diff options
author | Pieter Wuille <pieter.wuille@gmail.com> | 2019-10-07 14:37:41 -0700 |
---|---|---|
committer | Pieter Wuille <pieter.wuille@gmail.com> | 2019-10-07 14:37:41 -0700 |
commit | 15d5aa27323b5a987c02f442b7f00752032af05d (patch) | |
tree | dd9d3ed7818d8dd7a8dc75b806c55950274c400e /bip-taproot.mediawiki | |
parent | 4aa889e6ac8f908aca1e64b6297308aa2d3a3103 (diff) |
Fix formula
Diffstat (limited to 'bip-taproot.mediawiki')
-rw-r--r-- | bip-taproot.mediawiki | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/bip-taproot.mediawiki b/bip-taproot.mediawiki index 4827956..5058255 100644 --- a/bip-taproot.mediawiki +++ b/bip-taproot.mediawiki @@ -141,7 +141,7 @@ As the message for signature verification, transaction digest is ''hash<sub>TapS ** If the <code>SIGHASH_SINGLE</code> flag is set: *** <code>sha_single_output</code> (32): the SHA256 of the corresponding output in <code>CTxOut</code> format. -The total number of bytes hashed is at most ''211''<ref>'''What is the number of bytes hashed for the signature hash?''' The total size of the input to ''hash<sub>TapSighash</sub>'' (excluding the initial 64-byte hash tag) can be computed using the following formula: ''178 - is_anyonecanpay * 50 - is_none * 32 + has_annex * 32''.</ref>. +The total number of bytes hashed is at most ''211''<ref>'''What is the number of bytes hashed for the signature hash?''' The total size of the input to ''hash<sub>TapSighash</sub>'' (excluding the initial 64-byte hash tag) can be computed using the following formula: ''178 - is_anyonecanpay * 52 - is_none * 32 + has_annex * 32''.</ref>. In summary, the semantics of the BIP143 sighash types remain unchanged, except the following: # The way and order of serialization is changed.<ref>'''Why is the serialization in the transaction digest changed?''' Hashes that go into the digest and the digest itself are now computed with a single SHA256 invocation instead of double SHA256. There is no expected security improvement by doubling SHA256 because this only protects against length-extension attacks against SHA256 which are not a concern for transaction digests because there is no secret data. Therefore doubling SHA256 is a waste of resources. The digest computation now follows a logical order with transaction level data first, then input data and output data. This allows to efficiently cache the transaction part of the digest across different inputs using the SHA256 midstate. Additionally, digest computation avoids unnecessary hashing as opposed to BIP143 digests in which parts may be set zero and before hashing them. Despite that, collisions are made impossible by committing to the length of the data (implicit in <code>hash_type</code> and <code>spend_type</code>) before the variable length data.</ref> |