stefanwouldgo
32c0f50d7b
more precise wording on limits
...
there are no tx or block size limits (post-Segwit), just block weight limit
better wording
2020-01-19 14:47:33 -08:00
Pieter Wuille
460163ee0b
Add rationale on security assumptions
2020-01-19 14:47:33 -08:00
Pieter Wuille
94e9c0925a
Add an informal summary of the design
2020-01-19 14:47:33 -08:00
Pieter Wuille
84161e187d
Improve and restructure motivation and design
2020-01-19 14:47:33 -08:00
Matthew Zipkin
734a859b27
bip-taproot: example from diagram
2020-01-19 14:47:33 -08:00
Pieter Wuille
2c8feb1cbb
Update bip-schnorr.mediawiki
...
Co-Authored-By: Tim Ruffing <crypto@timruffing.de>
2020-01-19 14:47:33 -08:00
Pieter Wuille
9c76bb457f
Linearity makes sign-for-sum-of-keys easier, not possible entirely.
...
I'm sure it's possible to construct a complex MPC that can sign for the
sum of keys under ECDSA as well.
2020-01-19 14:47:33 -08:00
Tim Ruffing
0dd7489dfd
Update bip-schnorr.mediawiki
2020-01-19 14:47:33 -08:00
Tim Ruffing
3cc2d8ed6d
Mention that we don't change the hash function
2020-01-19 14:47:33 -08:00
Pieter Wuille
3c1f466372
Completely specified
2020-01-19 14:47:33 -08:00
Pieter Wuille
687ec4ba8e
Low-S ECDSA is non-malleable under nonstandard assumptions
2020-01-19 14:47:33 -08:00
Jonas Nick
d199b6dff6
Replace private key with secret key
2020-01-19 14:47:33 -08:00
Tim Ruffing
ad6bb6c1ff
Clarify why we don't want short hashes
...
This is supposed to supersede https://github.com/sipa/bips/pull/158 .
I tried to say this carefully. I don't think that multiparty signing is in general broken with short hashes. For example the attack in #158 could be avoided by letting everybody not only commit to the nonce but also to the message. It's just that using a collision-resistant hash just eliminates the problem entirely...
2020-01-19 14:47:33 -08:00
Hennadii Stepanov
966eadca3a
Fix reference formatting
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
773133fb4a
Typo: script signature max bytes unhashed are 247
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
da3837639f
Typo: max bytes hashed for sig is 210
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
37bf225ea4
Replace BIP66 link with BIP146
...
BIP66 does not mention the inherent ECDSA malleability, but BIP146 does
2020-01-19 14:47:33 -08:00
stefanwouldgo
8baf6f5952
fix singular/plural ambiguity
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
a65101ff6d
Replace signing with signature before validation
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
79738f2410
Link to proof sketch of security of implicit Y
...
Thanks to @ajtowns for providing the link
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
ca472ed663
Mention that miners could malleate signatures
2020-01-19 14:47:33 -08:00
Orfeas Litos
5918b4666c
Mention hash_type malleability would change wtxid
2020-01-19 14:47:33 -08:00
Jonas Nick
66e2931de2
Clarify bip-taproot digest difference to bip143 regarding sub-hashes
2020-01-19 14:47:33 -08:00