Jul 15 - Jul 16, 2025
Developed by Jesse Posner alongside a colleague, this technique marks a departure from traditional custody methods by strategically withholding BIP-32 chain codes and instead providing scalar tweaks at the time of signing. This nuanced approach significantly enhances privacy by preventing custodians from having visibility into the key tree's entirety through an XPUB. It addresses the prevalent privacy concerns within multisig arrangements where the exposure of all public keys in a redeem script enables custodians to track transaction histories.
The methodology behind Chain Code Delegation intricately balances the need for security with the imperative of privacy. Custodians, under this system, sign transactions without full insight into their scope or the ability to derive child keys, thereby constraining their knowledge and potential security vulnerabilities to only those transactions explicitly shared with them. This is achieved through a process whereby the counterparty generates a necessary chain code and computes a scalar tweak for each transaction requiring a signature. The custodian utilizes this tweak to sign the transaction, blissfully unaware of the chain code, thereby limiting their visibility and reducing the risk of security breaches.
Moreover, Chain Code Delegation introduces sophisticated mechanisms to further solidify its stance on privacy and security. By leveraging BIP32 tweaks in conjunction with blind Schnorr signatures, it ensures the confidentiality of transactions signed by a custodian. Predicate blind signatures are employed to enforce policies during the signing phase, all while maintaining the veil of privacy. This strategic limitation of information not only bolsters privacy but also significantly narrows the window of opportunity for attackers, particularly in environments susceptible to large-scale attacks like mobile phones. It allows users to meticulously control their keys' capabilities through selective disclosure of scalar tweaks, presenting a formidable barrier against unauthorized access.
For those interested in delving deeper into the technical foundations and applications of Chain Code Delegation, additional resources provide insightful perspectives. Discussions on Private Collaborative Custody with FROST (link) and Concurrently Secure Blind Schnorr Signatures (link) offer valuable information for understanding the intricate details and broader implications of this innovative approach to secure, privacy-centric collaborative custody solutions.
TLDR
We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project?
Give Feedback