bsips/bsip-0053.md

31 KiB

BSIP: 0053
Title: Blockchain scanning for inbound Stealth transactions
Authors: Christopher J. Sanborn
Status: Draft
Type: Protocol
Created: 2018-01-29
Discussion: https://github.com/bitshares/bsips/issues/91

Abstract

The existing Stealth implementation (BSIP-0008) requires the sender to manually communicate transaction receipts to the recipients of each transaction to alert them to the presence of an inbound balance transfer, creating a danger of lost funds due to miscommunicated or lost receipts. This BSIP explores options for automated discovery of inbound transactions while still preserving fundamental privacy features of unlinkability and anonymity.

Motivation

"Stealth addresses" are a method of providing unlinkability to blockchain transactions. Unlinkability is a major component of the Privacy Triad: unlinkability, confidentiality, and untraceability. Using a stealth address, a sending wallet is able to compute a child public key that derives from a public key encoded in the address, but which cannot be correlated, or "linked", to the address public key, unless you are either the sender or the receiver. This child key becomes the authorization key for transaction outputs (TXOs) intended for the receiver. As such, third party observers cannot link TXOs to addresses, nor even link together independent TXOs which are destined to the same address.

Although this is a great benefit to privacy, it complicates the matter of detecting inbound transactions, since a wallet cannot simply scan for transactions which explicitly identify the destination address.

Existing Stealth Phase I functionality already includes the use of stealth addresses, but does not include a solution for detection of inbound transactions. As a result of which, user adoption of the Stealth feature has been very minimal. We propose below a solution to inbound transaction detection as well as some additional enhancements to the stealth addressing scheme, including a proposed new address format that allows for watch-only wallets.

Rationale

A confidential transaction (cTX) does not identify the recipient. As such, there is no direct way for a wallet to use only its Stealth address to query the p2p network for inbound transactions. In the current "phase one" implementation of Stealth (BSIP-0008), inbound discovery is a manual process requiring the sender to communicate "transaction receipts" to the intended recipients of each transaction output in order to alert each recipient of their incoming balance. Transaction receipts are encrypted data structures that embed the Pedersen commitment of the transaction output and the value and blinding factor that the recipient needs to "open" the commitment. Additionally, the receipt records the one-time public key which the recipient must use to derive the private key offset needed to spend the incoming coin, via a shared-secret procedure between the one-time key and the recipient's address key. The need to communicate transaction receipts is burdensome and introduces substantial risk of lost funds due to failure to communicate or retain receipts.

Keys involved in a cTX output (cTXO):

  • One-Time Key (OTK) — The sender generates this key (public and private) from randomness and uses it to generate a shared-secret between the OTK and the recipient's Address ViewKey. The OTK PubKey will be clear-text encoded in the Tx receipt, and optionally also recorded in the transaction output to enable automated discovery.
  • Address Keys (ViewKey and SpendKey) — These are public keys encoded in the recipient's stealth address. The goal of a stealth address scheme is to not identify these public keys in any transaction output. A long-form address encodes two public keys, referred to as ViewKey and SpendKey. The SpendKey serves as a base point from which individual Tx output AuthKeys are computed as an offset, and the ViewKey is used with the OTK to compute that offset. A short-form address encodes only a single public key, which serves as both the ViewKey and SpendKey.
  • Tx Output Authorization Key (AuthKey) — This public key will be recorded in the confidential transaction output (cTXO) as the key which is authorized to spend the commitment. This key is offset from the address SpendKey by a secret offset that only the sender and recipient can calculate (from the shared secret between OTK and ViewKey). The sender can only know the offset, but not the full secret key to the AuthKey. The recipient, knowing the private key behind the SpendKey, can compute the private key to AuthKey and therefore can spend the commitment.

Automated discovery could be enabled if the receipt were embedded within the transaction data structure and if an aspect of that data structure supported a challenge condition which the recipient could recognize.

Current network rules allow for a receipt to be embedded in each Tx output via a stealth_memo field which is formatted in a similar way as the encrypted memos that may accompany regular (non-Stealth) transfer operations. These memos are composed of a header specifying the OTK PubKey and the "message PubKey" for which the recipient holds the corresponding private key, followed by cipher text which is AES encrypted with a shared-secret key between the OTK and the message PubKey. For this stealth_memo field, the current behavior of the CLI reference wallet is to use the recipient's Address PubKey as the message PubKey. Although this is a reasonable choice for encrypting message text generally, it has the severe downside of identifying the recipient's Address PubKey in the memo header, and therefore breaks anonymity and negates the unlinkability provided by using a stealth address scheme. For this reason, the CLI reference wallet currently does NOT actually embed the memo in the Tx ouput but instead Base58 encodes it and prints it to the screen, calling it a "transaction receipt." The sender must manually, and secretly, transmit this to the recipient via a side channel.

Stealth Memo structure: (Stealth I)

One-time PubKey: Chosen from randomness by sender   (33 bytes)
Message PubKey: Public key controlled by recipient.   (33 bytes)
Cipher Text: AES encrypted message, using key ← Shared(OTK,MPK)

Current Stealth I behavior is to use the Address PubKey as the message PubKey, which reveals intended recipient!!

A very simple solution would be to change the behavior of embedding the Address PubKey in the message PubKey field, and to instead record the Tx output AuthKey in this slot. Because the recipient is also able to derive this AuthKey through knowledge of her own address private keys (in combination with the OTK recorded in the header), the recipient would simply need to test the OTK against each of their own Address Keys to see if the resulting AuthKey matches the one in the header. If it does, then the output is recognized as destined to the recipient, even though the recipient's Address PubKeys are not identified in the memo header. The computational cost of this is one Diffie Hellman round, a hash operation, and a child key derivation. It should be noted that the AES encryption key should still be computed from the shared secret between the OTK and the address ViewKey, however, as this will allow view-only wallets which cannot compute the private key behind the AuthKey to decrypt the memo and tally the incoming transaction.

Stealth Memo structure: (Proposed: Stealth II)

One-time PubKey: Chosen from randomness by sender   (33 bytes)
cTXO AuthKey: Child public key of the stealth address and the OTK.   (33 bytes)
Cipher Text: AES encrypted message, using key ← Shared(OTK,ViewKey)

Proposed Stealth II behavior is to embed the AuthKey in the second slot, while still encrypting the message data with a shared key between the OTK and the Address key (specifically, the ViewKey so that watch-only wallets can read the commitment data).

To support this strategy, a wallet will need to inspect all cTX activity on the network and test the challenge conditions on each transaction. This could be achieved if API nodes are extended to provide an API call to retrieve stealth_memo fields from all cTXOs appearing in a specified block range. The wallet could simply download the memos, test the challenge on each one, and identify and decrypt the ones that are destined to the wallet. No need would remain to manually transmit transaction receipts. The receipts would be embedded, compactly and unlinkably, in the Tx outputs.

Specifications

We specify two protocols. In the first subsection, Wallet procedure..., we specify the recognition protocol by detailing wallet behaviors for:

  • Creating transaction outputs that can be recognized by their recipients, and,
  • Recognizing transaction outputs that are destined to the wallet.

And in the second subsection, API requirements..., we propose a new API call for querying nodes for transaction outputs to be scanned for recognizable markers. This is an added feature for API nodes and does not involve any consensus changes.

Wallet procedure for recognizing own commitments

Assumptions:

  1. Wallet has access to a set of private keys corresponding to stealth addresses which may own commitments on the blockchain. These private keys are needed to "recognize" incoming transactions. If the wallet is a watch-only wallet for a particular address, then it is assumed to have the private and public ViewKey, but only the public SpendKey.
  2. Wallet can query an API node for commitments occurring between specified block heights, to obtain sets of embedded receipts to scan for owned commitments. (See below for this process.)

We detail procedures for stealth address formats which encode either a single public key, or two distinct public keys in which one key is the ViewKey and the other the SpendKey. The single-key format is already in use on the BitShares network and is borrowed from the original Confidential Transactions specification. The dual-key format allows for additional wallet features and is borrowed from CryptoNote-based coins such as Monero. No changes to the network nodes are required for wallets to support dual-key address formats. In fact, the single-key format can be thought of as a special case of the dual-key format in which the same key is used as the ViewKey and the SpendKey.

Address Formats:

  Format:
CT-style: Single public key and checksum. Public key A serves both viewing and spending roles.

Format: BTSaaaaaaaaaaaaaaaaaaaacccc
CryptoNote-style: Two public keys plus a checksum. Public key A serves the viewing role and public key B serves the spending role.

Format: BTSaaaaaaaaaaaaaaaaaaaabbbbbbbbbbbbbbbbbbbbcccc
Invoice Nonce: This one encodes a single PubKey serving both the viewing and spending role, but also includes a 64-bit "nonce" or "tag" that the spending wallet is to include in the encrypted memo part of the cTXO, allowing the receiver to interpret payment as being applied to a specific invoice.

Format: BTSaaaaaaaaaaaaaaaaaaaannnnnnnncccc

(In the address formats above we consider the part following the "BTS" identifier to be Base58 encodings of the concatenated byte buffer representations of public keys and checksum bytes. C.f. Base58Check encoding.)

The dual-key format separates the duties of spending a commitment from those of reading the commitment, such that a person in possession of only the "viewing key" (the private key corresponding to the additional pubkey in the address) can discover, interpret, and tally incoming transactions, but cannot spend them. The "spending key" (private key corresponding to the primary pubkey in the address) is needed to authorize the spending of a commitment. The dual-key address format and signing procedures are described in detail in [vS13] and reviewed below.

Procedure for single-key stealth addresses (CT-style)

Recognizability depends on there being a deterministic relationship between the AuthKey that authorizes expenditure of a particular cTXO, the one-time key (OTK) that the sender generated randomly for the cTXO, and the recipient's Address key (or keys).

We assume that the stealth address encodes public keys corresponding to two purposes: discovery, and expenditure. When an address encodes only one public key, that key is used for both purposes. We refer to the key for discovery as the "view" key, and denote the private, public pair as (v, ViewKey). For spending, we denote the key pair as (s, SpendKey).

The AuthKey for a cTXO is an EC point summation of the address's SpendKey and an EC point "offset," which, for present purposes we will denote by the private, public pair (o, Offset), with Offset = o*G, where G is the generator point for the curve.

  AuthKey  =  SpendKey  +  Offset

Anonymity is preserved so long as only the sender and the receiver are able to compute o and Offset. The algorithm for computing Offset is a deterministic function of the OTK and ViewKey only, (and not the SpendKey). This allows the the recipient to recover the SpendKey by simple subtraction of Offset from the AuthKey. The recipient's wallet then compares the computed SpendKey against the address SpendKey. The wallet may even compare against a whole list of SpendKeys that the wallet may have used to generate an address family with a common ViewKey, allowing for differentiable invoices, without sacrificing efficiency of scanning. (See address-per-invoice below.)

Algorithm Description / Specification
Shared(a,B) → secret
Shared(A,b) → secret
This yields a "shared secret" between public keys A and B computable only by parties possessing at least one of the private keys a and b.

  secret = SHA512(PX);     P = aB = Ab

For BitShares Stealth, the secret is a byte buffer (64 bytes) computed from the SHA512 hash of the encoded X coordinate (32 bytes) of EC point P. (c.f. EC Diffie-Hellman.)
ChildOffset(B,index) → offset This yields an integer-valued private key offset that generates the keypair (offset, Offset = offset*G). The offset is considered to be a "child" of key B, and the parameter index is a byte buffer.

  child = BigInteger(SHA256(Compressed(B) || index))

Compressed(B) refers to the SEC1 "compressed" representation of public key B. The || symbol refers to concatenation.

Sending:

The sender's procedure for computing the offset and generating the AuthKey for the cTXO is detailed as follows:

  1. Compute a "shared secret" between between the sender and receiver:

    secret = Shared(otk, ViewKey)

    The sender must be careful to leak neither the shared shared secret nor the private otk key.

  2. Compute the OffsetKey as a child of the ViewKey, using a SHA256 hash of the shared secret as a child index:

    childindex = SHA256(secret)
    offset = ChildOffset(ViewKey,childindex)
    OffsetKey = offset*G

  3. Compute the AuthKey by summing SpendKey and OffsetKey:

    AuthKey = SpendKey + OffsetKey

Receiving:

The receiver, having acquired a list of cTXO metadata that includes OTK and AuthKey, goes through the following process to test for ownership:

  1. Compute a "shared secret" between between the sender and receiver:

    secret = Shared(OTK, viewpriv)

  2. Compute the OffsetKey as a child of the ViewKey, using a SHA256 hash of the shared secret as a child index:

    childindex = SHA256(secret)
    offset = ChildOffset(ViewKey,childindex)
    OffsetKey = offset*G

  3. Recover the public SpendKey by subtracting OffsetKey from AuthKey:

    SpendKey = AuthKey - OffsetKey

  4. Compare the recovered SpendKey against all wallet SpendKeys that may have been used with the ViewKey to generate an address. If one matches, then the cTXO is "recognized." To later spend the cTXO, the wallet computes the private authorization key as:

    authpriv = spendpriv + offset

Thus, a wallet may undertake to periodically download and scan the metadata for Stealth transactions and test for outputs that can recover a wallet's public SpendKey from knowledge of the private ViewKey.

Embedding recognizability data in the transaction

For the recipient to have the practical ability to recognize a cTXO as their own, the cTXO, as recorded on the blockchain, must include the following two items: 1.) The one-time PubKey (OTK) that the sender generated for shared-secret generation, and, 2.) the authorization PubKey (AuthKey) of the cTXO. Because the AuthKey is computed deterministically from Shared(OTK,AddrKey), it stands that if the recipient can generate the same AuthKey, then the cTXO belongs to them.

The structure of a cTXO is as follows:

Field Purpose
commitment: Blinded value commitment   (EC curve point, 33 bytes)
range_proof: Proof data supporting transaction validity   (0 to ~5 KiB)
owner: BitShares owner structure specifying weighted list of keys or accounts that may spend this commitment. (Typically lists just one public key, the "AuthKey" for the cTXO.)
stealth_memo: Also known as the "transaction receipt" when transmitted off-chain.

one_time_key:   (EC curve point, 33 bytes)
to:   Use the AuthKey here! (EC curve point, 33 bytes)
encrypted_memo:   Data that recipient needs to "open" the commitment.

The stealth memo is optional as far as the network is concerned, but essential if you want the recipient to be able to detect the incoming transaction without sending a "receipt."

(An example transaction showing all these fields can be seen in block 22157273. In this Tx, the stealth_memo 'to' field unwisely names the recipient's address key, rather than the cTXO Auth key, and thus breaks unlinkability.)

Since the stealth_memo field can be used to record both the OTK and the AuthKey, all the wallet needs to do to scan for incoming transactions is to download batches of stealth memos and, for each one, test whether the combination of the OTK and the wallet's Address key yields the AuthKey. If it does, then derive the AES decryption key from Shared(OTK,ViewKey) and use that to read the additional data in encrypted_memo.

Structure of encrypted_memo:

Field Purpose
from_key: Original use:

    Identifies address key of sender (optional).   (EC curve point, 33 bytes)
Alternate possible uses:

  • Instead of ID'ing the 'from' address, could use this field to embed an invoice nonce to allow receiver to correlate payment to an invoice.
amount: Value of commitment.   (Integer, 32 bytes)
blinding_factor: Blinding factor.   (Integer, 32 bytes)

Note: Except when a blind_sum is needed, the blinding factor is deterministic from a hash of the shared secret, meaning this field can potentially be repurposed or omitted. To guarantee that the blinding factor can always be deterministic, transactions can be padded with a commitment to zero to absorb the blind_sum.
commitment: The Pedersen commitment.   (EC curve point, 33 bytes)

Note: This field is redundant, since the commitment is determined by C = amnt * H + blind * G, and could potentially be omitted.
check: Checksum to confirm correct decryption.   (4 bytes)

(TODO: How is this serialized? Do omitted fields "take up space"? Can fields be chosen a la carte? How hard will it be to extend this memo format, for, say, multiple assets in the case of CA? See fc::raw::pack.)

API Requirements to Allow Detection of Inbound Commitments

To monitor for incoming transactions to a particular wallet, a wallet need only download sets of stealth_memo structures to test for recognition. The full cTXO (including Pedersen commitment, owner structure, range proof, etc.) need not be downloaded. Because the encrypted data inside the memo indicates the Pedersen commitment, the wallet will know which cTXO it has recognized. (Witness nodes index cTXO's by Pedersen commitment.)

(Discuss here a proposed API call for retrieving stealth_memos by block height range)

To know whether a cTXO is still unspent (e.g. by another instance of the wallet), a wallet could attempt to retrieve the corresponding commitment object from an API node. An empty result indicates the commitment has been spent. However, this procedure indicates our interest in a specific set of commitments, and the network traffic generated runs the risk of revealing that those commitments are "linked".

To prevent this, we propose instead that, in like manner to the downloading of bulk stealth_memo structures, that an API call for downloading bulk lists of consumed commitments be implemented, with the download again being over specified block height ranges. A wallet then needs only to test that its own commitments are not on the list of spent commitments.

In the event that ring signatures are implemented for transaction inputs (see BSIP-0052), then instead of downloading a list of consumed commitments, we would instead download a list of used key images, which would serve the same purpose.

Because a wallet downloads stealth_memo structures in bulk over block height ranges, the wallet never reveals to the network its interest in any specific cTXOs. Thus network interaction for monitoring purposes does not undermine privacy.

NOTE: It is currently possible to retrieve all needed info to support recognition of incoming transactions via Elastic Search queries. This implies: (1) functional wallet behavior can be implemented right away, even if new API calls take longer to implement, and (2) it may be possible to avoid adding new API calls altogether, if the Elastic Search infrastructure is deemed performant enough to support queries from Stealth wallets. (Although intuitively it seems to me an API method would result in a better user experience).

Discussion

Utility of dual-key addresses

Utilization of the dual-key address format has numerous interesting use cases, including:

  • The ability to maintain watch-only wallets. By entrusting only the View Key to a view-only node, it is possible for this node to monitor for activity to an address without granting spending access to the same node. This allows for such things as: opt-in transparency; cash register monitoring; organizational internal auditing, etc.

  • The ability to use address-per-invoice without introducing substantial additional scanning overhead. To use this, one keeps the same viewing PubKey and iterates the Spending PubKey part of the address, generating a distinct address per invoice. When scanning the blockchain, the Child Offset is a function of the shared-secret between OTK and ViewKey, such that AuthKey = SpendKey + Offset. To obtain the public SpendKey, a watching wallet can subtract the Offset from the AuthKey to obtain the SpendKey, and simply compare against a list of per-invoice SpendKeys that were used to generate addresses. Adding additional SpendKeys to scan for does not incur any additional EC group operations, merely additional byte-wise comparisons, which are trivial. (Note that while the invoice addresses generated in this manner are distinct, they are not unlinkably distinct, since they share the viewing component. If a business wants individual invoices to be mutually unlinkable, then this scheme will not be sufficient. However, this is a consideration for a business's off-chain security practices, as the addresses themselves never appear on-chain or in a transaction. An alternate solution which allows even the ViewKey to vary, while still allowing for efficient scanning, is presented in MRL-0006, however this introduces a change in how the deterministic offsets are generated, which would need to be signaled by a flag in the address format and supported by wallets.)

Possible future extensions

Additional address formats

The two stealth address formats described above provide for single key and dual key addresses, where the latter allows for separation of transaction monitoring from the ability to spend, allowing for view-only wallets.

There may be use cases for additional address formats allowing for more complex situations.

One would be a multi-sig situation in which the address format encodes multiple spending keys and a weighting requirement. Although, this would make the resulting address very lengthy, it would also add an interesting use-case. And, since BitShares authority structures already allow for a vector of authorizing keys and weights, it should be possible to implement the feature on the wallet side, without needing any changes to consensus or API. This idea is not explored further here but merely suggested for future exploration if there is a desire for the feature.

Another use case for an extended address format would be... (TODO: Discuss including an "invoice nonce" in the address format for correlating incoming transactions to a particular invoice. C.f. Bitcoin where using an address-per-transaction serves both unlinkability as well as invoicing. With Stealth addresses, there is no need to increment addresses for unlinkability, and doing so to facilitate invoicing only increases the scanning overhead by introducing the need to test against additional private keys. But by including an invoice nonce in the address format, which the spending wallet would carry over into the encrypted part of the stealth_memo, the recipient can correlate payments to invoices while using only a single address key. This strategy would be similar to the "Integrated addresses" that can be used on the Monero platform. Note, however, that this scheme is largely obsoleted by the simple ability to iterate the SpendKey through a HD address family while keeping the same ViewKey in a dual-key address format.)

Pitfalls and Cautions

Specific risks and remedies

Sender leaks private otk or private shared secret:

TODO: analyze

An attack on address key from leak of a transaction private key

A confidential output will have associated with it an "Output PubKey," or AuthKey. He who can provide a signature from the AuthKey is authorized to spend the commitment. Automated detection of inbound commitments depends on the deterministic computation of an offset between the One-time PubKey (OTK) and the Address SpendKey, which is computed from the shared secret between the sender and receiver. Because only the offset is deterministic, the sender cannot compute the private key to the AuthKey. Only the receiver can do this (by knowing both the offset and the address's private spending key).

Because AuthKeys are only used once, wallet software designers may be led to believe that the security of the AuthKey private keys are only important up until the commitment is spent. (What would it matter, to leak that private key, when the commitment it authorizes is no longer spendable?) This would be a mistake, however, because anyone who can compute the additive offset can subtract it from the private AuthKey to reveal the address's private spending key. Although the general public is not expected to be privy to that offset, the sender of the output is in possession of the offset (and the ability to compute it due to knowing the random k behind the One-time PubKey). This means the sender would be enabled to compute the address's private key, in the event that the recipient leaks the private AuthKey.

Thus, wallet designers should be advised to treat the private TXO AuthKeys handled by their wallets with at least as much care as the address private keys, even long after the commitments they authorize have been spent. A leak of a single commitment's PrivKey is tantamount to a leak of the PrivKey for the entire wallet.

(A similar risk of revealing a parent PrivKey from leak of a child PrivKey and parent XPUB when using non-hardened derivation is noted in the Bitcoin BIP-32 protocol for Hierarchical Deterministic Wallets.)

Summary for Shareholders

Although the goal of this BSIP is to support the long-range vision of Stealth Phase II, the implementation of this BSIP would provide value right now, as it would enable the utilization of even the Phase I Confidential Transactions operations without the reliance on burdensome transaction receipts, which are the primary end-user stumbling block to routine Stealth use.

We have detailed in this document procedures for producing recipient-recognizable transaction outputs from stealth addresses. Specifically, we have detailed the procedure for two distinct stealth address formats: a single-key address format which is identical to that which is already in use, and a new dual-key address format which separates the duties of monitoring from spending, and thus allows for watch-only Stealth wallets. Support for the dual-key address format would require no network or consensus changes. It requires only wallet support.

Most of the work needed to implement this BSIP is in the wallet, namely the correct production of recognizable cTXOs and the process of scanning for owned cTXOs. The only network-level change is the addition of two API calls: one to return batches of stealth_memo fields included in a block range, and one to return batches of consumed commitments (in the case of CT transactions) or used key-images (in the case of RingCT transactions). These API calls would need to be available on wallet-serving API nodes, but would not be needed on block-producing witness nodes. There are no consensus changes proposed in this document.

This document is placed in the public domain.

References

[vS13] - Nicolas van Saberhagen, Cryptonote v 2.0, 2013 - https://cryptonote.org/whitepaper.pdf

[NG17] - Sarang Noether and Brandon Goodell, An efficient implementation of Monero subaddresses, 2017 - https://lab.getmonero.org/pubs/MRL-0006.pdf

See Also

  • Overview of Stealth Phase II - BSIP-0052
  • bitshares-stealth-k - A Kotlin library for Stealth support in BitShares (in very early development stage)