Home Bitcoin taproot – P2TR Safety Query

taproot – P2TR Safety Query

0
taproot – P2TR Safety Query


As I at the moment perceive P2TR scripts don’t hash the general public key like P2PKH (RMD160) or P2WSH (SHA256).

Right.

In P2TR the there’s only a public key encoded in bech32m

Right, and the transaction output additionally simply accommodates the general public key instantly.

mainly making it the identical as P2PK?

Sure and no. It’s, and can be utilized as, P2PK. Nevertheless it’s additionally doable to make use of a public key that was tweaked utilizing a script tree. At spending time, one can both instantly signal for this tweaked key (like P2PK), or reveal the way it was tweaked utilizing a script tree, after which present inputs that fulfill a script in it. Thus, it features as each a P2PK and as a P2SH-like building on the similar time.

If true, is that this so individuals can do musig and tweaked public key scripts?

From BIP341 (the taproot specification):

Why is the general public key instantly included within the output? Whereas typical earlier constructions retailer a hash of a script or a public key within the output, that is moderately wasteful when a public key’s all the time concerned. To ensure batch verifiability, the general public key have to be identified to each verifier, and thus solely revealing its hash as an output would suggest including a further 32 bytes to the witness. Moreover, to take care of 128-bit collision safety for outputs, a 256-bit hash can be required anyway, which is comparable in measurement (and thus in value for senders) to revealing the general public key instantly. Whereas the utilization of public key hashes is commonly mentioned to guard in opposition to ECDLP breaks or quantum computer systems, this safety could be very weak at finest: transactions aren’t protected whereas being confirmed, and a really massive portion of the forex’s provide will not be beneath such safety regardless. Precise resistance to such techniques might be launched by counting on totally different cryptographic assumptions, however this proposal focuses on enhancements that don’t change the safety mannequin.

LEAVE A REPLY

Please enter your comment!
Please enter your name here