Nicolas Dorier [ARCHIVE] on Nostr: 📅 Original date posted:2015-11-27 📝 Original message: By adapting an idea from ...
📅 Original date posted:2015-11-27
📝 Original message:
By adapting an idea from gmaxwell (
https://bitcointalk.org/index.php?topic=303088.0) it is possible to open a
channel without suffering from malleability attack.
The process for A to open channel with B is the following:
* A asks B pubkey
* A create the first commitment transaction
* A extract the hash that B needs to sign to be able to broadcast the
commitment
* A asks B to sign the hash, but do not disclose the commitment
* A broadcast the anchor
* After confirmation, A announce the anchor to B.
B can't identify A's anchor before announcement because he does not know
the P2SH of the multisig.
Am I missing something ?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20151127/f2d6361b/attachment.html>
📝 Original message:
By adapting an idea from gmaxwell (
https://bitcointalk.org/index.php?topic=303088.0) it is possible to open a
channel without suffering from malleability attack.
The process for A to open channel with B is the following:
* A asks B pubkey
* A create the first commitment transaction
* A extract the hash that B needs to sign to be able to broadcast the
commitment
* A asks B to sign the hash, but do not disclose the commitment
* A broadcast the anchor
* After confirmation, A announce the anchor to B.
B can't identify A's anchor before announcement because he does not know
the P2SH of the multisig.
Am I missing something ?
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxfoundation.org/pipermail/lightning-dev/attachments/20151127/f2d6361b/attachment.html>