1
0
mirror of https://github.com/bitcoin/bips.git synced 2025-01-19 05:45:07 +01:00
Commit Graph

2614 Commits

Author SHA1 Message Date
Nicolas Dorier
983955ffc5
Fix broken link 2020-01-26 14:23:23 +09:00
MarcoFalke
a7597ec2c3
Update bip-0119.mediawiki
fix links
2020-01-25 12:10:07 -05:00
Luke Dashjr
0042dec548
Merge pull request #875 from JeremyRubin/ctv
BIP 119: CHECKTEMPLATEVERIFY
2020-01-24 01:43:06 +00:00
Jeremy Rubin
117f4186e7 Fix Links to images in BIP-119 2020-01-23 16:56:03 -08:00
Jeremy Rubin
1db62a07c5 Assign CTV BIP #119 2020-01-23 16:51:50 -08:00
Luke Dashjr
33308e75f8 Merge BIPs 340-342 2020-01-24 00:01:16 +00:00
Luke Dashjr
97ef6783df Merge remote-tracking branch 'origin-pull/876/head' into HEAD 2020-01-24 00:00:01 +00:00
Luke Dashjr
802520e05a Merge commit 'origin-pull/876/head^^^^^^' into HEAD 2020-01-23 23:59:43 +00:00
Luke Dashjr
d81cf9da5e Merge branch 'master' into HEAD 2020-01-23 23:59:10 +00:00
Jeremy Rubin
c36e492f05 Add Backwards Compatibility section to OP_CHECKTEMPLATEVERIFY BIP and change 'Implementations' header to 'Reference Implementation' 2020-01-20 20:17:28 -08:00
Jeremy Rubin
1a42897287 Add BIP for CheckTemplateVerify 2020-01-20 20:17:28 -08:00
Pieter Wuille
9cf4038f17 fix BIP links 2020-01-20 07:35:26 -08:00
Luke Dashjr
6a802329e4
Merge pull request #877 from kallewoof/linter-http-only
linter: avoid false positives such as C++ lambda exprs by only detect…
2020-01-20 05:14:50 +00:00
Karl-Johan Alm
1d20ad8a42
linter: avoid false positives such as C++ lambda exprs by only detecting links starting with 'http' 2020-01-20 14:07:27 +09:00
Pieter Wuille
9de7dfccfa Add to README 2020-01-19 14:48:58 -08:00
Pieter Wuille
c3b91dcc22 Fixes to headers 2020-01-19 14:48:58 -08:00
Pieter Wuille
fa305e5abd Make buildtable.pl support Requires: field 2020-01-19 14:48:58 -08:00
Pieter Wuille
e1914b8173 fixes 2020-01-19 14:48:58 -08:00
Pieter Wuille
eb641cbdb5 Address jonas' comments 2020-01-19 14:47:33 -08:00
Pieter Wuille
1faa4b19bc Rename BIPs 2020-01-19 14:47:33 -08:00
Pieter Wuille
57ed6cb342 Abstract out common signature message calculation 2020-01-19 14:47:33 -08:00
Pieter Wuille
d9ec5f43da Update acknowledgements, remove authors 2020-01-19 14:47:33 -08:00
Pieter Wuille
cd8ea88987 Delete precompiled file 2020-01-19 14:47:33 -08:00
Anthony Towns
1e99e205a8 go back to leaf_version but different rationale 2020-01-19 14:47:33 -08:00
Pieter Wuille
ff8a36200b Redefine leaf versions to be incrementally increasing from 0 2020-01-19 14:47:33 -08:00
Tim Ruffing
41f8993a4b Clarify nonce generation
- Separate nonce generation into getting a random byte string and converting it to a suitable scalar ...
 - ... to make clear that the byte string can be generated differently.
 - Make the warning a little bit more prominent and improve writing
2020-01-19 14:47:33 -08:00
Pieter Wuille
92e3d6ca87 Update Post-History field for taproot/tapscript 2020-01-19 14:47:33 -08:00
Pieter Wuille
f429750036 Update authors 2020-01-19 14:47:33 -08:00
stefanwouldgo
32c0f50d7b more precise wording on limits
there are no tx or block size limits (post-Segwit), just block weight limit

better wording
2020-01-19 14:47:33 -08:00
Pieter Wuille
460163ee0b Add rationale on security assumptions 2020-01-19 14:47:33 -08:00
Pieter Wuille
94e9c0925a Add an informal summary of the design 2020-01-19 14:47:33 -08:00
Pieter Wuille
84161e187d Improve and restructure motivation and design 2020-01-19 14:47:33 -08:00
Matthew Zipkin
734a859b27 bip-taproot: example from diagram 2020-01-19 14:47:33 -08:00
Pieter Wuille
2c8feb1cbb Update bip-schnorr.mediawiki
Co-Authored-By: Tim Ruffing <crypto@timruffing.de>
2020-01-19 14:47:33 -08:00
Pieter Wuille
9c76bb457f Linearity makes sign-for-sum-of-keys easier, not possible entirely.
I'm sure it's possible to construct a complex MPC that can sign for the
sum of keys under ECDSA as well.
2020-01-19 14:47:33 -08:00
Tim Ruffing
0dd7489dfd Update bip-schnorr.mediawiki 2020-01-19 14:47:33 -08:00
Tim Ruffing
3cc2d8ed6d Mention that we don't change the hash function 2020-01-19 14:47:33 -08:00
Pieter Wuille
3c1f466372 Completely specified 2020-01-19 14:47:33 -08:00
Pieter Wuille
687ec4ba8e Low-S ECDSA is non-malleable under nonstandard assumptions 2020-01-19 14:47:33 -08:00
Jonas Nick
d199b6dff6 Replace private key with secret key 2020-01-19 14:47:33 -08:00
Tim Ruffing
ad6bb6c1ff Clarify why we don't want short hashes
This is supposed to supersede https://github.com/sipa/bips/pull/158.
I tried to say this carefully. I don't think that multiparty signing is in general broken with short hashes. For example the attack in #158 could be avoided by letting everybody not only commit to the nonce but also to the message. It's just that using a collision-resistant hash just eliminates the problem entirely...
2020-01-19 14:47:33 -08:00
Hennadii Stepanov
966eadca3a Fix reference formatting 2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
773133fb4a Typo: script signature max bytes unhashed are 247 2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
da3837639f Typo: max bytes hashed for sig is 210 2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
37bf225ea4 Replace BIP66 link with BIP146
BIP66 does not mention the inherent ECDSA malleability, but BIP146 does
2020-01-19 14:47:33 -08:00
stefanwouldgo
8baf6f5952 fix singular/plural ambiguity 2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
a65101ff6d Replace signing with signature before validation 2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
79738f2410 Link to proof sketch of security of implicit Y
Thanks to @ajtowns for providing the link
2020-01-19 14:47:33 -08:00
Orfeas Stefanos Thyfronitis Litos
ca472ed663 Mention that miners could malleate signatures 2020-01-19 14:47:33 -08:00
Orfeas Litos
5918b4666c Mention hash_type malleability would change wtxid 2020-01-19 14:47:33 -08:00