335 lines
18 KiB
Markdown
335 lines
18 KiB
Markdown
---
|
||
title:
|
||
Contracts on the blockchain
|
||
...
|
||
# Terminology
|
||
|
||
A rhocoin is an unspent transaction output, and it is the public key
|
||
that identifies that unspent transaction output, the private key that
|
||
can sign with that public key, the point which is the mathematical
|
||
object of which that public key is the text representation, and the
|
||
scalar which is the mathematical object that the secret can construct.
|
||
|
||
A public key and and its associated secret key can do all sorts of
|
||
things as well as control rocoins – logons, identifying participants in
|
||
a conversation, and signing a message, among them.
|
||
|
||
We talk about points and scalars, meaning points on the elliptic curve
|
||
and scalars, large numbers modulo the order of the curve, the
|
||
mathematical objects underlying these keys, when we combine them
|
||
mathematically in interesting ways, for example adding several points to
|
||
create a public key that requires several secrets, possessed by several
|
||
different people, to use. Scalars can be added and multiplied, points
|
||
can be added or subtracted from other points, and points can be
|
||
multiplied by scalars. When we design contracts on the blockchain, we
|
||
should refer to scalars and points, but the rest of the time, we should
|
||
talk about coins, public keys, and private keys. Normal people should
|
||
never need to hear of points and scalars, and should not need to know
|
||
what they are. Only people writing software to manage blockchain based
|
||
interactions need to talk about or think about points and scalars.
|
||
|
||
# Instant irrevocable transctions
|
||
|
||
## Why we need Schnorr signatures
|
||
|
||
In order that people can meet in person to exchange fiat for blockchain
|
||
money in person, they need a transfer that is instant and irrevocable.
|
||
|
||
Bob wants to buy blockchain money for cash. Ann wants to sell for cash.
|
||
They agree to meet in person, and do the exchange – paper money in a
|
||
brown paper bag.
|
||
|
||
Ann and Bob cooperate over the network to create a postdated transaction
|
||
spending an as yet nonexistent coin whose public key is the sum of a
|
||
public key whose secret key is known only to Bob, and a public key whose
|
||
secret key is known only to Ann, and *after* that transaction is
|
||
created, Ann issues a transaction placing value an unspent transaction
|
||
output in that coin, creates a rhocoin for that public key, knowing that
|
||
if nothing further is done, the coin eventually comes back to her. Then,
|
||
before the postdated transaction becomes placeable on the blockchain,
|
||
they meet in person, and once the cash is in her hands and she has
|
||
counted it, she then reveals her secret key to Bob, and his wallet can
|
||
instantly tell him that the coin is in his wallet right and spendable
|
||
right now – but will become spendable by Ann at block number so and so.
|
||
Bob can now spend that coin, but Ann still cannot spend it and needs to
|
||
spend it before the postdated transaction becomes spendable on the
|
||
blockchain. He presumably spends it to a coin wholly controlled by him,
|
||
or uses it in some other transaction, and Ann discards the now useless
|
||
postdated transaction.
|
||
|
||
Note that such a joint shnorr signature is absolutely indistinguishable
|
||
on the blockchain from any other signature, so no one, except for Ann
|
||
and Bob, can tell there was anything different about this transaction.
|
||
|
||
To represent this contract to normies, we call it a coin commitment, a
|
||
coin locked to someone else’s wallet for a certain period. We refain
|
||
from talking about points and scalars. Ann creates a coin that she
|
||
cannot use for anything except paying Bob, until a certain time has
|
||
passed, and once this coin is registered on the blockchain, Bob knows
|
||
she has created this coin and what it is worth, (though no one except
|
||
Ann and Bob knows it is for this purpose) but once the coin is on the
|
||
blockchain, she can use it to instantly pay Bob, in a message over the
|
||
network that his wallet will immediately register as payment completed,
|
||
without needing a third party escrow agent that governments will want to
|
||
register and regulate, as you have use in order to do instant payments
|
||
with bitcoin, or offline by Bob manually typing in the secret that makes
|
||
the coin spendable by Bob, though it can be texted in the clear, since
|
||
no one but Bob can make use of it. It only needs to be kept secret until
|
||
the time comes for Bob to receive the payment. But if she does not
|
||
instantly pay Bob, she can convert it into a regular coin, spendable by
|
||
her and only by her at any time, once its lockup time has expired.
|
||
conversely, once she has given Bob the secret, Bob can use it any
|
||
transaction, such as a transaction spending it to himself, before its
|
||
time is up. The blockchain contains no information showing this
|
||
committed coin is any different from any other, the information that
|
||
makes this coin different being in the secrets in Ann’s and Bob’s
|
||
wallets, not in the blockchain where governments are likely to look for
|
||
someone to regulate. The information that makes this coin different is
|
||
that the secret that controls it is split between Ann’s wallet and
|
||
Bob’s wallet, and Ann and Bob have already created a secret
|
||
transaction, stored in Ann’s wallet, spending the coin to a destination
|
||
determined by Ann, which transaction remains in her wallet until the
|
||
time is up, or until Bob, having received the secret from Ann, spends
|
||
the coin. This transaction is made possible, not by any terribly clever
|
||
cryptographic mathematics, but by the fact that our blockchain, unlike
|
||
the others, is organized around client wallets chatting privately with
|
||
other client wallets. Every other blockchain has necessary cryptographic
|
||
mathematics to do the equivalent, usually more powerfull and general
|
||
than anything on the rhocoin blockchain, and Monero has immensely
|
||
superior cryptographic capabilities, but somehow, they don’t, the
|
||
difference being that rhocoin is designed to avoid uses of the internet
|
||
that render a blockchain vulnerable to regulation, rather than to use
|
||
clever cryptography to avoid regulation. The attack points whereby
|
||
government is getting hold of crypto currencies are not the
|
||
cryptography, which is usually bulletproof, but the domain name system,
|
||
the certificate authorities, and the world wide web, which is completely
|
||
vulnerable.
|
||
|
||
# General purpose scripts
|
||
|
||
Ethereum has a general purpose script language, which seems like
|
||
overkill, and indeed it was overkill, since humans started to misbehave,
|
||
and other humans started to judge transactions, so that the laws of
|
||
mathematics failed to dictate the outcomes, and those human judges are
|
||
predictably misbehaving.
|
||
|
||
Bitcoin has a also has a fully general stackbased language
|
||
pay-to-scripthash (P2SH) also called Bitcoin script. But this led to
|
||
problems, so they effectively disabled it, by making only a small set of
|
||
scripts permissible. Seems that we have not yet figured out how to
|
||
safely enable run time user designed contracts on the blockchain. We
|
||
instead need a short list of payment rules fixed at compile time. We
|
||
shall not create a script language capable of embedding arbitrary
|
||
contracts in the blockchain at runtime, as it would be impossible for one of
|
||
the parties to figure out the gotchas cooked up by the other party.
|
||
|
||
Rather than our model being the infamous click through contract and shrink
|
||
wrap contract, our model should be the returnable writs of The Lion of
|
||
Justice, Henry the First. The Anglo Saxon legal system has been going
|
||
downhill since the death of Henry the second. It is time for a restoration.
|
||
If we cannot restore, bypass. People wanted to use the legal system of The
|
||
Lion of Justice, rather than the ecclesiastical legal system, and if we do
|
||
things right, people will want to use our legal system.
|
||
|
||
A returnable writ is a royal command that has blanks that the parties to a
|
||
dispute or a contract can fill in, but they cannot write their own writ
|
||
ad hoc.
|
||
|
||
The trouble with excessive flexibility is that the parties to a dispute are
|
||
likely to have asymmetric knowledge of the implications of the contract, which
|
||
problem can be mitigated by having as few possible contracts as possible, and
|
||
those contracts authorized by the consensus of the blockchain. We can
|
||
increase flexibility by having multi transaction transactions, where different
|
||
elements of the aggregate transaction invoke different writs, but too much
|
||
flexibility is likely to bite people.
|
||
|
||
# Atomic Swaps on separate blockchains
|
||
|
||
A proof of share currency is like a corporation, like shares in a
|
||
corporation. So we are going to have many corporations, and individuals
|
||
will want to exchange shares in one corporation, with shares in
|
||
another. We would like to do this without direct linking of
|
||
blockchains, without trusted intermediaries, because a trusted
|
||
intermediary is a target for regulation, where the state imposes
|
||
mandatory trust, while protecting profoundly untrustworthy behavior.
|
||
|
||
Bob is owns some crypto currency in the foo blockchain, and wants to
|
||
exchange it with Carol’s crypto carrency in the bar blockchain.
|
||
|
||
Bob agrees with Carol to give her three units of his foo currency, for
|
||
five units of her bar currency.
|
||
|
||
But, how do we make it so that the transaction is completed? We don’t
|
||
want Carol giving five units, and Bob replying “Hah hah fooled you”.
|
||
|
||
So Carol creates an output of five units that can be spent by a secret
|
||
key that only she knows after ten blocks, but until then can be spent by
|
||
Bob’s secret, plus a preimage that only she knows. The output contains
|
||
Bob’s public key, Carol’s public key, and the public hash of a secret
|
||
preimage known only to Carol. Bob waits until that output becomes final
|
||
and spendable in the bar blockchain. Bob then creates an output of three
|
||
units that can be spent by a secret key that Bob knows after five blocks
|
||
in the foo chain, but until then, can be spent by a carol’s secret key,
|
||
plus the preimage of a value known only to Carol. The output also
|
||
contains Carol’s public key, Bob’s public key, and the pubic hash of a
|
||
secret preimage known only to Carol, except that the public keys in
|
||
Bob’s output are in the opposite order to Carol’s, and the times are
|
||
different. After a while, both outputs become final and spendable in
|
||
their respective blockchains. Carol then uses her preimage to spend
|
||
those three units in the foo chain, thereby automatically revealing it
|
||
to Bob, which preimage Bob immediately employs to spend the output on
|
||
the bar chain.
|
||
|
||
To spend an output, it has to be an input, one of many, to a
|
||
transaction, and the whole transaction has to be signed by every
|
||
signature required by every input, as each input defines a valid
|
||
signature. So an input/output carries information amounting to a
|
||
quantity of money, possibly a user name, and a signature definition. In
|
||
the simplest and most common case, a public key defines what would
|
||
constitute a valid signature.
|
||
|
||
The immutability of the output comes from the fact that is part of
|
||
transaction, and the entire transaction has to be as signed, that the
|
||
transaction has to be signed by the signatures for all the inputs. For
|
||
this case, contract conditional on pre-image for a certain range of
|
||
block numbers, the signature block has to the pre-image as well as the
|
||
regular signature.
|
||
|
||
# Micro and Nanopayments.
|
||
|
||
The blockchain is heavy, thus unsuitable for small and fast payments,
|
||
such as the payments needed for storage and bandwidth while pirating
|
||
files.
|
||
|
||
Small fast payments require trust, thus trusted intermediaries backed up
|
||
by the blockchain.
|
||
|
||
How do we know if we can trust an intermediary?
|
||
|
||
Because he has a history of signed contracts, that it is easy to prove
|
||
whether a contract has been honored, and no one has produced a contract
|
||
that he signed, alleged that contract was dishonored, and he could not
|
||
prove it was honored.
|
||
|
||
Assume Bob is a trusted intermediary between Ann and Carol. Ann wants to
|
||
pay people, Carol among them, probabilistically – in lottery tickets
|
||
that if won will result in payments on the blockchain.
|
||
|
||
The protocol is that Ann creates the unspent transaction output, which
|
||
comes to exist, unspent, on the blockchain, and no one can spend it
|
||
except Bob says so, since any transaction spending that output will need
|
||
a Bob signature. So if Bob is an OK guy, no double spending shall ever
|
||
happen. If no double spending has ever happened, we can probably trust
|
||
Bob for transactions similar to past transactions. If no past double
|
||
spends, likely no future double spends.
|
||
|
||
Ann promises to give Carol a lottery ticket for services rendered, Carol
|
||
gives Ann a signed hash of a secret preimage, and renders those
|
||
services. Ann issues a lottery ticket by creating a random number, and
|
||
giving Carol a signed hash of Carol’s hash and the lottery identifier.
|
||
The ticket will be valid if the hash of Ann’s secret preimage, and
|
||
Carol’s secret preimage has certain properties – typically that its
|
||
value in big endian order modulo 2^64^ is less than a certain amount.
|
||
The ticket commits Ann to the lottery conditions, being a hash of their
|
||
secrets, and the conditions agreed to.
|
||
|
||
Carol shows Bob the lottery ticket, and asks
|
||
|
||
> “will I get paid if the secrets under the hashes meet the required
|
||
> condition.”
|
||
|
||
Bob tells Carol
|
||
|
||
> “Sure. I will issue a payment for block number such of the blockchain,
|
||
> the current block, if the preimage meets the conditions.”
|
||
|
||
thereby assuring Carol that Ann is on the up and up and providing the
|
||
data needed to create a valid transaction if the lottery ticket is
|
||
valid. Bob provides a link to the transaction output that will be used
|
||
showing that Carol has put real money where her mouth is, asserts it is
|
||
unspent, and promises not to validate any further potentially winning
|
||
lottery tickets for this block period, unless shown evidence that
|
||
previously validated lottery tickets were losing tickets.
|
||
|
||
Carol, who has some reason to trust Bob, now knows that Ann is issuing
|
||
valid lottery tickets – even if this was a losing lottery ticket. Bob
|
||
will refuse to issue more validations for this lottery and this block
|
||
period. unless Carol provides proof that this was a losing lottery
|
||
ticket.
|
||
|
||
If Carol goes dark at this point, the money is frozen till the next
|
||
block period, which causes minor and temporary inconvenience for Ann and
|
||
Bob but does not benefit Carol.
|
||
|
||
Suppose it is a winning lottery ticket – she informs Bob and Carol so
|
||
that they know to issue a new lottery, and now injects it into the
|
||
blockchain with the required data, and hashes that links to the
|
||
conversations between herself, Bob, and Alice. If the payment goes
|
||
through – the transaction inputs are real and have not been previously
|
||
spent. then done. If the transaction fails for block n of the block
|
||
chain, when Bob said it would succeed, she uses the proof of failure -
|
||
that blockchain input was invalid or spent in this block when Bob said
|
||
it would be valid and unspent for this block, plus the previous
|
||
conversations between herself, Bob, and Carol, to prove to the world
|
||
that Bob was cheating.
|
||
|
||
If, on the other hand, there are lots of transactions of this form that
|
||
have successfully gone through, and none that failed in this fashion,
|
||
these provide compelling evidence that Bob is an honest dealer.
|
||
|
||
If Bob goes dark at some point (going dark means ceasing to respond, or
|
||
issuing responses that will be rejected and ignored as invalid) the
|
||
money remains unspent and unspendable, Ann and Carol are inconvenienced,
|
||
no one wins, and no proof of bad behavior is generated. But Bob cannot
|
||
stay up for losing lottery tickets, but then conveniently go dark for
|
||
winning lottery tickets because he issues the data required for a
|
||
winning lottery ticket (or data that would prove he is a cheater) before
|
||
he knows whether the ticket is winning or not.
|
||
|
||
If Carol goes dark, she does not get paid, but does not get proof of bad
|
||
behavior by Ann or Bob.
|
||
|
||
If Ann goes dark, she does not pay Carol. Carol knows Ann is behaving
|
||
badly, ceases to deal with her, but may not get proof of bad behavior by
|
||
Ann that she can show to other people. But getting such proof is not
|
||
very useful anyway, since Carol’s identity is cheap and expendable,
|
||
while Bob’s identity is durable and valuable.
|
||
|
||
Random stranger Ann contacts random stranger Carol, offers to pay in
|
||
lottery tickets for data. Perhaps she wants to watch some movies. Shows
|
||
proof that lottery prize recently existed in a recent block on the
|
||
blockchain, which shows that Ann is not a total flake. Gets some data on
|
||
trust. Provides lottery ticket. Bob says lottery ticket could win,
|
||
depending on a secret that Carol has committed to, but not revealed.
|
||
Carol checks that in the past Bob has paid out on lots of lottery
|
||
tickets and not defected on any lottery ticket. More trust ensues. Ann
|
||
now has reason to trust Carol, Carol has reason to trust Ann, without
|
||
anyone being exposed to large risks and without any actual blockchain
|
||
transactions taking place. It takes an expensive blockchain transaction
|
||
to create the lottery prize, but having created it, Ann and Bob can do
|
||
very large numbers of transactions off blockchain on trust.
|
||
|
||
# Institutions on the blockchain
|
||
|
||
A lot of people, instead of controlling outputs on the bitcoin
|
||
blockchain by secret keys, have a login account, username and password,
|
||
with an “exchange”. That “exchange” (the institution, not the
|
||
particular transaction mediated by the institution) owes them bitcoins,
|
||
payable on demand. And from time to time an exchange goes belly up,
|
||
blaming the federal government or hackers, and just does not pay its
|
||
clients the bitcoins it owes.
|
||
|
||
We call them “exchanges”, not “banks”, because the word “banks” implies
|
||
a government guarantee, and a long past of honoring transactions, which
|
||
these exchanges seldom have, but they are performing bank like
|
||
functions.
|
||
|
||
We would like to have evidence of the institutions reserve fraction, of
|
||
its term transformation (maturity transformation).
|
||
|
||
Solution: Institution runs its own side chain, with a small number of
|
||
peers. The Merkle-patricia dac of unspent transaction outputs has in
|
||
each node the sum of the money in each subtree, and the hash of subtree
|
||
hashes and sums. Thus the standard client wallet will report the total
|
||
owing/shares on issue
|