summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorTamas Blummer <tamas@bitsofproof.com>2014-03-29 19:16:28 +0100
committerbitcoindev <bitcoindev@gnusha.org>2014-03-29 18:16:38 +0000
commit4d80614c615d11f917e647d28f765f7d49f9fc81 (patch)
tree5761376fa36008a9f1ed26b75c48d7c158310a27
parent5ab7ef6a92e37aba178abac996e8e8af717e6ae2 (diff)
downloadpi-bitcoindev-4d80614c615d11f917e647d28f765f7d49f9fc81.tar.gz
pi-bitcoindev-4d80614c615d11f917e647d28f765f7d49f9fc81.zip
Re: [Bitcoin-development] Presenting a BIP for Shamir's Secret Sharing of Bitcoin private keys
-rw-r--r--f2/dc309640be5ca4f704ea3169767d874035c34b241
1 files changed, 241 insertions, 0 deletions
diff --git a/f2/dc309640be5ca4f704ea3169767d874035c34b b/f2/dc309640be5ca4f704ea3169767d874035c34b
new file mode 100644
index 000000000..724b999ad
--- /dev/null
+++ b/f2/dc309640be5ca4f704ea3169767d874035c34b
@@ -0,0 +1,241 @@
+Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
+ helo=mx.sourceforge.net)
+ by sfs-ml-3.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
+ (envelope-from <tamas@bitsofproof.com>) id 1WTxo6-00074R-1G
+ for bitcoin-development@lists.sourceforge.net;
+ Sat, 29 Mar 2014 18:16:38 +0000
+X-ACL-Warn:
+Received: from wp059.webpack.hosteurope.de ([80.237.132.66])
+ by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:AES256-SHA:256)
+ (Exim 4.76) id 1WTxo4-0006fm-36
+ for bitcoin-development@lists.sourceforge.net;
+ Sat, 29 Mar 2014 18:16:38 +0000
+Received: from [37.143.74.116] (helo=[192.168.2.2]); authenticated
+ by wp059.webpack.hosteurope.de running ExIM with esmtpsa
+ (TLS1.0:RSA_AES_128_CBC_SHA1:16)
+ id 1WTxnx-0004yh-6s; Sat, 29 Mar 2014 19:16:29 +0100
+Content-Type: multipart/signed;
+ boundary="Apple-Mail=_F4DD87E0-15B5-4313-887A-C78574E68B24";
+ protocol="application/pgp-signature"; micalg=pgp-sha1
+Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\))
+From: Tamas Blummer <tamas@bitsofproof.com>
+In-Reply-To: <53370854.5050303@gmail.com>
+Date: Sat, 29 Mar 2014 19:16:28 +0100
+Message-Id: <19FE9882-7FC2-4518-BD50-8818B059271B@bitsofproof.com>
+References: <CACsn0ckScTWG4YxNCscxvtdsmcUkxtR2Gi-rdBs2HCkirPz5rA@mail.gmail.com>
+ <4906130.DUyjhm1C93@crushinator> <5336FBE7.7030209@gmail.com>
+ <15872432.k8h0hUxqlf@crushinator> <53370854.5050303@gmail.com>
+To: Alan Reiner <etotheipi@gmail.com>
+X-Mailer: Apple Mail (2.1510)
+X-bounce-key: webpack.hosteurope.de; tamas@bitsofproof.com; 1396116996;
+ 7978ee6c;
+X-Spam-Score: 1.0 (+)
+X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
+ See http://spamassassin.org/tag/ for more details.
+ 1.0 HTML_MESSAGE BODY: HTML included in message
+X-Headers-End: 1WTxo4-0006fm-36
+Cc: bitcoin-development@lists.sourceforge.net
+Subject: Re: [Bitcoin-development] Presenting a BIP for Shamir's Secret
+ Sharing of Bitcoin private keys
+X-BeenThere: bitcoin-development@lists.sourceforge.net
+X-Mailman-Version: 2.1.9
+Precedence: list
+List-Id: <bitcoin-development.lists.sourceforge.net>
+List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
+List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
+List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
+List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
+List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
+ <mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
+X-List-Received-Date: Sat, 29 Mar 2014 18:16:38 -0000
+
+
+--Apple-Mail=_F4DD87E0-15B5-4313-887A-C78574E68B24
+Content-Type: multipart/alternative;
+ boundary="Apple-Mail=_E3FC2F3D-C240-43DE-B860-1AF00BC883C3"
+
+
+--Apple-Mail=_E3FC2F3D-C240-43DE-B860-1AF00BC883C3
+Content-Transfer-Encoding: quoted-printable
+Content-Type: text/plain;
+ charset=us-ascii
+
+I also think that we can add usability features if the underlying secret =
+remains well protected.
+I do not think there is any reason to assume that the knowledge of the =
+degree of the polynomial, would aid an attacker.
+
+Similarly a fingerprint of the secret if it is unrelated to the hash =
+used in the polinomyal should leak no useful information,
+
+The length of such fingerpring (say 4 bytes) and the degree (1 byte) =
+does not seem a big overhead for me.
+
+Remember that the biggest obstacle of Bitcoin is usability not security.
+
+Regards,
+
+Tamas Blummer
+http://bitsofproof.com
+
+On 29.03.2014, at 18:52, Alan Reiner <etotheipi@gmail.com> wrote:
+
+> On 03/29/2014 01:19 PM, Matt Whitlock wrote:
+>> I intentionally omitted the parameter M (minimum subset size) from =
+the shares because including it would give an adversary a vital piece of =
+information. Likewise, including any kind of information that would =
+allow a determination of whether the secret has been correctly =
+reconstituted would give an adversary too much information. Failing =
+silently when given incorrect shares or an insufficient number of shares =
+is intentional.
+>=20
+> I do not believe this is a good tradeoff. It's basically obfuscation =
+of
+> something that is already considered secure at the expense of
+> usability. It's much more important to me that the user understands
+> what is in their hands (or their family members after they get hit by =
+a
+> bus), than to obfuscate the parameters of the secret sharing to =
+provide
+> a tiny disadvantage to an adversary who gets ahold of one.=20
+>=20
+> The fact that it fails silently is really all downside, not a benefit.=20=
+
+> If I have enough fragments, I can reconstruct the seed and see that it
+> produces addresses with money. If not, I know I need more fragments.=20=
+
+> I'm much more concerned about my family having all the info they need =
+to
+> recover the money, than an attacker knowing that he needs two more
+> fragments instead of which are well-secured anyway.
+>=20
+>=20
+>=20
+> =
+--------------------------------------------------------------------------=
+----
+> _______________________________________________
+> Bitcoin-development mailing list
+> Bitcoin-development@lists.sourceforge.net
+> https://lists.sourceforge.net/lists/listinfo/bitcoin-development
+>=20
+
+
+--Apple-Mail=_E3FC2F3D-C240-43DE-B860-1AF00BC883C3
+Content-Transfer-Encoding: quoted-printable
+Content-Type: text/html;
+ charset=us-ascii
+
+<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
+charset=3Dus-ascii"></head><body style=3D"word-wrap: break-word; =
+-webkit-nbsp-mode: space; -webkit-line-break: after-white-space; ">I =
+also think that we can add usability features if the underlying secret =
+remains well protected.<div>I do not think there is any reason to assume =
+that the knowledge of the degree of the polynomial, would aid an =
+attacker.</div><div><br></div><div>Similarly a fingerprint of the secret =
+if it is unrelated to the hash used in the polinomyal should leak no =
+useful information,</div><div><br></div><div>The length of such =
+fingerpring (say 4 bytes) and the degree (1 byte) does not seem a big =
+overhead for me.</div><div><br></div><div>Remember that the biggest =
+obstacle of Bitcoin is usability not security.</div><div><div =
+apple-content-edited=3D"true"><br style=3D"color: rgb(0, 0, 0); =
+font-family: Helvetica; font-size: medium; font-style: normal; =
+font-variant: normal; font-weight: normal; letter-spacing: normal; =
+line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: =
+0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
+0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
+"><span style=3D"color: rgb(0, 0, 0); font-family: Helvetica; font-size: =
+medium; font-style: normal; font-variant: normal; font-weight: normal; =
+letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
+-webkit-auto; text-indent: 0px; text-transform: none; white-space: =
+normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; =
+-webkit-text-stroke-width: 0px; display: inline !important; float: none; =
+">Regards,</span><br style=3D"color: rgb(0, 0, 0); font-family: =
+Helvetica; font-size: medium; font-style: normal; font-variant: normal; =
+font-weight: normal; letter-spacing: normal; line-height: normal; =
+orphans: 2; text-align: -webkit-auto; text-indent: 0px; text-transform: =
+none; white-space: normal; widows: 2; word-spacing: 0px; =
+-webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; "><br =
+style=3D"color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
+font-style: normal; font-variant: normal; font-weight: normal; =
+letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
+-webkit-auto; text-indent: 0px; text-transform: none; white-space: =
+normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; =
+-webkit-text-stroke-width: 0px; "><span style=3D"color: rgb(0, 0, 0); =
+font-family: Helvetica; font-size: medium; font-style: normal; =
+font-variant: normal; font-weight: normal; letter-spacing: normal; =
+line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: =
+0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
+0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
+display: inline !important; float: none; ">Tamas Blummer</span><br =
+style=3D"color: rgb(0, 0, 0); font-family: Helvetica; font-size: medium; =
+font-style: normal; font-variant: normal; font-weight: normal; =
+letter-spacing: normal; line-height: normal; orphans: 2; text-align: =
+-webkit-auto; text-indent: 0px; text-transform: none; white-space: =
+normal; widows: 2; word-spacing: 0px; -webkit-text-size-adjust: auto; =
+-webkit-text-stroke-width: 0px; "><span style=3D"color: rgb(0, 0, 0); =
+font-family: Helvetica; font-size: medium; font-style: normal; =
+font-variant: normal; font-weight: normal; letter-spacing: normal; =
+line-height: normal; orphans: 2; text-align: -webkit-auto; text-indent: =
+0px; text-transform: none; white-space: normal; widows: 2; word-spacing: =
+0px; -webkit-text-size-adjust: auto; -webkit-text-stroke-width: 0px; =
+display: inline !important; float: none; "><a =
+href=3D"http://bitsofproof.com">http://bitsofproof.com</a></span>
+</div>
+<br><div><div>On 29.03.2014, at 18:52, Alan Reiner &lt;<a =
+href=3D"mailto:etotheipi@gmail.com">etotheipi@gmail.com</a>&gt; =
+wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
+type=3D"cite">On 03/29/2014 01:19 PM, Matt Whitlock =
+wrote:<br><blockquote type=3D"cite">I intentionally omitted the =
+parameter M (minimum subset size) from the shares because including it =
+would give an adversary a vital piece of information. Likewise, =
+including any kind of information that would allow a determination of =
+whether the secret has been correctly reconstituted would give an =
+adversary too much information. Failing silently when given incorrect =
+shares or an insufficient number of shares is =
+intentional.<br></blockquote><br>I do not believe this is a good =
+tradeoff. &nbsp;It's basically obfuscation of<br>something that is =
+already considered secure at the expense of<br>usability. &nbsp;It's =
+much more important to me that the user understands<br>what is in their =
+hands (or their family members after they get hit by a<br>bus), than to =
+obfuscate the parameters of the secret sharing to provide<br>a tiny =
+disadvantage to an adversary who gets ahold of one. <br><br>The fact =
+that it fails silently is really all downside, not a benefit. <br>If I =
+have enough fragments, I can reconstruct the seed and see that =
+it<br>produces addresses with money. &nbsp;If not, I know I need more =
+fragments. <br>I'm much more concerned about my family having all the =
+info they need to<br>recover the money, than an attacker knowing that he =
+needs two more<br>fragments instead of which are well-secured =
+anyway.<br><br><br><br>---------------------------------------------------=
+---------------------------<br>___________________________________________=
+____<br>Bitcoin-development mailing list<br><a =
+href=3D"mailto:Bitcoin-development@lists.sourceforge.net">Bitcoin-developm=
+ent@lists.sourceforge.net</a><br>https://lists.sourceforge.net/lists/listi=
+nfo/bitcoin-development<br><br></blockquote></div><br></div></body></html>=
+
+--Apple-Mail=_E3FC2F3D-C240-43DE-B860-1AF00BC883C3--
+
+--Apple-Mail=_F4DD87E0-15B5-4313-887A-C78574E68B24
+Content-Transfer-Encoding: 7bit
+Content-Disposition: attachment;
+ filename=signature.asc
+Content-Type: application/pgp-signature;
+ name=signature.asc
+Content-Description: Message signed with OpenPGP using GPGMail
+
+-----BEGIN PGP SIGNATURE-----
+Comment: GPGTools - http://gpgtools.org
+
+iQEcBAEBAgAGBQJTNw38AAoJEPZykcUXcTkcCVkH/jO9W8GMcKuER0UdLA1YnyQ7
+lIsIe2l3Mhf9ouUjatu56COJ2eZIm1eh6PBZSHHJvqhGLhgpaNnTy55Su4Bbwukx
+OBYo2JVCgJd/04oP0eTmPr0Lrxu59rx5Yt9axIu/v5azS6HvNiTKdCWm1C6kjdew
+tYMGuSoNAByYIOqO+YBhFn3a4AYzF6aiLRB0Rzap1ZOyH1iqjst8j6dgWf8Ly9zG
+YBBAJcHB+mAeGIBzh2RxiD34wpMJiitJMZEzwavYh8kCFD9XFVdqJ1T4qJa3LdqI
+ZRuJ9/Xxoa66xAs/wG3IQxFzq15hvOYSk24MTQHuG5JlYgraRjbk8QL7wm5IyS8=
+=QMZn
+-----END PGP SIGNATURE-----
+
+--Apple-Mail=_F4DD87E0-15B5-4313-887A-C78574E68B24--
+
+