Apr 16 - Apr 24, 2025
A significant focus is on controlling access to secrets by not generating key parts for individuals who should not have access, thereby directly managing who can obtain the secret. This method underscores the importance of utilizing different entropy sources or paths for generating these keys, aiming to standardize the process and potentially integrate hardware features for future security enhancements. However, this introduces a requirement for all devices involved to contribute their key parts for the backup process, marking a shift from the current setup where any single participant can initiate an encrypted backup.
A noteworthy proposal centers on the encryption scheme designed for multisig wallets, which intricately ties the accessibility of a wallet's encrypted descriptor to the possession of specific extended public keys (xpubs). This scheme leverages Shamir's Secret Sharing algorithm to divide the secret necessary for accessing the multisig descriptor into several shares, each encrypted with a unique xpub. This method ensures that decryption requires possession of at least a specified number of xpubs, hence adding a layer of complexity while maintaining manageability. The scheme addresses the risk of storing encrypted data on compromised servers by ensuring that only individuals with the required xpubs can decrypt and access the multisig descriptor.
Additionally, the dialogue touches upon the criticality of backing up wallet descriptors in cryptocurrency wallets, especially those not employing a single-signature mechanism. The lack of a standardized method for wallet backups is highlighted, alongside the flawed approach of treating descriptors as seeds due to their differing levels of sensitivity and associated risks. A proposed backup scheme combines symmetric and asymmetric encryption techniques, aiming to minimize backup size while simplifying the encryption process. This deterministic encryption approach, although deviating from traditional semantic security standards, is deemed sufficiently secure within the specific context of wallet backup.
The conversation further explores the privacy and security implications of descriptors and xpubs in the realm of cryptocurrency, emphasizing the need for stringent security measures to safeguard these elements from unauthorized access. Descriptors, capable of including private keys, pose a heightened risk as they essentially serve as gateways to accessing and controlling cryptocurrency funds directly.
Moreover, the correspondence sheds light on an alternative backup scheme for multisig wallets that utilizes shamir secret sharing to enhance security by encrypting each share of a secret with one xpub. This innovative method obfuscates the number of participants in the multisig setup from potential attackers and opts to keep derivation paths in plaintext for ease of xpub derivation. Resources such as GitHub repositories and detailed posts provide valuable insights into the operational intricacies and benefits of this backup scheme, alongside aspirations to extend support to more advanced multisig configurations.
Lastly, the discussion hints at a collaborative effort to combine the strengths of distinct methods proposed by individuals named Josh and Salvatore, suggesting an interest in creating a comprehensive solution that includes both standardized processes and innovative elements. This strategy emphasizes the potential benefits of integrating unique attributes such as inscription and location attributes, further contributing to the overarching goal of enhancing cryptographic system security.
TLDR
We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project?
Give Feedback