Delivery-date: Wed, 01 Oct 2025 16:04:57 -0700 Received: from mail-oa1-f62.google.com ([209.85.160.62]) by mail.fairlystable.org with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (Exim 4.94.2) (envelope-from ) id 1v45sX-0007rp-CT for bitcoindev@gnusha.org; Wed, 01 Oct 2025 16:04:57 -0700 Received: by mail-oa1-f62.google.com with SMTP id 586e51a60fabf-3649f15224asf577953fac.3 for ; Wed, 01 Oct 2025 16:04:57 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1759359891; cv=pass; d=google.com; s=arc-20240605; b=Blsg5xIYDz/8UGRdtQ9BPa/CLUAI0yz0RyEGX6Lx1Z6/7Tuy6x7ZJQsB8vFRUbiEwG 8RHlxrR18JBG97luHIlH2ST5y1S86SDYNahxWQL7Vj8U3M3IWC1U+7xtUOdcBFQlpjvP mCcN8As31cm7XnMCdTof4nzsbw6GJTFydt8Qp5490qFU31NvDWOqK8ebBka0OwYEhquc fme1pb4PwoKZwAf4QFTnYBL6t27u3JS+5NVCOja+5byKHkB95+cOpf8AzJ/bhqjswt8i ixZEFiTHkFgxX0HJOilzZ9TnFqqCjqMrYXP4p6wbh+4yIPt1VsZ8zQXXd7P6dstCVtIM 6/bQ== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:sender:dkim-signature :dkim-signature; bh=IsQCMdaKCEutZG06kZpZGkLq+G3ZrWESJiky8NngoCw=; fh=cvbBx+m43QcBZOY4TCPA9d4ebTI+DOmjvTsAGweLYzg=; b=DIPMuJKb/Bj3x6dzN9+OIJroY2nWd8YrWjPylqIcottyo0tRXepDVecr0ym0CuRYJ7 tPm11Nz8OEbsqN8pHrAlegk/WKQwD2kAp6cqqJC4Yqvm8PvhnGVGFTasDaDA9o9dEVou d2krOA3nAIccwxb5Zk6BXk2r8zraN0GZxmbSSY6In/bn/Uk91yzMcNM0yNdpXTF1iZxS 3LhooMGap5+fNnomComvUCDphY2g73qOqv8i+18UAvRvwhyyptW36Va3DWQv8JgVZgoE /4f9ZWT0YE5m1ARxzk7CDJrIRheByMg4+pXfOCnJUGciOtyUaFVkS6Iw5d7xOx/4lI07 /4KQ==; darn=gnusha.org ARC-Authentication-Results: i=2; gmr-mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=iL8uQ7Uu; spf=pass (google.com: domain of gmaxwell@gmail.com designates 2607:f8b0:4864:20::532 as permitted sender) smtp.mailfrom=gmaxwell@gmail.com; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com; dara=pass header.i=@googlegroups.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=googlegroups.com; s=20230601; t=1759359891; x=1759964691; darn=gnusha.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-authentication-results :x-original-sender:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:sender:from:to:cc:subject:date:message-id :reply-to; bh=IsQCMdaKCEutZG06kZpZGkLq+G3ZrWESJiky8NngoCw=; b=hcz7RLTujkpkxKWTIWoCOHACzqNCD6jQfDg2yp9ab19xWDWgRfdQhJLafA4pNEWdtK 0AtS0Jvr7/E1WcVlk/McaYMU2LgI9cy5llPr9j/fpM1MjWZYtG7u4KY/CSFhZHVjU1R7 8prWD/phfTqt8j9S10fZovAHUZz0ZmiQARGRkoURgp4hoVy7GJlrOCUY6+XlnSNTLI+r c75wasaJ3c7fM7G83m9VyQzAR/IR5sQfN1X/32BQaIAxmEMgkpVpeEqgEG81XiG6NKCI d7sX+Q7QDMRu9kOcFIR0pQLxcZCUM9ZIxNHKOEzzwQ2OTaE6DA9nYdfxpm8ESgkjwKKX lcsQ== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1759359891; x=1759964691; darn=gnusha.org; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-authentication-results :x-original-sender:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:from:to:cc:subject:date:message-id:reply-to; bh=IsQCMdaKCEutZG06kZpZGkLq+G3ZrWESJiky8NngoCw=; b=jgO/u9WcWM/jNh/xsR1fo0lT986l/Npr0VyAdS9I3wGe8srPPigaIlgP1aECng7RvK YtheWVti9dLc8QcD9uMXCmnFUKfs8fCd6CswDSLyzi2YWxp4czWayEaaGtiJn+sfFUpZ vTjd7uerKJnn392l0fXsdOB3tvTMTVNYo3fHlwzAgBv06RHGkQT2TLRf/Hjvogmxk6gj TltRbBcvatquXs7jWcXAtU8ITJuD+YpwninmLLH+3EB57YVIsSkpADuzO13Yt2ev6j5y c5hVq0yX09oR6GsTYWaWL+at0zf8HlGn6iGEqp5KL5MM//U6uklzZJI5cdE4ewWq8QVv W0kw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759359891; x=1759964691; h=list-unsubscribe:list-subscribe:list-archive:list-help:list-post :list-id:mailing-list:precedence:x-original-authentication-results :x-original-sender:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:x-beenthere:x-gm-message-state:sender:from :to:cc:subject:date:message-id:reply-to; bh=IsQCMdaKCEutZG06kZpZGkLq+G3ZrWESJiky8NngoCw=; b=lWz2FBHzaZ/60KHMr4X7Qs96JjEddgFLMnFyglH9dhI2koq8yKdU/LML6IseWBrupS Jxie2WdE895xbl1mnc6tY4xKDwYbM3toWuAjYmdYAMLQEZ5Yo/QAudFXjAaYHBLqD4ir mkLPeXtdLWifZFNKb1d2R8n9EEWaNsPWYRIxs3udqbOEx8EVtxImiU107Bs7jwqvT47X fnm+Zqdyhuwb1N3E+80NNNqv0yMfqPilKdtkZE9op0x/mOyAYngOk7O6P9gWiMa/3M9G pEoE3pqmrJybXRg1sxDWlYSa7Uf6xolX67Yc5ssO2dwkrmOxYjjaR+icFpDH42T+7f4/ dSQg== Sender: bitcoindev@googlegroups.com X-Forwarded-Encrypted: i=2; AJvYcCXqpEJjjFQBJ4iYqsrdlhiCJT1lhBgRoSkP2QltE5kDfQxvmwe2jQMdFjFuVtyBunBJlaPxiR7IKEBo@gnusha.org X-Gm-Message-State: AOJu0YyvvGSpZrW8gmp7HGAeC5vvrjEL0HTnx0WOmK9TqbylJQ5F8oLU /0vfaM9r5d/Lthj5SykXq6D2OswUebvDzKMx2cEKT03+HemiMhuCCOFT X-Google-Smtp-Source: AGHT+IHNM1rl8rjly+yk+PGGI5utHt/5WFevqyRtd9dh/TK9Kpi3BOWAwpejypAetVZX702N3iQEXg== X-Received: by 2002:a05:6871:740c:b0:346:fff7:91f5 with SMTP id 586e51a60fabf-39b8fbbb5e1mr2604304fac.8.1759359890877; Wed, 01 Oct 2025 16:04:50 -0700 (PDT) X-BeenThere: bitcoindev@googlegroups.com; h="ARHlJd4EbOEiQav3+aO9VrTIlkZ4vbCr7nkvUJBa/aD+wpBz2g==" Received: by 2002:a05:687c:5b:20b0:319:c528:28df with SMTP id 586e51a60fabf-3abfdecafbels122618fac.1.-pod-prod-08-us; Wed, 01 Oct 2025 16:04:47 -0700 (PDT) X-Received: by 2002:a05:6808:1523:b0:43d:3898:ad73 with SMTP id 5614622812f47-43fa407737bmr2935867b6e.5.1759359887651; Wed, 01 Oct 2025 16:04:47 -0700 (PDT) Received: by 2002:a05:6808:8493:b0:3f9:f009:458e with SMTP id 5614622812f47-43fa51797d7msb6e; Wed, 1 Oct 2025 15:10:29 -0700 (PDT) X-Received: by 2002:a17:902:ce12:b0:267:a55a:8684 with SMTP id d9443c01a7336-28e7f2a12e8mr68912265ad.2.1759356628149; Wed, 01 Oct 2025 15:10:28 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1759356628; cv=none; d=google.com; s=arc-20240605; b=BqR6WnGOiJY9wY8tARwv9djP+WuBMOm4G0Nfw6ae6uGxmVj2d21wHhyGuXUCZWojcU RmvARM9LoN6g/5fLtQf4goDWqqTdz6JCwix6htT7SVO/P8/CYH8aZMY1+1DCWmIMsM9g F8ikM6bzDTMM/DU3DyFRudtwlmca+3asu3jdJb/vXm1RipGZIrweglfysPYLUM4DyEie SYw3ettqS8q/TZSlbG5mhkx6MOvihxzK5JnvNJUwGB+kfCv8wBoV0hOBPjIjEBAvKtU5 6943W3XlW/4Wx0V9DkJf3GmepLdpPXD8A2Bq5ZRBUUZH0vcNWlg5HbsV+IUQ/Q1dAu9z ljHQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20240605; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:dkim-signature; bh=yuuGPjyz8+jYZcsbP/ntWzHiVtscd0gVuAi5sYrnXww=; fh=zfrgopOiIZUyW/QOQMW3tlf+B0T0p2fpIoXRbxgb3Y8=; b=PlhPmL7FI0po63vcnbbcYLrToM8qW+tT+cyKM6TY9fT6YieUrYro02v01txShOMPcg yW2mKqeB4iR6bwhnYRCYWaRePfKnagrbxM1QmNuB9imbORGCVpPWc0U+XSPRHaMv5iYU U2Jc6Pu5LEAJsrzxsu4/5qjPmpX7JFyfhfjpAtF4fNMIVIOzqOwlyHx2WawXJz/lnHwP WYOsPA6W52kpssvTGu3goSCctcOW6dFGvvzt+PH5Q87nfIAQ1XQLvmiQExYN2RI8t+zT +id5224Z75URR+zLuR18WaSH7JtJzOxpVQhW5IR2dEwDCN8+mugJlYj2tiYQaIwtu/Ro afNQ==; dara=google.com ARC-Authentication-Results: i=1; gmr-mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=iL8uQ7Uu; spf=pass (google.com: domain of gmaxwell@gmail.com designates 2607:f8b0:4864:20::532 as permitted sender) smtp.mailfrom=gmaxwell@gmail.com; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com; dara=pass header.i=@googlegroups.com Received: from mail-pg1-x532.google.com (mail-pg1-x532.google.com. [2607:f8b0:4864:20::532]) by gmr-mx.google.com with ESMTPS id d9443c01a7336-28e8d19e200si334085ad.6.2025.10.01.15.10.28 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 01 Oct 2025 15:10:28 -0700 (PDT) Received-SPF: pass (google.com: domain of gmaxwell@gmail.com designates 2607:f8b0:4864:20::532 as permitted sender) client-ip=2607:f8b0:4864:20::532; Received: by mail-pg1-x532.google.com with SMTP id 41be03b00d2f7-b550a522a49so291158a12.2 for ; Wed, 01 Oct 2025 15:10:28 -0700 (PDT) X-Gm-Gg: ASbGnctK1FN8inr/t2UV/K89KrRKCagJnum91hTjCTJOlvAbkzqotTk7w6s/lwjBzmJ N4syZITJ1Vq5inYWo6+670aAK6oa6M/Ah5Lff26uqh/hQjUAZjhnQDIulCtXcqlu48qIn8mnfGw gOvCihAJ80ZydWs1Yd/xLH2uL1b9KgxiLyMm6jAZo19IRhOcCrS/rVeD/e3Ag+LetbyBfeDQc44 HsQNX/WXibZ9MImiiaszxzxxnhbtSs= X-Received: by 2002:a17:902:e74c:b0:269:b6c8:4a4b with SMTP id d9443c01a7336-28e7f2a11f7mr66080255ad.6.1759356627678; Wed, 01 Oct 2025 15:10:27 -0700 (PDT) MIME-Version: 1.0 References: <0f6c92cc-e922-4d9f-9fdf-69384dcc4086n@googlegroups.com> In-Reply-To: <0f6c92cc-e922-4d9f-9fdf-69384dcc4086n@googlegroups.com> From: Greg Maxwell Date: Wed, 1 Oct 2025 22:10:16 +0000 X-Gm-Features: AS18NWAvGuLMfOomsncGPxBndLt8NiWwNsgp__bUId91HNRuOrW3Nu2xEWXOAXA Message-ID: Subject: Re: [bitcoindev] On (in)ability to embed data into Schnorr To: "waxwing/ AdamISZ" Cc: Bitcoin Development Mailing List Content-Type: multipart/alternative; boundary="000000000000d37ae80640202275" X-Original-Sender: gmaxwell@gmail.com X-Original-Authentication-Results: gmr-mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=iL8uQ7Uu; spf=pass (google.com: domain of gmaxwell@gmail.com designates 2607:f8b0:4864:20::532 as permitted sender) smtp.mailfrom=gmaxwell@gmail.com; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com; dara=pass header.i=@googlegroups.com Precedence: list Mailing-list: list bitcoindev@googlegroups.com; contact bitcoindev+owners@googlegroups.com List-ID: X-Google-Group-Id: 786775582512 List-Post: , List-Help: , List-Archive: , List-Unsubscribe: , X-Spam-Score: -0.5 (/) --000000000000d37ae80640202275 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Intuitively it sounds likely, -- just in that the available values are a image on the curve and a value summed with a hash dependent on everything else. I think it would be hard to prove. But is it even really worth the analysis when grinding gets you a 12% embedding rate in that signature at not that significant cost? (because you can independently grind the nonce and signature itself, or nonce and pubkey) -- and when beyond the cost of the additional signature (making the output 3x its cost) requiring signing when forming the address completely kills public derivation, multisig with cold keys. etc? ... and then any of whatever spam concerns people have would likely be exacerbated by the spammers using more resources due to the embedding rate? Also re private key leaking an utxo set, well not so if it's part of an explicit multisig. E.g. 2 of 2 with leaked key and a secure one. On Wed, Oct 1, 2025 at 7:50=E2=80=AFPM waxwing/ AdamISZ wrote: > Hi all, > > https://github.com/AdamISZ/schnorr-unembeddability/ > > Here I'm analyzing whether the following statement is true: "if you can > embed data into a (P, R, s) tuple (Schnorr pubkey and signature, BIP340 > style), without grinding or using a sidechannel to "inform" the reader, y= ou > must be leaking your private key". > > See the abstract for a slightly more fleshed out context. > > I'm curious about the case of P, R, s published in utxos to prevent usage > of utxos as data. I think this answers in the half-affirmative: you can > only embed data by leaking the privkey so that it (can) immediately fall > out of the utxo set. > > (To emphasize, this is different to the earlier observations (including b= y > me!) that just say it is *possible* to leak data by leaking the private > key; here I'm trying to prove that there is *no other way*). > > However I still am probably in the large majority that thinks it's > appalling to imagine a sig attached to every pubkey onchain. > > Either way, I found it very interesting! Perhaps others will find the > analysis valuable. > > Feedback (especially of the "that's wrong/that's not meaningful" variety) > appreciated. > > Regards, > AdamISZ/waxwing > > -- > You received this message because you are subscribed to the Google Groups > "Bitcoin Development Mailing List" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to bitcoindev+unsubscribe@googlegroups.com. > To view this discussion visit > https://groups.google.com/d/msgid/bitcoindev/0f6c92cc-e922-4d9f-9fdf-6938= 4dcc4086n%40googlegroups.com > > . > --=20 You received this message because you are subscribed to the Google Groups "= Bitcoin Development Mailing List" group. To unsubscribe from this group and stop receiving emails from it, send an e= mail to bitcoindev+unsubscribe@googlegroups.com. To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/= CAAS2fgQRz%3DEJ%2BNm2rxrB_SEpqroFbcc%2BhUhmghJJ1jrJc-WUDA%40mail.gmail.com. --000000000000d37ae80640202275 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Intuitively it sounds likely, -- just in that the ava= ilable values are a image on the curve and a value summed with a hash depen= dent on everything else.=C2=A0 I think it would be hard to prove.

But is it even really worth the analysis when grinding gets= you a 12% embedding rate in that signature at not that significant cost? (= because you can independently grind the nonce and signature itself, or nonc= e and pubkey) -- and when beyond the cost of the additional signature (maki= ng the output 3x its cost) requiring signing when forming the address compl= etely kills public derivation, multisig with cold keys. etc?=C2=A0 ... and = then any of whatever spam concerns people have would likely be exacerbated = by the spammers using more resources due to the embedding rate?
<= br>
Also re private key leaking an utxo set, well not so if it= 9;s part of an explicit multisig. E.g. 2 of 2 with leaked key and a secure = one.




On Wed, Oct 1, 2025 at 7:50=E2=80=AFPM waxwing/ AdamISZ <ekaggata@gmail.com> wrote:
Hi all,


Here I'm analyzing whether the following statement is true: &qu= ot;if you can embed data into a (P, R, s) tuple (Schnorr pubkey and signatu= re, BIP340 style), without grinding or using a sidechannel to "inform&= quot; the reader, you must be leaking your private key".
See the abstract for a slightly more fleshed out context.
=

I'm curious about the case of P, R, s published in = utxos to prevent usage of utxos as data. I think this answers in the half-a= ffirmative: you can only embed data by leaking the privkey so that it (can)= immediately fall out of the utxo set.

(To emphasi= ze, this is different to the earlier observations (including by me!) that j= ust say it is *possible* to leak data by leaking the private key; here I= 9;m trying to prove that there is *no other way*).

However I still am probably in the large majority that thinks it's app= alling to imagine a sig attached to every pubkey onchain.

Either way, I found it very interesting! Perhaps others will find t= he analysis valuable.

Feedback (especially of the = "that's wrong/that's not meaningful" variety) appreciated= .

Regards,
AdamISZ/waxwing

--
You received this message because you are subscribed to the Google Groups &= quot;Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an e= mail to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.googl= e.com/d/msgid/bitcoindev/0f6c92cc-e922-4d9f-9fdf-69384dcc4086n%40googlegrou= ps.com.

--
You received this message because you are subscribed to the Google Groups &= quot;Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an e= mail to bitcoind= ev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.co= m/d/msgid/bitcoindev/CAAS2fgQRz%3DEJ%2BNm2rxrB_SEpqroFbcc%2BhUhmghJJ1jrJc-W= UDA%40mail.gmail.com.
--000000000000d37ae80640202275--