logo
vision scalability social networking revelation

Contracts on the blockchain

1 Terminology

A rhocoin is an unspent transaction output, and it is the public key that identifies that unspent transaction output, the private key that can sign with that public key, the point which is the mathematical object of which that public key is the text representation, and the scalar which is the mathematical object that the secret can construct.

A public key and and its associated secret key can do all sorts of things as well as control rocoins – logons, identifying participants in a conversation, and signing a message, among them.

We talk about points and scalars, meaning points on the elliptic curve and scalars, large numbers modulo the order of the curve, the mathematical objects underlying these keys, when we combine them mathematically in interesting ways, for example adding several points to create a public key that requires several secrets, possessed by several different people, to use. Scalars can be added and multiplied, points can be added or subtracted from other points, and points can be multiplied by scalars. When we design contracts on the blockchain, we should refer to scalars and points, but the rest of the time, we should talk about coins, public keys, and private keys. Normal people should never need to hear of points and scalars, and should not need to know what they are. Only people writing software to manage blockchain based interactions need to talk about or think about points and scalars.

2 Instant irrevocable transctions

2.1 Why we need Schnorr signatures

In order that people can meet in person to exchange fiat for blockchain money in person, they need a transfer that is instant and irrevocable.

Bob wants to buy blockchain money for cash. Ann wants to sell for cash. They agree to meet in person, and do the exchange – paper money in a brown paper bag.

Ann and Bob cooperate over the network to create a postdated transaction spending an as yet nonexistent coin whose public key is the sum of a public key whose secret key is known only to Bob, and a public key whose secret key is known only to Ann, and after that transaction is created, Ann issues a transaction placing value an unspent transaction output in that coin, creates a rhocoin for that public key, knowing that if nothing further is done, the coin eventually comes back to her. Then, before the postdated transaction becomes placeable on the blockchain, they meet in person, and once the cash is in her hands and she has counted it, she then reveals her secret key to Bob, and his wallet can instantly tell him that the coin is in his wallet right and spendable right now – but will become spendable by Ann at block number so and so. Bob can now spend that coin, but Ann still cannot spend it and needs to spend it before the postdated transaction becomes spendable on the blockchain. He presumably spends it to a coin wholly controlled by him, or uses it in some other transaction, and Ann discards the now useless postdated transaction.

Note that such a joint shnorr signature is absolutely indistinguishable on the blockchain from any other signature, so no one, except for Ann and Bob, can tell there was anything different about this transaction.

To represent this contract to normies, we call it a coin commitment, a coin locked to someone else’s wallet for a certain period. We refain from talking about points and scalars. Ann creates a coin that she cannot use for anything except paying Bob, until a certain time has passed, and once this coin is registered on the blockchain, Bob knows she has created this coin and what it is worth, (though no one except Ann and Bob knows it is for this purpose) but once the coin is on the blockchain, she can use it to instantly pay Bob, in a message over the network that his wallet will immediately register as payment completed, without needing a third party escrow agent that governments will want to register and regulate, as you have use in order to do instant payments with bitcoin, or offline by Bob manually typing in the secret that makes the coin spendable by Bob, though it can be texted in the clear, since no one but Bob can make use of it. It only needs to be kept secret until the time comes for Bob to receive the payment. But if she does not instantly pay Bob, she can convert it into a regular coin, spendable by her and only by her at any time, once its lockup time has expired. conversely, once she has given Bob the secret, Bob can use it any transaction, such as a transaction spending it to himself, before its time is up. The blockchain contains no information showing this committed coin is any different from any other, the information that makes this coin different being in the secrets in Ann’s and Bob’s wallets, not in the blockchain where governments are likely to look for someone to regulate. The information that makes this coin different is that the secret that controls it is split between Ann’s wallet and Bob’s wallet, and Ann and Bob have already created a secret transaction, stored in Ann’s wallet, spending the coin to a destination determined by Ann, which transaction remains in her wallet until the time is up, or until Bob, having received the secret from Ann, spends the coin. This transaction is made possible, not by any terribly clever cryptographic mathematics, but by the fact that our blockchain, unlike the others, is organized around client wallets chatting privately with other client wallets. Every other blockchain has necessary cryptographic mathematics to do the equivalent, usually more powerfull and general than anything on the rhocoin blockchain, and Monero has immensely superior cryptographic capabilities, but somehow, they don’t, the difference being that rhocoin is designed to avoid uses of the internet that render a blockchain vulnerable to regulation, rather than to use clever cryptography to avoid regulation. The attack points whereby government is getting hold of crypto currencies are not the cryptography, which is usually bulletproof, but the domain name system, the certificate authorities, and the world wide web, which is completely vulnerable.

3 General purpose scripts

Ethereum has a general purpose script language, which seems like overkill, and indeed it was overkill, since humans started to misbehave, and other humans started to judge transactions, so that the laws of mathematics failed to dictate the outcomes, and those human judges are predictably misbehaving.

Bitcoin has a also has a fully general stackbased language pay-to-scripthash (P2SH) also called Bitcoin script.  But this led to problems, so they effectively disabled it, by making only a small set of scripts permissible.  Seems that we have not yet figured out how to safely enable run time user designed contracts on the blockchain.  We instead need a short list of payment rules fixed at compile time.  We shall not create a script language capable of embedding arbitrary contracts in the blockchain at runtime, as it would be impossible for one of the parties to figure out the gotchas cooked up by the other party.

Rather than our model being the infamous click through contract and shrink wrap contract, our model should be the returnable writs of The Lion of Justice, Henry the First. The Anglo Saxon legal system has been going downhill since the death of Henry the second. It is time for a restoration. If we cannot restore, bypass. People wanted to use the legal system of The Lion of Justice, rather than the ecclesiastical legal system, and if we do things right, people will want to use our legal system.

A returnable writ is a royal command that has blanks that the parties to a dispute or a contract can fill in, but they cannot write their own writ ad hoc.

The trouble with excessive flexibility is that the parties to a dispute are likely to have asymmetric knowledge of the implications of the contract, which problem can be mitigated by having as few possible contracts as possible, and those contracts authorized by the consensus of the blockchain. We can increase flexibility by having multi transaction transactions, where different elements of the aggregate transaction invoke different writs, but too much flexibility is likely to bite people.

4 Atomic Swaps on separate blockchains

A proof of share currency is like a corporation, like shares in a corporation.  So we are going to have many corporations, and individuals will want to exchange shares in one corporation, with shares in another.  We would like to do this without direct linking of blockchains, without trusted intermediaries, because a trusted intermediary is a target for regulation, where the state imposes mandatory trust, while protecting profoundly untrustworthy behavior.

Bob is owns some crypto currency in the foo blockchain, and wants to exchange it with Carol’s crypto carrency in the bar blockchain. 

Bob agrees with Carol to give her three units of his foo currency, for five units of her bar currency. 

But, how do we make it so that the transaction is completed? We don’t want Carol giving five units, and Bob replying “Hah hah fooled you”.

So Carol creates an output of five units that can be spent by a secret key that only she knows after ten blocks, but until then can be spent by Bob’s secret, plus a preimage that only she knows. The output contains Bob’s public key, Carol’s public key, and the public hash of a secret preimage known only to Carol. Bob waits until that output becomes final and spendable in the bar blockchain. Bob then creates an output of three units that can be spent by a secret key that Bob knows after five blocks in the foo chain, but until then, can be spent by a carol’s secret key, plus the preimage of a value known only to Carol. The output also contains Carol’s public key, Bob’s public key, and the pubic hash of a secret preimage known only to Carol, except that the public keys in Bob’s output are in the opposite order to Carol’s, and the times are different.  After a while, both outputs become final and spendable in their respective blockchains.  Carol then uses her preimage to spend those three units in the foo chain, thereby automatically revealing it to Bob, which preimage Bob immediately employs to spend the output on the bar chain.

To spend an output, it has to be an input, one of many, to a transaction, and the whole transaction has to be signed by every signature required by every input, as each input defines a valid signature. So an input/output carries information amounting to a quantity of money, possibly a user name, and a signature definition. In the simplest and most common case, a public key defines what would constitute a valid signature.

The immutability of the output comes from the fact that is part of transaction, and the entire transaction has to be as signed, that the transaction has to be signed by the signatures for all the inputs. For this case, contract conditional on pre-image for a certain range of block numbers, the signature block has to the pre-image as well as the regular signature.

5 Micro and Nanopayments.

The blockchain is heavy, thus unsuitable for small and fast payments, such as the payments needed for storage and bandwidth while pirating files.

Small fast payments require trust, thus trusted intermediaries backed up by the blockchain.

How do we know if we can trust an intermediary?

Because he has a history of signed contracts, that it is easy to prove whether a contract has been honored, and no one has produced a contract that he signed, alleged that contract was dishonored, and he could not prove it was honored.

Assume Bob is a trusted intermediary between Ann and Carol. Ann wants to pay people, Carol among them, probabilistically – in lottery tickets that if won will result in payments on the blockchain.

The protocol is that Ann creates the unspent transaction output, which comes to exist, unspent, on the blockchain, and no one can spend it except Bob says so, since any transaction spending that output will need a Bob signature.  So if Bob is an OK guy, no double spending shall ever happen. If no double spending has ever happened, we can probably trust Bob for transactions similar to past transactions. If no past double spends, likely no future double spends.

Ann promises to give Carol a lottery ticket for services rendered, Carol gives Ann a signed hash of a secret preimage, and renders those services. Ann issues a lottery ticket by creating a random number, and giving Carol a signed hash of Carol’s hash and the lottery identifier. The ticket will be valid if the hash of Ann’s secret preimage, and Carol’s secret preimage has certain properties – typically that its value in big endian order modulo 264 is less than a certain amount.  The ticket commits Ann to the lottery conditions, being a hash of their secrets, and the conditions agreed to.

Carol shows Bob the lottery ticket, and asks

“will I get paid if the secrets under the hashes meet the required condition.”

Bob tells Carol

“Sure. I will issue a payment for block number such of the blockchain, the current block, if the preimage meets the conditions.”

thereby assuring Carol that Ann is on the up and up and providing the data needed to create a valid transaction if the lottery ticket is valid.  Bob provides a link to the transaction output that will be used showing that Carol has put real money where her mouth is, asserts it is unspent, and promises not to validate any further potentially winning lottery tickets for this block period, unless shown evidence that previously validated lottery tickets were losing tickets.

Carol, who has some reason to trust Bob, now knows that Ann is issuing valid lottery tickets – even if this was a losing lottery ticket.  Bob will refuse to issue more validations for this lottery and this block period. unless Carol provides proof that this was a losing lottery ticket.

If Carol goes dark at this point, the money is frozen till the next block period, which causes minor and temporary inconvenience for Ann and Bob but does not benefit Carol.

Suppose it is a winning lottery ticket – she informs Bob and Carol so that they know to issue a new lottery, and now injects it into the blockchain with the required data, and hashes that links to the conversations between herself, Bob, and Alice. If the payment goes through – the transaction inputs are real and have not been previously spent.  then done. If the transaction fails for block n of the block chain, when Bob said it would succeed, she uses the proof of failure - that blockchain input was invalid or spent in this block when Bob said it would be valid and unspent for this block, plus the previous conversations between herself, Bob, and Carol, to prove to the world that Bob was cheating.

If, on the other hand, there are lots of transactions of this form that have successfully gone through, and none that failed in this fashion, these provide compelling evidence that Bob is an honest dealer.

If Bob goes dark at some point (going dark means ceasing to respond, or issuing responses that will be rejected and ignored as invalid) the money remains unspent and unspendable, Ann and Carol are inconvenienced, no one wins, and no proof of bad behavior is generated.  But Bob cannot stay up for losing lottery tickets, but then conveniently go dark for winning lottery tickets because he issues the data required for a winning lottery ticket (or data that would prove he is a cheater) before he knows whether the ticket is winning or not.

If Carol goes dark, she does not get paid, but does not get proof of bad behavior by Ann or Bob.

If Ann goes dark, she does not pay Carol. Carol knows Ann is behaving badly, ceases to deal with her, but may not get proof of bad behavior by Ann that she can show to other people.  But getting such proof is not very useful anyway, since Carol’s identity is cheap and expendable, while Bob’s identity is durable and valuable.

Random stranger Ann contacts random stranger Carol, offers to pay in lottery tickets for data. Perhaps she wants to watch some movies. Shows proof that lottery prize recently existed in a recent block on the blockchain, which shows that Ann is not a total flake. Gets some data on trust. Provides lottery ticket. Bob says lottery ticket could win, depending on a secret that Carol has committed to, but not revealed. Carol checks that in the past Bob has paid out on lots of lottery tickets and not defected on any lottery ticket. More trust ensues.  Ann now has reason to trust Carol, Carol has reason to trust Ann, without anyone being exposed to large risks and without any actual blockchain transactions taking place. It takes an expensive blockchain transaction to create the lottery prize, but having created it, Ann and Bob can do very large numbers of transactions off blockchain on trust.

6 Institutions on the blockchain

A lot of people, instead of controlling outputs on the bitcoin blockchain by secret keys, have a login account, username and password, with an “exchange”.  That “exchange” (the institution, not the particular transaction mediated by the institution) owes them bitcoins, payable on demand.  And from time to time an exchange goes belly up, blaming the federal government or hackers, and just does not pay its clients the bitcoins it owes.

We call them “exchanges”, not “banks”, because the word “banks” implies a government guarantee, and a long past of honoring transactions, which these exchanges seldom have, but they are performing bank like functions.

We would like to have evidence of the institutions reserve fraction, of its term transformation (maturity transformation).

Solution: Institution runs its own side chain, with a small number of peers. The Merkle-patricia dac of unspent transaction outputs has in each node the sum of the money in each subtree, and the hash of subtree hashes and sums. Thus the standard client wallet will report the total owing/shares on issue

Creative Commons License reaction.la gpg key 154588427F2709CD9D7146B01C99BB982002C39F
This work is licensed under the Creative Commons Attribution 4.0 International License.