Trustless Bitcoin Bridge Creation with Witness Encryption - Cryptography - Ethereum Research Ethereum Research Trustless Bitcoin Bridge Creation with Witness Encryption Cryptography devfans November 16, 2023, 8:23am 26 Hi, correct me if I am wrong. Assuming the below condition: Alice deposits 1 BTC to a deposit address generated by the generators and gets the ciphertext CT, and then mints 1 WBTC on the Ethereum chain. The current Ethereum PoS network is maintained by a group of validators, say it’s group A. And a group named B, is a 2/3 subset of the group A. Say after a year, the group B validators exited the PoS network and withdraw their stake. Then they forked the chain from the checkpoint one year before, thus they wont get slashed even they publish the headers in OP_RETURNs, while they can still burn 1 WBTC to the contract to forge a witness to satisfy the circuit, thus recover the private key with Alice’s ciphertext CT. Does this assumption hold? This a common case for a PoS network according to my understanding. BTW, is there an implemented PoC version of this brilliant idea? Published somewhere to check? or A plan to implement it? leohio December 17, 2023, 8:41am 27 devfans: Alice deposits 1 BTC to a deposit address generated by the generators and gets the ciphertext CT, and then mints 1 WBTC on the Ethereum chain. The ciphertexts get generated when the deposit address is generated. So it already exists before he/she deposits BTC there. devfans: Then they forked the chain from the checkpoint one year before, thus they wont get slashed even they publish the headers in OP_RETURNs, while they can still burn 1 WBTC to the contract to forge a witness to satisfy the circuit, If the BLS signature on a forked chain is published in OP_RETURN, they get slashed. And even trying that is dangerous for them since only one honest node can reveal that to make them slashed. devfans: BTW, is there an implemented PoC version of this brilliant idea? Published somewhere to check? or A plan to implement it? The update is here. It’s not fully inheriting the security assumption, but this is the practical approach that comes after this post. https://ethresear.ch/t/octopus-contract-and-its-applications/ ← previous page Home Categories FAQ/Guidelines Terms of Service Privacy Policy Powered by Discourse, best viewed with JavaScript enabled