Skip to main content

Bitcoin Covenants

  • Conference paper
  • First Online:
Book cover Financial Cryptography and Data Security (FC 2016)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9604))

Included in the following conference series:

Abstract

This paper presents an extension to Bitcoin’s script language enabling covenants, a primitive that allows transactions to restrict how the value they transfer is used in the future. Covenants expand the set of financial instruments expressible in Bitcoin, and enable new powerful and novel use cases. We illustrate two novel security constructs built using covenants.

The first, vaults, focuses on improving the security of private cryptographic keys. Historically, maintaining these keys securely and reliably has been a critical vulnerability for Bitcoin users. We show how covenants enable vaults, which disincentivize key theft by preventing an attacker from gaining full access to stolen funds.

The second construct, poison transactions, is a generally useful mechanism for penalizing double-spending attacks. Bitcoin-NG, a protocol that has been recently proposed to improve Bitcoin’s throughput, latency and overall scalability, requires this feature. We show how covenants enable poison transactions, and detail how Bitcoin-NG can be implemented progressively as an overlay on top of the Bitcoin blockchain.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    A covenant is a special contract in property law that restricts the use of an object, typically restricting the use of land for certain purposes. We adopt the term from earlier discussions on related ideas [22], which are discussed in Sect. 6.

  2. 2.

    We abstract from opcode behavior specific to Bitcoin’s soft-fork upgrade mechanism, namely the need to drop items from the stack afterwards.

References

  1. Back, A., Corallo, M., Dashjr, L., Friedenbach, M., Maxwell, G., Miller, A., Poelstra, A., Timón, J., Wuille, P.: Enabling Blockchain Innovations with Pegged Sidechains. https://blockstream.com/sidechains.pdf. Accessed 03 Nov 2015

  2. #Bitcoin-Wizard IRC log. https://download.wpsoftware.net/bitcoin/wizards/2014/01/14-01-15.log. Accessed 28 Oct 2015

  3. Block chain. https://en.bitcoin.it/w/index.php?title=Block_chain&oldid=59033. Accessed 19 Oct 2015

  4. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Research perspectives on bitcoin and second-generation cryptocurrencies. In: IEEE Symposium on Security and Privacy. IEEE, San Jose (2015)

    Google Scholar 

  5. Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 156–174. Springer, Heidelberg (2014)

    Google Scholar 

  6. BtcDrak, Friedenbach, M., Lombrozo, E.: BIP 112: CHECKSEQUENCEVERIFY (2015). https://github.com/bitcoin/bips/blob/master/bip-0112.mediawiki. Accessed 08 Oct 2015

  7. Buterin, V.: A Next Generation Smart Contract and Decentralized Application Platform (2013). https://www.ethereum.org/pdfs/EthereumWhitePaper.pdf/. Accessed Feb 2015

  8. Buterin, V.: Slasher: A Punitive Proof-of-Stake Algorithm, January 2015. https://blog.ethereum.org/2014/01/15/slasher-a-punitive-proof-of-stake-algorithm/

  9. Chaum, D., Fiat, A., Naor, M.: Untraceable electronic cash. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 319–327. Springer, Heidelberg (1990)

    Google Scholar 

  10. Coastermonger: Thief’s downfall covenant. https://bitcointalk.org/index.php?topic=278122.msg3164726#msg3164726. Accessed 16 Sept 2013

  11. Colored Coins Project. Colored Coins. http://coloredcoins.org/. Accessed Sept 2015

  12. d’aniel, Todd, P.: Security deposits (2013). https://bitcointalk.org/index.php?topic=278122.msg2973895#msg2973895. Accessed 20 Aug 2013

  13. Decker, C.: [bitcoin-dev] [BIP] Normalized transaction IDs. https://lists.linuxfoundation.org/pipermail/bitcoin-dev/2015-November/011657.html. Accessed 03 Nov 2015

  14. Dogecoin Project. Dogecoin. http://dogecoin.com/. Accessed Nov 2014

  15. Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of bitcoin key management. In: NDSS Workshop on Usable Security (USEC) (2015)

    Google Scholar 

  16. Eyal, I., Gencer, A.E., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. In: Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI 16–18, 2016, Santa Clara, CA, USA, March 2016

    Google Scholar 

  17. Goldfeder, S., Gennaro, R., Kalodner, H., Bonneau, J., Kroll, J.A., Felten, E.W., Narayanan, A.: Securing Bitcoin Wallets Via a New DSA/ECDSA Threshold Signature Scheme (2015)

    Google Scholar 

  18. Hankerson, D., Menezes, A., Vanstone, S.: Guide to Elliptic Curve Cryptography (2004)

    Google Scholar 

  19. Higgins, S.: Bitstamp Claims $5 Million Lost in Hot Wallet Hack (2015). http://www.coindesk.com/bitstamp-claims-roughly-19000-btc-lost-hot-wallet-hack/. Accessed 16 Oct 2015

  20. List of Major Bitcoin Heists, Thefts, Hacks, Scams, Losses. https://bitcointalk.org/index.php?topic=576337. Accessed 16 Oct 2015

  21. Litecoin Project. Litecoin, open source P2P digital currency. https://litecoin.org. Accessed Nov 2014

  22. Maxwell, G.: CoinCovenants Using SCIP Signatures, an Amusingly Bad Idea. https://bitcointalk.org/index.php?topic=278122.0. Accessed 25 Oct 2015

  23. Nakamoto, S., Bitcoin: A Peer-to-Peer Electronic Cash System (2008). http://www.bitcoin.org/bitcoin.pdf

  24. Ruffing, T., Kate, A., Schröder, D.: Liar, liar, coins on fire! — penalizing equivocation by loss of bitcoins. In: Proceedings of the 22nd Conference on Computer and Communications Security, CCS 2015, Denver, CO, USA. ACM, New York (2015)

    Google Scholar 

  25. Todd, P.: BIP 65: OP_CHECKLOCKTIMEVERIFY (2014). https://github.com/bitcoin/bips/blob/master/bip-0065.mediawiki. Accessed 08 Oct 2015

  26. Tschorsch, F., Scheuermann, B.: Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies. Cryptology ePrint Archive. Report 2015/464 (2015)

    Google Scholar 

  27. Vishnumurthy, V., Chandrakumar, S., Sirer, E.G.: Karma: a secure economic framework for peer-to-peer resource sharing. In: Workshop on the Economics of Peer-to-Peer Systems, Berkeley, California, vol. 35 (2003)

    Google Scholar 

Download references

Acknowledgments

The authors thank Glenn Willen for useful conversations, Tim Ruffing and Dominique Schröder for their advice on cryptographic primitives, and the anonymous reviewers for their valuable feedback.

This material is based upon work supported by a fellowship within the FITweltweit programme of the German Academic Exchange Service (DAAD), the German Bundesministerium für Bildung und Forschung (BMBF) under grant agreement No. 13N13505, and the National Science Foundation under Grant No. CNS-1518779 and Grant No. CNS-1561209. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding organizations.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Malte Möser .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 International Financial Cryptography Association

About this paper

Cite this paper

Möser, M., Eyal, I., Gün Sirer, E. (2016). Bitcoin Covenants. In: Clark, J., Meiklejohn, S., Ryan, P., Wallach, D., Brenner, M., Rohloff, K. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9604. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-53357-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-53357-4_9

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-53356-7

  • Online ISBN: 978-3-662-53357-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics