Author

Topic: Just throwing this out there: Using multiple forms of encryption for redundancy (Read 940 times)

full member
Activity: 225
Merit: 101
Just add a new opcode to verify a different signature scheme. Then use it in scripts just like the existing opcodes. You can hash the keys and entire scripts exactly like now.
legendary
Activity: 1904
Merit: 1002
Double signatures is a nonsolution.  If one is broken, that means they will be attacking the private key.  If the private key is discovered, both signatures can be generated.  You need two separate private keys and a way to combine the public keys into a single address.

I clearly said "two different signature schemes". That means two different public keys, two private keys, two algorithms, read forum messages twice  Smiley



I thought you were referring to using the same private data as the key for both schemes.  I'm sorry for misinterpreting, but reading twice doesn't clarify it.  However, you don't tackle the real problem, which is how do you combine these two schemes in a way that is compatible with the design of bitcoin.
hero member
Activity: 555
Merit: 654
Double signatures is a nonsolution.  If one is broken, that means they will be attacking the private key.  If the private key is discovered, both signatures can be generated.  You need two separate private keys and a way to combine the public keys into a single address.

I clearly said "two different signature schemes". That means two different public keys, two private keys, two algorithms, read forum messages twice  Smiley

legendary
Activity: 1904
Merit: 1002
Mekle-Winternitz signatures are Quantum-computer proof.

To achieve composed security form signatures is very easy, you just sign the transaction with two different signature schemes and only allow it if both are valid.

Both methods can be added to Bitcoin, but both require a hardfork.

Best regards.


Double signatures is a nonsolution.  If one is broken, that means they will be attacking the private key.  If the private key is discovered, both signatures can be generated.  You need two separate private keys and a way to combine the public keys into a single address.
hero member
Activity: 555
Merit: 654
Mekle-Winternitz signatures are Quantum-computer proof.

To achieve composed security form signatures is very easy, you just sign the transaction with two different signature schemes and only allow it if both are valid.

Both methods can be added to Bitcoin, but both require a hardfork.

Best regards.
legendary
Activity: 1904
Merit: 1002
It's unlikely, but possible, that someone could break ECDSA or SHA256, which would be bad for the Bitcoin community.

What would be the drawbacks of using two methods of encryption, one on top of the other, so that if either one is broken, Bitcoin remains unaffected?

I presume it would be far less likely for two distinct forms of encryption to be defeated at exactly the same time, than to have one broken.

Are there strong, well-tested encryption schemes that are based on mathematics sufficiently distinct from ECDSA?

Side question: Do there exist viable forms of cryptography which are thought not to be defeatable by a quantum computer? I've heard of "Unbalanced Oil and Vinegar" which is supposed to be quantum-computer-resistant but not thoroughly tested.

Keep in mind a "break" never shatters an encryption or hashing method.  It always happens in small incremental improvements on brute force techniques.

That said, doubling up on the hash should be simple and would likely improve security.  I believe layering ECDSA with another signing/verification method would be a little more challenging, but I don't have a strong enough crypto background to delve into how that might work.
hero member
Activity: 675
Merit: 502
It's unlikely, but possible, that someone could break ECDSA or SHA256, which would be bad for the Bitcoin community.

What would be the drawbacks of using two methods of encryption, one on top of the other, so that if either one is broken, Bitcoin remains unaffected?

I presume it would be far less likely for two distinct forms of encryption to be defeated at exactly the same time, than to have one broken.

Are there strong, well-tested encryption schemes that are based on mathematics sufficiently distinct from ECDSA?

Side question: Do there exist viable forms of cryptography which are thought not to be defeatable by a quantum computer? I've heard of "Unbalanced Oil and Vinegar" which is supposed to be quantum-computer-resistant but not thoroughly tested.
Jump to: