diff --git a/zip-0300.rst b/zip-0300.rst index 2b37bd2b..4c1c5583 100644 --- a/zip-0300.rst +++ b/zip-0300.rst @@ -14,23 +14,44 @@ Abstract ======== -This is an Informational ZIP describing a proposed specification for a standardized protocol for performing cross-chain atomic transactions (XCAT) between Zcash and Bitcoin, or other Bitcoin-derived cryptocurrencies. +This is an Informational ZIP describing a proposed specification for a +standardized protocol for performing cross-chain atomic transactions +(XCAT) between Zcash and Bitcoin, or other Bitcoin-derived +cryptocurrencies. + Motivation ========== -A well-defined standard for performing cross-chain transactions would improve the liquidity of cryptocurrencies and be useful for third-party services, such as decentralized exchanges. +A well-defined standard for performing cross-chain transactions would +improve the liquidity of cryptocurrencies and be useful for third-party +services, such as decentralized exchanges. + Specification ============= -The proposed protocol for XCAT is a set of hash time-locked contracts across both chains, created by two parties who wish to do a cross-chain exchange. +The proposed protocol for XCAT is a set of hash time-locked contracts +across both chains, created by two parties who wish to do a cross-chain +exchange. -To perform an exchange, both parties need to have the public keys of the other, on both chains. The party that wishes to initiate the exchange (the "seller") constructs two hash time-locked contracts by generating pay-to-script-hash (P2SH) addresses using the XCAT protocol and the public key of their counterparty (the "buyer"). +To perform an exchange, both parties need to have the public keys of the +other, on both chains. The party that wishes to initiate the exchange +(the "seller") constructs two hash time-locked contracts by generating +pay-to-script-hash (P2SH) addresses using the XCAT protocol and the +public key of their counterparty (the "buyer"). -For the purposes of this example, the seller initiating the exchange will be named "Alice", and the buyer agreeing to complete the exchange will be named "Bob". +For the purposes of this example, the seller initiating the exchange will +be named "Alice", and the buyer agreeing to complete the exchange will be +named "Bob". -Alice wishes to initiate an XCAT exchange from Bitcoin to Zcash. She chooses a random number R, hashes it, and creates a P2SH address on the Zcash blockchain using her and Bob's public keys, that she will wait for Bob to fund with the amount he wants to trade. (Agreement on the amount to trade and exchange rate is outside the scope of this protocol, and could be determined out-of-band, or within the user interface of an application using XCAT under the hood) +Alice wishes to initiate an XCAT exchange from Bitcoin to Zcash. She +chooses a random number R, hashes it, and creates a P2SH address on the +Zcash blockchain using her and Bob's public keys, that she will wait for +Bob to fund with the amount he wants to trade. (Agreement on the amount +to trade and exchange rate is outside the scope of this protocol, and +could be determined out-of-band, or within the user interface of an +application using XCAT under the hood) The script in the P2SH address takes the following form: @@ -44,12 +65,22 @@ The script in the P2SH address takes the following form: OP_EQUALVERIFY OP_CHECKSIG -There are two scenarios for spending funds from this P2SH address. The first is a successful atomic swap which gives Alice the money she asked for, and gives Bob access to the secret R which he can use to redeem his funds on the other blockchain. The second is a fail case which refunds Bob's money if Alice does not follow through. +There are two scenarios for spending funds from this P2SH address. The +first is a successful atomic swap which gives Alice the money she asked +for, and gives Bob access to the secret R which he can use to redeem his +funds on the other blockchain. The second is a fail case which refunds +Bob's money if Alice does not follow through. -1. Success case: Alice spends the funds sent to the address, revealing the random number R she hashed to create the script in the process. -2. Fail case: Alice does not spend the funds sent to the address within the timeout period, so Bob sends his funds back to himself, canceling the transaction. +1. Success case: Alice spends the funds sent to the address, revealing + the random number R she hashed to create the script in the process. +2. Fail case: Alice does not spend the funds sent to the address within + the timeout period, so Bob sends his funds back to himself, canceling + the transaction. -At the same time that Alice creates this P2SH address on the Zcash blockchain, she must also create a P2SH address on the Bitcoin blockchain, which she funds herself with the amount of BTC she wants to trade out of. +At the same time that Alice creates this P2SH address on the Zcash +blockchain, she must also create a P2SH address on the Bitcoin +blockchain, which she funds herself with the amount of BTC she wants to +trade out of. The script for this second transaction takes the following form: @@ -63,26 +94,63 @@ The script for this second transaction takes the following form: OP_EQUALVERIFY OP_CHECKSIG -The two scenarios for spending funds from this second P2SH address are as follows: +The two scenarios for spending funds from this second P2SH address are as +follows: -1. Success case: Bob uses R to spend the funds from this P2SH address, as Alice has already revealed R to Bob in the process of spending from the P2SH address he sent ZEC to on the Zcash blockchain. The cross-chain atomic transaction is now complete, and both parties have the funds they requested. -2. Fail case: Bob has not followed through on his part of the trade within the timeout period, so Alice sends her funds back to herself, canceling the transaction. +1. Success case: Bob uses R to spend the funds from this P2SH address, as + Alice has already revealed R to Bob in the process of spending from the + P2SH address he sent ZEC to on the Zcash blockchain. The cross-chain + atomic transaction is now complete, and both parties have the funds they + requested. + +2. Fail case: Bob has not followed through on his part of the trade + within the timeout period, so Alice sends her funds back to herself, + canceling the transaction. Timeout Periods --------------- -Having timeout periods on both transactions allows the XCAT protocol to work by enabling refunds in case a counterparty misbehaves. The example above uses a timeout period of 24 hours for the first transaction and 48 hours for the second, but these are simply suggestions. Actual timeout periods should be considered to be variables that depend on the following factors for any given implementation of XCAT: +Having timeout periods on both transactions allows the XCAT protocol to +work by enabling refunds in case a counterparty misbehaves. The example +above uses a timeout period of 24 hours for the first transaction and 48 +hours for the second, but these are simply suggestions. Actual timeout +periods should be considered to be variables that depend on the following +factors for any given implementation of XCAT: -**Duration** - The time-lock period on the transaction in which the initiating party reveals R must be significantly shorter than the time-lock period on the second transaction in which the other party uses the revealed R, in order to give them enough time to make use of R to redeem their funds. +Duration +'''''''' -For example, once Alice reveals R by spending what Bob sent to her P2SH address, Bob must have enough time to use R to redeem his funds on the other blockchain before Alice can be allowed to refund herself. If there were an insufficient time delay between the first and second timeout periods, Alice could potentially spend Bob's funds at the last minute, then quickly refund herself on the other blockchain before Bob gets a chance to redeem his portion using the R she reveals. +The time-lock period on the transaction in which the initiating party +reveals R must be significantly shorter than the time-lock period on the +second transaction in which the other party uses the revealed R, in order +to give them enough time to make use of R to redeem their funds. -Note that using long time-locks in the P2SH scripts does not necessarily mean that the transactions themselves will take a long time. If both parties are immediately responsive and execute their trades in a timely manner, providing the correct information, the full cross-chain atomic trade can happen quickly. The full duration of the timeout period for each transaction only elapses in the fail case, when either Alice or Bob defaults on their agreement to exchange. +For example, once Alice reveals R by spending what Bob sent to her P2SH +address, Bob must have enough time to use R to redeem his funds on the +other blockchain before Alice can be allowed to refund herself. If there +were an insufficient time delay between the first and second timeout +periods, Alice could potentially spend Bob's funds at the last minute, +then quickly refund herself on the other blockchain before Bob gets a +chance to redeem his portion using the R she reveals. -**Block times** - The protection provided by the timeout period must take into account relative block times between the two blockchains. +Note that using long time-locks in the P2SH scripts does not necessarily +mean that the transactions themselves will take a long time. If both +parties are immediately responsive and execute their trades in a timely +manner, providing the correct information, the full cross-chain atomic +trade can happen quickly. The full duration of the timeout period for +each transaction only elapses in the fail case, when either Alice or Bob +defaults on their agreement to exchange. + +Block times +''''''''''' + +The protection provided by the timeout period must take into account +relative block times between the two blockchains. Rationale ========= -Users are free to come up with their own protocols for cross-chain atomic transactions, but having a well-defined protocol would aid adoption and support third-party services wishing to provide such functionality. +Users are free to come up with their own protocols for cross-chain atomic +transactions, but having a well-defined protocol would aid adoption and +support third-party services wishing to provide such functionality.