BIP: To be determined
  Layer: Applications
  Title: Bitcoin Secure Multisig Setup (BSMS)
  Author: Hugo Nguyen , Peter Gray , Marko Bencun , Aaron Chen , Rodolfo Novak 
  Comments-Summary: No comments yet.
  Comments-URI:
  Status: Proposed
  Type: Standards Track
  Created: 2020-11-10
  License: BSD-2-Clause
==Introduction== ===Abstract=== This document proposes a mechanism to set up multisig wallets securely. ===Copyright=== This BIP is licensed under the 2-clause BSD license. ===Motivation=== The Bitcoin multisig experience has been greatly streamlined under [https://github.com/bitcoin/bips/blob/master/bip-0174.mediawiki BIP-0174 (Partially Signed Bitcoin Transaction)]. However, what is still missing is a standardized process for setting up multisig wallets securely across different vendors. There are a number of concerns when it comes to setting up a multisig wallet: # Whether the multisig configuration, such as Signer membership, script type, derivation paths and number of signatures required, is correct and not tampered with. # Whether the keys or the multisig configuration are leaked during the setup. # Whether the Signer persists the multisig configuration in their respective storage, and under what format. # Whether the Signer's storage is tamper-proof. # Whether the Signer subsequently uses the multisig configuration to generate and verify receive and change addresses. An attacker who can modify the multisig configuration can steal or hold funds for ransom by duping the user into sending funds to the wrong address. An attacker who cannot modify the configuration but can learn about the keys and/or the configuration can monitor transactions in the wallet, resulting in loss of privacy. This proposal seeks to address concerns #1, #2 and #3: to mitigate the risk of tampering during the initial setup phase, and to define an interoperable multisig configuration format. Concerns #4 and #5 should be handled by Signers and are out of scope of this proposal. ==Specification== ===Prerequisites=== This proposal assumes the parties in the multisig support [https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki BIP-0032], [https://github.com/bitcoin/bips/blob/master/bip-0322.mediawiki BIP-0322], [https://github.com/bitcoin/bitcoin/blob/master/doc/descriptors.md the descriptor language] and [https://tools.ietf.org/html/rfc3686 AES encryption]. ===File Extension=== All descriptor and key records should have a .bsms file extension. Encrypted data should have a .dat extension. ===Roles=== ====Coordinator==== The Coordinator initiates the multisig setup. The Coordinator determines what type of multisig is used and the exact policy script. If encryption is enabled, the Coordinator also distributes a shared secret or shared secrets to the parties involved for secure communication. The Coordinator gathers information from the Signers to generate a descriptor record. The Coordinator distributes the descriptor record back to the Signers. ====Signer==== The Signer is any software or hardware that controls the private keys and can sign using those keys. The Signer is a participating member in the multisig. Its responsibilities include providing its key record -- which contains a public key or an Extended Public Key (XPUB) -- to the Coordinator, verifying that its key is included in the descriptor record and persisting the descriptor record in its storage. ===Setup Process=== ====Round 1==== =====Coordinator===== * The Coordinator creates a new multisig wallet creation session. The Coordinator constructs the multisig script and its policy parameters, such as the required number of signatures and the total number of Signers (M and N). * The session should expire after some time period determined by the Coordinator, e.g., 24 hours. The timeout allows the encryption key to have lower entropy. * If encryption is enabled, the Coordinator distributes a secret TOKEN to each Signer over a secure channel. The Signer can use the TOKEN to derive an ENCRYPTION_KEY. Refer to the Encryption section below for details on the TOKEN, the key derivation function and the encryption scheme. Depending on the use case, the Coordinator can decide whether to share one common TOKEN for all Signers, or to have one per Signer. * If encryption is disabled, the TOKEN is set to 0x00, and all the encryption/decryption steps below can be skipped. =====Signer===== * The Signer initiates the multisig wallet creation session by setting the TOKEN. The Signer derives an ENCRYPTION_KEY from the TOKEN. The Signer can keep the session open until a different value for the TOKEN is set. * The Signer generates a key record by prompting the user for a multisig derivation path and retrieves the key at that derivation path. Alternatively, the Signer can choose a path on behalf of the user. If the Signer chooses the path, it should try to avoid reusing keys for different wallets. * The first line in the record must be the specification version (BSMS 1.0 as of this writing). The second line must be the hex-encoded TOKEN. The third line must be the KEY. The KEY is a public key or an XPUB plus the key origin information, written in the descriptor-defined format, i.e.: [{master key fingerprint}/{derivation path}]{KEY}. The fourth line is a text description of the key, 80 characters maximum. The fifth line must be a SIG, whereas SIG is the signature generated by using the private key associated with the public key or XPUB to sign the first four lines. The signature should follow [https://github.com/bitcoin/bips/blob/master/bip-0322.mediawiki BIP-0322], legacy format accepted. * The Signer calculates the Message Authentication Code (MAC) for the record. The first 16 bytes of the MAC serves as the Initialization Vector (IV) for the encryption. * The Signer encrypts the key record with the ENCRYPTION_KEY and IV. * The Signer encodes the MAC and the ciphertext into hexadecimal format, then concatenates the results: (MAC || ciphertext). ====Round 2==== =====Coordinator===== * The Coordinator gathers key records from all participating Signers. The Coordinator verifies that there are exactly N unique key records before the wallet setup session expires. * For each key record, the Coordinator extracts the MAC from the data, sets IV to the first 16 bytes of the MAC, then decrypts the ciphertext using the ENCRYPTION_KEY and IV. * The Coordinator verifies that the included MAC is valid given the plaintext. * The Coordinator verifies that the key records have compatible specification versions. * The Coordinator verifies that the included SIG is valid given the KEY. * If all key records look good, the Coordinator fills in all necessary information to generate a descriptor record. * The first line in the descriptor record must be the specification version (BSMS 1.0 as of this writing). The second line must be a descriptor or a descriptor template. The third line must be a comma-separated list of accepted derivation paths, to be applied to the template. The paths must start with / and use non-hardened derivation. If there are no template or restrictions, it must say No path restrictions. The fourth line must be the wallet's first address. If there are path restrictions, use the first address from the first path restriction. * The Coordinator calculates the MAC for the record. The first 16 bytes of the MAC serves as the IV for the encryption.. * The Coordinator encrypts the descriptor record with the ENCRYPTION_KEY and IV. * The Coordinator encodes the MAC and the ciphertext into hexadecimal format, then concatenates the results: (MAC || ciphertext). * The Coordinator sends the encrypted descriptor record to all participating Signers. =====Signer===== * The Signer imports the descriptor record. * The Signer extracts the MAC from the data, sets IV to the first 16 bytes of the MAC, then decrypts the ciphertext using the ENCRYPTION_KEY (derived from the open session) and IV. * The Signer verifies that the included MAC is valid given the plaintext. * The Signer verifies that it can support the included specification version. * The Signer verifies that it can support the descriptor or descriptor template. * The Signer checks that its KEY is included in the descriptor, using path and fingerprint information provided. The check must perform an exact match on the KEYs and not using shortcuts such as matching fingerprints, which is trivial to spoof. * The Signer verifies that it is compatible with the derivation path restrictions. * The Signer verifies that the wallet's first address is valid given the descriptor and the path restrictions. * For confirmation, the Signer must display to the user the wallet's first address and policy parameters, including, but not limited to: the derivation path restrictions, M, N, and the position(s) of the Signer's own KEY in the policy script. The total number of Signers, N, is important to prevent a KEY insertion attack. The position is important for scripts where KEY order matters. When applicable, all positions of the KEY must be displayed. The full descriptor must also be available for review upon user request. * Parties must check with each other that all Signers have the same confirmation (except for the KEY positions). * If all checks pass, the Signer must persist the descriptor record in its storage. This completes the setup. ===Encryption=== ====The Token==== We define three modes of encryption. # NO_ENCRYPTION : the TOKEN is set to 0x00. Encryption is disabled. # STANDARD : the TOKEN is a 64-bit nonce. # EXTENDED : the TOKEN is a 96-bit nonce. The TOKEN can be converted to one of these formats: * A decimal number (recommended). The number must not exceed the maximum value of the nonce. * A mnemonic phrase using [https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki BIP-0039] word list (6 words in STANDARD mode; 9 words in EXTENDED mode). * A QR code. * Other formats. The flexibility in the data format allows each Signer to customize the User Experience based on its respective capabilities. ====Key Derivation==== The key derivation function is [https://tools.ietf.org/html/rfc2898 PBKDF2], with PRF = SHA512. Specifically: DKey = PBKDF2(PRF, Password, Salt, c, dkLen) Whereas: * PRF = SHA512 * Password = "No SPOF" * Salt = TOKEN * c = 2048 * dkLen = 256 * DKey = Derived ENCRYPTION_KEY ====Encryption Scheme==== The encryption scheme is [https://tools.ietf.org/html/rfc3686 AES-256-CTR]. MAC = HMAC-SHA256(HMAC_Key, hex-encoded TOKEN || Data) IV = First 16 bytes of MAC Ciphertext = AES-256-CTR-Encrypt(Plaintext, DKey, IV) Plaintext = AES-256-CTR-Decrypt(Ciphertext, DKey, IV) Whereas: * DKey = ENCRYPTION_KEY * HMAC_Key = SHA256(ENCRYPTION_KEY) * Data = the plaintext, e.g. the entire key record in round 1 and the entire descriptor record in round 2 The MAC is to be sent along with the key and descriptor record, as specified above. Because it is a MAC over the entire plaintext, this is essentially an [https://en.wikipedia.org/wiki/Authenticated_encryption#Encrypt-and-MAC_(E&M) Encrypt-and-MAC] form of authenticated encryption. ==QR Codes== For signers that use QR codes to transmit data, key and descriptor records can be converted to QR codes, following [https://github.com/BlockchainCommons/Research/blob/master/papers/bcr-2020-005-ur.md the BCR standard]. Also refer to [https://github.com/BlockchainCommons/Research/blob/master/papers/bcr-2020-015-account.md UR Type Definition for BIP44 Accounts] and [https://github.com/BlockchainCommons/Research/blob/master/papers/bcr-2020-010-output-desc.md UR Type Definition for Bitcoin Output Descriptors] for more details. ==Security== This proposal introduces two layers of protection. The first one is a temporary, secret TOKEN. The second one is the confirmation of the wallet's first address. The TOKEN is used to encrypt the two rounds of communication between the Signer and the Coordinator. A MAC is also generated from the TOKEN and plaintext to authenticate the data being exchanged. The TOKEN is only needed during the setup phase, and can be safely discarded afterwards. The wallet's first address, on the other hand, can be used to verify the integrity of the multisig configuration. An attacker who tampers with the multisig configuration must also change the wallet's first address. Parties must check with each other that all Signers confirm to the same address and policy parameters to reduce the chance of tampering. ==Privacy== Encryption helps improve the privacy of the wallet by avoiding sharing keys and descriptors in plaintext. If the parties wish to have stronger privacy, it is recommended to use a higher number of bits for the TOKEN, and to completely erase knowledge of the TOKEN after the multisig wallet has been set up. ==Descriptor Template== The output descriptor language only supports one-dimensional lists. This proposal introduces a descriptor template to represent multi-dimensional lists: XPUB/** Whereas ** can be replaced by any number of derivation paths. If there is a descriptor template in the descriptor record, Signers should expand the template into concrete descriptors by using the derivations paths provided in the record. For example, the following template and derivation paths: * wsh(sortedmulti(2,XPUB1/**,XPUB2/**)) * /0/*,/1/* Should translate to two concrete descriptors: * wsh(sortedmulti(2,XPUB1/0/*,XPUB2/0/*)) * wsh(sortedmulti(2,XPUB1/1/*,XPUB2/1/*)) ==Test Vectors== ===Mode: NO_ENCRYPTION=== ====ROUND 1==== * Coordinator ** M-of-N: 2/2 ** ADDRESS_TYPE: NATIVE_SEGWIT ** TOKEN: 0 * Signer 1 ** MASTER_KEY_FINGERPRINT: 00e41fee ** PRIVATE_KEY (m/48'/0'/0'/2'): Kwm5qHwBJsETapvfzBcdSAE9rU1BMBkC4cEvLAKDDBE9FPCz8ppB ** XPUB (m/48'/0'/0'/2'): xpub6DrL7eCUEzkd2wy3tJDUKK6MobKt2ijAxUYyAHGVojjUysj5zY2yw8NgpgbLd85EDFSKGXkLL5cdKBJr9rjFvRRagEWWkNKvgFsezSHsPKz ** Legacy signature ** signer_1_key.bsms:
BSMS 1.0
00
[00e41fee/48'/0'/0'/2']xpub6DrL7eCUEzkd2wy3tJDUKK6MobKt2ijAxUYyAHGVojjUysj5zY2yw8NgpgbLd85EDFSKGXkLL5cdKBJr9rjFvRRagEWWkNKvgFsezSHsPKz
Signer 1 key
HzNPcPGSOQLxOX0890nAZmLndSjtz33/Swt9jPtz+K5bLBQXZ1fBPC0y3khgvgD9o9ZSA7hPqxdLUDjPEnMj5UE=
* Signer 2 ** MASTER_KEY_FINGERPRINT: 041a5f9d ** PRIVATE_KEY (m/48'/0'/0'/2'): KyfXyyvgv5DmaPnnWFsBPann23Rt4ExkgEwL4hR2wHmP1wiRQMWT ** XPUB (m/48'/0'/0'/2'): xpub6Ep74UnuW7KA8u2zgyAW11BEy9n7aZgcrjZsef65ZjHub8tPh6ZE8YaVNdP5UDQtuqYN7ABbBEde6DBLcv1QQVJdXYfSNwLnvMeqvnDM15b ** Legacy signature ** signer_2_key.bsms:
BSMS 1.0
00
[041a5f9d/48'/0'/0'/2']xpub6Ep74UnuW7KA8u2zgyAW11BEy9n7aZgcrjZsef65ZjHub8tPh6ZE8YaVNdP5UDQtuqYN7ABbBEde6DBLcv1QQVJdXYfSNwLnvMeqvnDM15b
Signer 2 key
H2q51+r17NY3oMi7kkuCz6gA3Ze+FtPfOYWcpI03gmYnaJScfXunGwjRSG5WpdBmAEYRH+clVmqeaahsgPccqeo=
====ROUND 2==== * Coordinator ** my_multisig_wallet.bsms:
BSMS 1.0
wsh(sortedmulti(2,[00e41fee/48'/0'/0'/2']xpub6DrL7eCUEzkd2wy3tJDUKK6MobKt2ijAxUYyAHGVojjUysj5zY2yw8NgpgbLd85EDFSKGXkLL5cdKBJr9rjFvRRagEWWkNKvgFsezSHsPKz/*,[041a5f9d/48'/0'/0'/2']xpub6Ep74UnuW7KA8u2zgyAW11BEy9n7aZgcrjZsef65ZjHub8tPh6ZE8YaVNdP5UDQtuqYN7ABbBEde6DBLcv1QQVJdXYfSNwLnvMeqvnDM15b/*))#x5ckx6kc
/0/*,/1/*
bc1qgh7jg86mj7lt2gcd7rqdyz2hx8vj3h60f0plquaqxpcw9efxfaks7yx7y5
===Mode: STANDARD Encryption=== ====ROUND 1==== * Coordinator ** M-of-N: 2/2 ** ADDRESS_TYPE: NATIVE_SEGWIT ** TOKEN (hex): 2c872a7af4b2f520 *** TOKEN (decimal): 3208579967104513312 *** TOKEN (mnemonic): clutch deer pact truly consider mosquito ** ENCRYPTION_KEY (hex): 822d802f4670abbf01fc2b6fe71d9a372bc4e819569154cfc1db4be567a80336 * Signer 1 ** MASTER_KEY_FINGERPRINT: 5a2ea679 ** PRIVATE_KEY (m/48'/0'/0'/2'): L1R9BexLnWSbtzdeL9F6GL8w2i4eM3qwvvRL6iXVfVerCG79J9YN ** XPUB (m/48'/0'/0'/2'): xpub6EbVsEmr7VHTj4GSQJ8J3YuaKthihAg33dodnZ8ocvj9EMNVCBq2dCoMSkSjsshqpKVdBSua5pUaqWTHbNkxVm4f9MDAMY7LE5wsvTctSQP ** Legacy signature ** signer_1_key.bsms:
BSMS 1.0
2c872a7af4b2f520
[5a2ea679/48'/0'/0'/2']xpub6EbVsEmr7VHTj4GSQJ8J3YuaKthihAg33dodnZ8ocvj9EMNVCBq2dCoMSkSjsshqpKVdBSua5pUaqWTHbNkxVm4f9MDAMY7LE5wsvTctSQP
Signer 1 key
IKaOunXsMpnQOuEsbOeD2207uwKAoStp73VS1LeqbGfZQLJPdeQ49rAM/1CLJpUAWO9LUYQKsIu8pB56jjrUOmA=
* Signer 1 encryption ** HMAC_KEY (hex): cf629cab57753f5975a8f5b023fa033af66fb104f69245a99dc823f2a0db6791 ** MAC (hex): ac4589ae73e4a5e1459c3087cbcc0db52dd93e8495ca4b410704d9a6ddb2e905 ** IV (hex) : ac4589ae73e4a5e1459c3087cbcc0db5 ** CIPHERTEXT (hex): 2abd1534e395d44047417ede3d4b61fbdc05c948e965b550075d8432ebe9f1b10eb37e69dfd972d8dc944a3a906a8bbcd00551b075eb4556f66f3e809c2798e7c0d8b06675a5c513fc65f9858d97259cc48a3224a23eadb5d7035899bdcbf792f62397fed4ab4a606526c1e40a7edd4a0f3e44470a26d850f64edbca71da6c14aa9e495ae5f9079bac7efb3cf0e4f49f8f7aaac976af42659fbf540c7717c29b7944be27f9bd6023c2c86ff290a6e66d49c627eddd8a5190f2e40d58e8a127e5b95c61fa183ac446619138b233bdec28eda87f5f4c0fc7493d8be924d3f75214c26c774bf21cbf781a44abeca6b984322eaff4ea330f87528d69514d83e816aaea2434bdee15 ** signer_1_key.dat:
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
* Signer 2 ** MASTER_KEY_FINGERPRINT: 21383fe9 ** PRIVATE_KEY (m/48'/0'/0'/2'): KzpgvbUzVeDCn8rdHiSsYWTC75ZrmWK58aJF2dkzdxaBTEwjsgeK ** XPUB (m/48'/0'/0'/2'): xpub6DqrTSNEY3aVyVxZaxMZvPnERg3NWWPCj4NQYqCDbd4eau2v9yQ81rwnopiMnVVE3YGjNtEZJVRc7YEDY5L3dG1dsgWzvXoE587QA8Dzr1c ** Legacy signature ** signer_2_key.bsms:
BSMS 1.0
2c872a7af4b2f520
[21383fe9/48'/0'/0'/2']xpub6DqrTSNEY3aVyVxZaxMZvPnERg3NWWPCj4NQYqCDbd4eau2v9yQ81rwnopiMnVVE3YGjNtEZJVRc7YEDY5L3dG1dsgWzvXoE587QA8Dzr1c
Signer 2 key
H4pj0+/d89BrY4v1mDw+oobMhuJAjiRh/Ia1jSMwoENEao3kyqEcuHgvizOqGo7X0vdwlhQvOYBmjgV5xn2nvgk=
* Signer 2 encryption ** HMAC_KEY (hex): cf629cab57753f5975a8f5b023fa033af66fb104f69245a99dc823f2a0db6791 ** MAC (hex): 8682c41113aa3a5f42891f3dc513dd5d3ee8c817136cfa7998e7917e2b74d801 ** IV (hex) : 8682c41113aa3a5f42891f3dc513dd5d ** CIPHERTEXT (hex): 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 ** signer_2_key.dat:
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
====ROUND 2==== *Coordinator ** my_multisig_wallet.bsms:
BSMS 1.0
wsh(sortedmulti(2,[5a2ea679/48'/0'/0'/2']xpub6EbVsEmr7VHTj4GSQJ8J3YuaKthihAg33dodnZ8ocvj9EMNVCBq2dCoMSkSjsshqpKVdBSua5pUaqWTHbNkxVm4f9MDAMY7LE5wsvTctSQP/*,[21383fe9/48'/0'/0'/2']xpub6DqrTSNEY3aVyVxZaxMZvPnERg3NWWPCj4NQYqCDbd4eau2v9yQ81rwnopiMnVVE3YGjNtEZJVRc7YEDY5L3dG1dsgWzvXoE587QA8Dzr1c/*))#lfv5nh7v
/0/*,/1/*
bc1qr3cmly26qp4elq6dhp6zm4fe7sw46w8fqe6ut4cp6e6zckewx7eqmqjk3r
*Coordinator encryption ** HMAC_KEY (hex): cf629cab57753f5975a8f5b023fa033af66fb104f69245a99dc823f2a0db6791 ** MAC (hex): 34a56c778bb14b3625637ab4290c1b3b5fb3f7e20d2fba4052643cc6cdcd2fc5 ** IV (hex) : 34a56c778bb14b3625637ab4290c1b3b ** CIPHERTEXT (hex): 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 ** my_multisig_wallet.dat:
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
===Mode: EXTENDED Encryption=== ====ROUND 1==== *Coordinator ** M-of-N: 2/3 ** ADDRESS_TYPE: NESTED_SEGWIT ** TOKEN for Signer 1 (hex): 3e4e9f4a9bab074a1416b506 *** TOKEN (decimal): 19283119055400240376301663494 *** TOKEN (mnemonic): dinner insane sport dance race pink expect stove alcohol *** ENCRYPTION_KEY (hex): 06eb820f8343d941740e3f960c4df2ace84026abc3c1faca5ca487974341ccc0 ** TOKEN for Signer 2 (hex): 4c6d6215d13f7a1e9183f810 *** TOKEN (decimal): 23653096855135070925426522128 *** TOKEN (mnemonic): erase help lyrics pen waste aunt ecology lecture awkward *** ENCRYPTION_KEY (hex): f5d79f32ad11cec172e088ab84bbfbea65790c9a5f7292912edc2ca42c6bfd1d ** TOKEN for Signer 3 (hex): 70d41aaf4c4561c19205d819 *** TOKEN (decimal): 34918739388953622996442273817 *** TOKEN (mnemonic): ignore patch profit obtain figure this elite roast book *** ENCRYPTION_KEY (hex): b2bd2e480807f374177c0136bf14b318608e376a6c64ac026a3081a26d2664ca * Signer 1 ** MASTER_KEY_FINGERPRINT: 1af5fed9 ** PRIVATE_KEY (m/48'/0'/0'/1'): L4VABXeok8NSrEewRijcHY1AfzDpqQfzrbHDgmnj3j7vBgRaoofF ** XPUB (m/48'/0'/0'/1'): xpub6Dk872oqUVGBi8rUjch8SBmvjYcXe4Ege93fsZ4utmZmyVgtjYiRqnvdUX3L8TfRdbPGXPuB8F7dBvecsgC75oSzCje9824wMtM4R3qDtoZ ** Legacy signature ** signer_1_key.bsms:
BSMS 1.0
3e4e9f4a9bab074a1416b506
[1af5fed9/48'/0'/0'/1']xpub6Dk872oqUVGBi8rUjch8SBmvjYcXe4Ege93fsZ4utmZmyVgtjYiRqnvdUX3L8TfRdbPGXPuB8F7dBvecsgC75oSzCje9824wMtM4R3qDtoZ
Signer 1 key
IIB9bS+1UiqePqzeuQjOYVxr/ElW7ZpDazsmLC1WXgopB1PuEM0VDVVMybHXPPCnR8jB3JBO+1G2H2fYAbo5Td8=
* Signer 1 encryption ** HMAC_KEY (hex): c9d881d28107d51c05b5c4252de0afac9dcfbe056f78ae690fc1cfed2a39d17c ** MAC (hex): 9ee541d02fdd920c9be4528f262f2b4799a1cb0360d43fa4d3cfa436710d958a ** IV (hex) : 9ee541d02fdd920c9be4528f262f2b47 ** CIPHERTEXT (hex): 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 ** signer_1_key.dat:
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
* Signer 2 ** MASTER_KEY_FINGERPRINT: bbe4987a ** PRIVATE_KEY (m/48'/0'/0'/1'): L3chGYUbvkxJuv61Vx6mmBWmDyBi7HnWDqLtTKokeKuy5GmKRx53 ** XPUB (m/48'/0'/0'/1'): xpub6EC1EmDURTiXqb4FCmANE1u5jybxqv8qyxXp6JKVJQTzGaF4JWzPhASkHb9RUuHS7hEKZ3iouARzCrhG3E6SauuefL1LrLoAtKHvmDJ1JFK ** Legacy signature ** signer_2_key.bsms:
BSMS 1.0
4c6d6215d13f7a1e9183f810
[bbe4987a/48'/0'/0'/1']xpub6EC1EmDURTiXqb4FCmANE1u5jybxqv8qyxXp6JKVJQTzGaF4JWzPhASkHb9RUuHS7hEKZ3iouARzCrhG3E6SauuefL1LrLoAtKHvmDJ1JFK
Signer 2 key
H4tcaRaEGIPHDg+e+8MxPyYyo3qk9ZKPAIdYQY3iXZOPfb1W96FqzP+6KMj5ov8OSIjeA9PEtRVLUmsMoVnR7EA=
* Signer 2 encryption ** HMAC_KEY (hex): 8050b80716db042130c7aaf086a0b3e59d8d3e59c0d689c6b61fb2e5ccd9644b ** MAC (hex): 991dc1aa90ccb22ff410208efc4f8132a5d11586e21d76f273180b53d30046f8 ** IV (hex) : 991dc1aa90ccb22ff410208efc4f8132 ** CIPHERTEXT (hex): 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 ** signer_2_key.dat:
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
* Signer 3 ** MASTER_KEY_FINGERPRINT: 887d1ce9 ** PRIVATE_KEY (m/48'/0'/0'/1'): L384ku43jpVYKWWaD1nxRifALPNXyHL3hWNtThByByP5ZMQxs427 ** XPUB (m/48'/0'/0'/1'): xpub6Eof6ipAiAqiGdnFdoKA4nJv19rQwR1NFCKWvjpcNeB3ZyLPHBek9rotgxCKyGn8CumDagZzTXwHaAyZPxQujRZVTDP3KmpceWZHiwe4bZP ** Legacy signature ** signer_3_key.bsms:
BSMS 1.0
70d41aaf4c4561c19205d819
[887d1ce9/48'/0'/0'/1']xpub6Eof6ipAiAqiGdnFdoKA4nJv19rQwR1NFCKWvjpcNeB3ZyLPHBek9rotgxCKyGn8CumDagZzTXwHaAyZPxQujRZVTDP3KmpceWZHiwe4bZP
Signer 3 key
ICQQ5vlCvv8+6z+peuvKTtSRRs7rodHmfcDQZkArxr5DQ8PkHvjIA92y6FrGCUDG0ruO46qYiFTeRUi0HCX8CcU=
* Signer 3 encryption ** HMAC_KEY (hex): 52f0fc79116014738144d4e04d88d581267f15f004c29492ea65f05b7489ce66 ** MAC (hex): 9240bac748bbc04138e20b0efb11655fdaa2067897bb375f0c274c9e6b168cba ** IV (hex) : 9240bac748bbc04138e20b0efb11655f ** CIPHERTEXT (hex): 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 ** signer_3_key.dat:
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
====ROUND 2==== * Coordinator ** my_multisig_wallet.bsms:
BSMS 1.0
sh(wsh(multi(2,[1af5fed9/48'/0'/0'/1']xpub6Dk872oqUVGBi8rUjch8SBmvjYcXe4Ege93fsZ4utmZmyVgtjYiRqnvdUX3L8TfRdbPGXPuB8F7dBvecsgC75oSzCje9824wMtM4R3qDtoZ/*,[bbe4987a/48'/0'/0'/1']xpub6EC1EmDURTiXqb4FCmANE1u5jybxqv8qyxXp6JKVJQTzGaF4JWzPhASkHb9RUuHS7hEKZ3iouARzCrhG3E6SauuefL1LrLoAtKHvmDJ1JFK/*,[887d1ce9/48'/0'/0'/1']xpub6Eof6ipAiAqiGdnFdoKA4nJv19rQwR1NFCKWvjpcNeB3ZyLPHBek9rotgxCKyGn8CumDagZzTXwHaAyZPxQujRZVTDP3KmpceWZHiwe4bZP/*)))#uf57h08d
/0/*,/1/*
3ApQjkfMvzZiWxpdJeNex4c71aWjHyMkPk
* Send to Signer 1: ** HMAC_KEY (hex): c9d881d28107d51c05b5c4252de0afac9dcfbe056f78ae690fc1cfed2a39d17c ** MAC (hex): b432a7312b64b561592876cb0d63ec5d2f3fb9b24fe0fd6200a4733f4cb0fa2b ** IV (hex) : b432a7312b64b561592876cb0d63ec5d ** CIPHERTEXT (hex): 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 ** my_multisig_wallet_for_signer_1.dat:
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
* Send to Signer 2: ** HMAC_KEY (hex): 8050b80716db042130c7aaf086a0b3e59d8d3e59c0d689c6b61fb2e5ccd9644b ** MAC (hex): 116a2bf035dcd99c6e8bb16487ce14028b1824d64968bf0d59abeb4a34f703bd ** IV (hex) : 116a2bf035dcd99c6e8bb16487ce1402 ** CIPHERTEXT (hex): 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 ** my_multisig_wallet_for_signer_2.dat:
116a2bf035dcd99c6e8bb16487ce14028b1824d64968bf0d59abeb4a34f703bd90dcbe85cff4475cad3aff55e59f15411fa343fb12e71a06b8d048f41121af1a16385e85be34785f6c1dcd62f0d5460824dcd4a4e2089c3869fb4c563d8dfd9d69d03c9140062aee3c6dd2de3c3f31a4852edd319b0d3357d1a3ccb62a1907aa787d34e2bd60a6f692a462ab9480255a2b5462fc6b6b95e41dc66873d78c7a3585f75f25100a8a3092bd3d9d655deb4d6a0d2c1b0e74e5631a5089f87334bfc5570d2d9f5d53bd0e5c3bb97bf27fb251f409b0b20617919c7164a10d244258b76bb9d9c51f6f89431dea437e2af0998f9c2d94f5d2d79915fb3439fd9077ed5af84772b17789cbb359c8092048999969020c3f9b6600239ed39547d2a71a36f0e06f92c89cd1d026a424a148c2aa76ea9451a71a674e15486d66ac35edac83bae49cc452a2c4ecd61d84dddec02a9ad9197a3128cd3f3f02d32f54674ab844c04e15086d9b6f0ae09ec4d66b484a2ddb24ccd8bf6837c25f9ad87a7b4ee6028a8c0ebdd8bfe5eb0be434cfd97a0fd25a8fb0b6d6de3f2a4bda2c511d834e0cf6bc264513d6135e6ec5ce8f017c123f61129f0ffa3531c735a32e87945901ed5efa07e077ba97ddb8a7ef48e653298e45e22d9be6c2662145443e9657e77003a7fb5d28623121b5ff7a2c82dfb92e8b6151539d329cf0ccc5ce0df9064a628f27fd7274f53bdd4191f424f2
* Send to Signer 3: ** HMAC_KEY (hex): 52f0fc79116014738144d4e04d88d581267f15f004c29492ea65f05b7489ce66 ** MAC (hex): 6a724e518881d033337d536b4ae08402322da89c6024926d497006edcb44ba3a ** IV (hex) : 6a724e518881d033337d536b4ae08402 ** CIPHERTEXT (hex): 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 ** my_multisig_wallet_for_signer_3.dat:
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
==Acknowledgement== Special thanks to Pavol Rusnak, Dmitry Petukhov, Christopher Allen, Craig Raw, Robert Spigler, Gregory Sanders, Ta Tat Tai, Michael Flaxman, Pieter Wuille, Salvatore Ingala, Andrew Chow and others for their feedback on the specification. ==References== Related mailing list threads: * https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-February/018385.html * https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2021-April/018732.html