Abstract
This paper presents an extension to Bitcoin’s script language enabling covenants, a primitive that allows transactions to restrict how the value they transfer is used in the future. Covenants expand the set of financial instruments expressible in Bitcoin, and enable new powerful and novel use cases. We illustrate two novel security constructs built using covenants.
The first, vaults, focuses on improving the security of private cryptographic keys. Historically, maintaining these keys securely and reliably has been a critical vulnerability for Bitcoin users. We show how covenants enable vaults, which disincentivize key theft by preventing an attacker from gaining full access to stolen funds.
The second construct, poison transactions, is a generally useful mechanism for penalizing double-spending attacks. Bitcoin-NG, a protocol that has been recently proposed to improve Bitcoin’s throughput, latency and overall scalability, requires this feature. We show how covenants enable poison transactions, and detail how Bitcoin-NG can be implemented progressively as an overlay on top of the Bitcoin blockchain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
- 2.
We abstract from opcode behavior specific to Bitcoin’s soft-fork upgrade mechanism, namely the need to drop items from the stack afterwards.
References
Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Timón, J., Wuille, P.: Enabling Blockchain Innovations with Pegged Sidechains. https://blockstream.com/sidechains.pdf. Accessed 03 Nov 2015
#Bitcoin-Wizard IRC log. https://download.wpsoftware.net/bitcoin/wizards/2014/01/14-01-15.log. Accessed 28 Oct 2015
Block chain. https://en.bitcoin.it/w/index.php?title=Block_chain&oldid=59033. Accessed 19 Oct 2015
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives on bitcoin and second-generation cryptocurrencies. In: IEEE Symposium on Security and Privacy. IEEE, San Jose (2015)
Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 156–174. Springer, Heidelberg (2014)
BtcDrak, Friedenbach, M., Lombrozo, E.: BIP 112: CHECKSEQUENCEVERIFY (2015). https://github.com/bitcoin/bips/blob/master/bip-0112.mediawiki. Accessed 08 Oct 2015
Buterin, V.: A Next Generation Smart Contract and Decentralized Application Platform (2013). https://www.ethereum.org/pdfs/EthereumWhitePaper.pdf/. Accessed Feb 2015
Buterin, V.: Slasher: A Punitive Proof-of-Stake Algorithm, January 2015. https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm/
Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)
Coastermonger: Thief’s downfall covenant. https://bitcointalk.org/index.php?topic=278122.msg3164726#msg3164726. Accessed 16 Sept 2013
Colored Coins Project. Colored Coins. http://coloredcoins.org/. Accessed Sept 2015
d’aniel, Todd, P.: Security deposits (2013). https://bitcointalk.org/index.php?topic=278122.msg2973895#msg2973895. Accessed 20 Aug 2013
Decker, C.: [bitcoin-dev] [BIP] Normalized transaction IDs. https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-November/011657.html. Accessed 03 Nov 2015
Dogecoin Project. Dogecoin. http://dogecoin.com/. Accessed Nov 2014
Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of bitcoin key management. In: NDSS Workshop on Usable Security (USEC) (2015)
Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 16–18, 2016, Santa Clara, CA, USA, March 2016
Goldfeder, S., Gennaro, R., Kalodner, H., Bonneau, J., Kroll, J.A., Felten, E.W., Narayanan, A.: Securing Bitcoin Wallets Via a New DSA/ECDSA Threshold Signature Scheme (2015)
Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography (2004)
Higgins, S.: Bitstamp Claims $5 Million Lost in Hot Wallet Hack (2015). http://www.coindesk.com/bitstamp-claims-roughly-19000-btc-lost-hot-wallet-hack/. Accessed 16 Oct 2015
List of Major Bitcoin Heists, Thefts, Hacks, Scams, Losses. https://bitcointalk.org/index.php?topic=576337. Accessed 16 Oct 2015
Litecoin Project. Litecoin, open source P2P digital currency. https://litecoin.org. Accessed Nov 2014
Maxwell, G.: CoinCovenants Using SCIP Signatures, an Amusingly Bad Idea. https://bitcointalk.org/index.php?topic=278122.0. Accessed 25 Oct 2015
Nakamoto, S., Bitcoin: A Peer-to-Peer Electronic Cash System (2008). http://www.bitcoin.org/bitcoin.pdf
Ruffing, T., Kate, A., Schröder, D.: Liar, liar, coins on fire! — penalizing equivocation by loss of bitcoins. In: Proceedings of the 22nd Conference on Computer and Communications Security, CCS 2015, Denver, CO, USA. ACM, New York (2015)
Todd, P.: BIP 65: OP_CHECKLOCKTIMEVERIFY (2014). https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki. Accessed 08 Oct 2015
Tschorsch, F., Scheuermann, B.: Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. Cryptology ePrint Archive. Report 2015/464 (2015)
Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: a secure economic framework for peer-to-peer resource sharing. In: Workshop on the Economics of Peer-to-Peer Systems, Berkeley, California, vol. 35 (2003)
Acknowledgments
The authors thank Glenn Willen for useful conversations, Tim Ruffing and Dominique Schröder for their advice on cryptographic primitives, and the anonymous reviewers for their valuable feedback.
This material is based upon work supported by a fellowship within the FITweltweit programme of the German Academic Exchange Service (DAAD), the German Bundesministerium für Bildung und Forschung (BMBF) under grant agreement No. 13N13505, and the National Science Foundation under Grant No. CNS-1518779 and Grant No. CNS-1561209. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding organizations.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 International Financial Cryptography Association
About this paper
Cite this paper
Möser, M., Eyal, I., Gün Sirer, E. (2016). Bitcoin Covenants. In: Clark, J., Meiklejohn, S., Ryan, P., Wallach, D., Brenner, M., Rohloff, K. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9604. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53357-4_9
Download citation
DOI: https://doi.org/10.1007/978-3-662-53357-4_9
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-53356-7
Online ISBN: 978-3-662-53357-4
eBook Packages: Computer ScienceComputer Science (R0)