Loading [MathJax]/jax/output/HTML-CSS/jax.js

RFC-0241/XMR Atomic Swap

status: draft

Maintainer(s): S W van Heerden

Licence

The 3-Clause BSD Licence.

Copyright 2021 The Tari Development Community

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

  1. Redistributions of this document must retain the above copyright notice, this list of conditions and the following disclaimer.
  2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
  3. Neither the name of the copyright holder nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS DOCUMENT IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS", AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Language

The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY" and "OPTIONAL" in this document are to be interpreted as described in BCP 14 (covering RFC2119 and RFC8174) when, and only when, they appear in all capitals, as shown here.

Disclaimer

This document and its content are intended for information purposes only and may be subject to change or update without notice.

This document may include preliminary concepts that may or may not be in the process of being developed by the Tari community. The release of this document is intended solely for review and discussion by the community of the technological merits of the potential system outlined herein.

Goals

This Request for Comment (RFC) aims to describe how an Atomic swap between Tari and Monero will be created.

Comments

Any comments, changes or questions to this PR can be made in one of the following ways:

Description

Doing atomic swaps with Monero is more complicated and requires a cryptographic dance to complete as Monero does not implement any form of HTLC's or the like. This means that when doing an atomic swap with Monero, most of the logic will have to be implemented on the Tari side. Atomic swaps between Monero and Bitcoin have been implemented by the Farcaster project and the Comit team. Due to the how TariScript works, we have a few advantages over Bitcoin script regarding adaptor signatures, as the script key was explicitly designed with scriptless scripts in mind.

Method

The primary, happy path outline of a Tari - Monero atomic swap is described here, and more detail will follow. We assume that Alice wants to trade her XTR for Bob's XMR.

  • Negotiation - Both parties negotiate the value and other details of the Monero and Tari UTXO's.
  • Commitment - Both parties commit to the keys, nonces, inputs, and outputs to use for the transaction.
  • XTR payment - Alice makes the XTR payment to a UTXO containing a "special" script described below.
  • XMR Payment - The Monero payment is made to a multiparty scriptless script UTXO.
  • Claim XTR - Bob redeems the XTR, and in doing so, reveals the XMR private key to Alice only.
  • Claim XMR - Alice may claim the XMR using the revealed key.

Please take note of the notation used in TariScript and specifically notation used on the signatures on the transaction inputs and on the signatures on the transaction outputs. We will note other notations in the Notation section.

TL;DR

The scheme revolves around Alice, who wants to exchange her Tari for Bob's Monero. Because they don't trust each other, they have to commit some information to do the exchange. And if something goes wrong here, we want to ensure that we can refund both parties either in Monero or Tari.

How this works is that Alice and Bob create a shared output on both chains. The Monero output is a simple aggregate key to unlock the UTXO, while multiple keys are needed to unlock the Tari UTXO. An aggregate key locks this Monero UTXO that neither Alice nor Bob knows, but they both know half of the key. The current Tari block height determines the unlocking key for the Tari UTXO.

The process is started by Alice and Bob exchanging and committing to some information. Alice is the first to publish a transaction, which creates the Tari UTXO. If Bob is happy that the Tari UTXO has been mined and verifies all the information, he will publish a transaction to create the Monero UTXO.

The TariScript script on the UTXO ensures that they will have to reveal their portion of the Monero key when either Alice or Bob spends this. This disclosure allows the other party to claim the Monero by being the only one to own the complete Monero aggregate key.

We can visualize the happy path flow with the image below. swap flow

The script will ensure that at any point in time, at least someone can claim the Tari UTXO, and if that person does so, the other party can claim the Monero UTXO by looking at the spending data. It has two lock heights, determining who can claim the Tari UTXO if the happy path fails. Before the first lock height, only Bob can claim the Tari; we call this the swap transaction.

If Bob disappears after Alice has posted the Tari UTXO, Alice can claim the Tari after the first lock height and before the second lock height; we call this the refund transaction. It ensures that Alice can reclaim her Tari if Bob disappears, and if Bob reappears, he can reclaim his Monero.

That leaves us with the scenario where Alice disappears after Bob posts the Monero transaction, in which case we need to protect Bob. After the second lock height, only Bob can claim the Tari; we call this the lapse transaction. The lapse transaction will reveal Bob's Monero key so that if Alice reappears, she can claim the Monero.

The image below details the time flow of the Tari transactions spending the Tari UTXO. swap flow

Heights, Security, and other considerations

We need to consider a few things for this to be secure, as there are possible scenarios that can reduce the security in the atomic swap.

When looking at the two lock heights, the first lock height should be sufficiently large enough to give ample time for Alice to post the Tari UTXO transaction and for it to be mined with a safe number of confirmations, and for Bob to post the Monero transaction and for it to be mined with a safe number of confirmations. The second lock height should give ample time for Alice after the first lock height to re-claim her Tari. Larger heights here might make refunds slower, but it should be safer in giving more time to finalize this.

Allowing both to claim the Tari after the second lock height is, on face value, a safer option. This can be done by enabling either party to claim the script with the lapse transaction. The counterparty can then claim the Monero. However, this will open up an attack vector to enable either party to claim the Monero while claiming the Tari. Either party could trivially pull off such a scheme by performing a front-running attack and having a bit of luck. The counterparty monitors all broadcast transactions to base nodes. Upon identifying the lapse transaction, they do two things; in quick succession, broadcast their lapse transaction and the transaction to claim the Monero, both with sufficiently high fees. Base nodes will prefer to mine transactions with the higher fees, and thus the counterparty can walk away with both the Tari and the Monero.

It is also possible to prevent the transaction from being mined after being submitted to the mempool. This can be caused by a combination of a too busy network, not enough fees, or a too-small period in the time locks. When one of these atomic swap transactions gets published to a mempool, we effectively already have all the details exposed. For the atomic swaps, it means we already revealed part of the Monero key, although the actual Tari transaction has not been mined. But this is true for any HTLC or like script on any blockchain. But in the odd chance that this does happen whereby the fees are too little and time locks not enough, it should be possible to do a child-pays-for-parent transaction to bump up the fees on the transaction to get it mined and confirmed.

Key construction

Using multi-signatures with Schnorr signatures, we need to ensure that the keys are constructed so that key cancellation attacks are not possible. To do this, we create new keys from the chosen public keys Ka and Kb

Ka=H(H(KaKb)Ka)Kaka=H(H(KaKb)Ka)kaKb=H(H(KaKb)Kb)Kbkb=H(H(KaKb)Kb)kb

Key equivalence

Monero uses Ed25519, while Tari uses Ristretto as its curve of choice. While Ristretto and Ed25519 both works on Curve25519 and the Edward points are the same, they differ when the points are encoded. In practice, this means the following:

Xm=xGmX=xGXXm

To use public keys across different implementations or curves, we must prove that the same private key created the "different" public keys. Because we exchange encoded points, we need some way of proving they are the same. Jepsen designed a proof to prove Discrete Logarithm Equality (DLEQ) between two generator groups. But the proof here is not created for Elliptic Curve Cryptography (ECC) but can be adapted to ECC by:

e=H(K1K2R1R2)s=r+e(k)R1=rGR2=rGmK1=kGK2=kGm

The verification is then: e=H(K1K2R1R2)sG=R1+e(K1)sGm=R2+e(K2)

But this method has a problem with ECC keys as they are always used as mod(n) where n is the group size. With ECC, we cannot always use the method; it can only be used when the two curves are of the same group size n, or s<n. If this is not the case, a bit comparison needs to be created to prove this. But luckily, we use Ristretto and Ed25519, both on Curve25519, because it’s the same curve, same generator point, and just different encodings. We can use this proof to know even though the encoded public keys do not match, they still share a private key

Key security

The risk of publicly exposing part of the Monero private key is still secure because of how ECC works. We can add two secret keys together and share the public version of both. And at the same time, we know that no one can calculate the secret key with just one part.

(ka+kb)G=kaG+kbG(ka+kb)G=Ka+Kb(ka+kb)G=K

We know that K, Ka, Kb are public. While k, ka, kb are all private.

But if we expose kb, we can try to do the following: (ka+kb)G=Ka+KbkaG=(Ka+KbkbG)kaG=Ka

However, this is the Elliptic-Curve Discrete Logarithm Problem, and there is no easy solution to solve this on current computer hardware. Thus this is still secure even though we leaked part of the secret key k.

Method 1

Detail

This method relies purely on TariScript to enforce the exposure of the private Monero aggregate keys. Based on Point Time Lock Contracts, the script forces the spending party to supply their Monero private key part as input data to the script, evaluated via the operation ToRistrettoPoint. This TariScript operation will publicly reveal part of the aggregated Monero private key, but this is still secure: see Key security.

The simplicity of this method lies therein that the spending party creates all transactions on their own. Bob requires a pre-image from Alice to complete the swap transaction; Alice needs to verify that Bob published the Monero transaction and that everything is complete as they have agreed. If she is happy, she will provide Bob with the pre-image to claim the Tari UTXO.

TariScript

The Script used for the Tari UTXO is as follows:

ToRistrettoPoint CheckHeight(height_1) LtZero IFTHEN PushPubkey(X_b) EqualVerify HashSha256 PushHash(HASH256{pre_image}) EqualVerify PushPubkey(K_{Sb}) Else CheckHeight(height_2) LtZero IFTHEN PushPubkey(X_a) EqualVerify PushPubkey(K_{Sa}) Else PushPubkey(X_b) EqualVerify PushPubkey(K_{Sb}) ENDIF ENDIF

Before height_1, Bob can claim the Tari UTXO by supplying pre_image and his private Monero key part x_b. After height_1 but before height_2, Alice can claim the Tari UTXO by supplying her private Monero key part x_a. After height_2, Bob can claim the Tari UTXO by providing his private Monero key part x_b.

Negotiation

Alice and Bob have to negotiate the exchange rate and the amount exchanged in the atomic swap. They also need to decide how the two UTXO's will look on the blockchain. To accomplish this, the following needs to be finalized:

  • Amount of Tari to swap for the amount of Monero
  • Monero public key parts Xma, Xmb ,and its aggregate form Xm
  • DLEQ proof of Xma and Xa
  • Tari script key parts KSa, KSb
  • The TariScript to be used in the Tari UTXO
  • The blinding factor ki for the Tari UTXO, which can be a Diffie-Hellman between their Tari addresses.

Key selection

Using (1), we create the Monero keys as they are multi-party aggregate keys. The Monero key parts for Alice and Bob is constructed as follows:

Xma=xmaGmXmb=xmbGmxma=H(H(XmaXmb)Xma)xmaxmb=H(H(XmaXmb)Xmb)xmbxma=xaxmb=xbXma=H(H(XmaXmb)Xma)XmaXmb=H(H(XmaXmb)Xmb)Xmbxm=xma+xmb+kiXm=Xma+Xmb+kiGmx=xa+xb+kiX=Xa+Xb+kiG

Commitment phase

This phase allows Alice and Bob to commit to using their keys.

Starting values

Alice needs to provide Bob with the following:

  • Script public key: KSa
  • Monero public key Xma with Ristretto encoding

Bob needs to provide Alice with the following:

  • Script public key: KSb
  • Monero public key Xmb with Ristretto encoding

Using the above equations in (7), Alice and Bob can calculate Xm, Xma, Xmb

DLEQ proof

Alice needs to provide Bob with:

  • Monero public key Xa encoding on Ristretto
  • DLEQ proof for Xma and Xa: (RZTa,RZMa,sZa)

e=H(XaXmaRZTaRZMa)sZa=r+e(xa)RZTa=rGRZMa=rGm

Bob needs to provide Alice with:

  • Monero public key Xb encoding on Ristretto
  • DLEQ proof for Xmb and Xb: (RZTb,RZMb,sZb)

e=H(XbXmbRZTbRZMb)sZa=r+e(xb)RZTa=rGRZMa=rGm

Alice needs to verify Bob's DLEQ proof with:

e=H(XbXmbRZTbRZMb)sZbG=RZTb+e(Xb)sZbGm=RZMb+e(Xmb)

Bob needs to verify Alice's DLEQ proof with:

e=H(XaXmaRZTaRZMa)sZaG=RZTa+e(Xa)sZaGm=RZMa+e(Xma)

XTR payment

Alice will construct the Tari UTXO with the correct script and publish the containing transaction to the blockchain, knowing that she can reclaim her Tari if Bob vanishes or tries to break the agreement. This is done with standard Mimblewimble rules and signatures.

XMR payment

When Bob sees that the Tari UTXO that Alice created is mined on the Tari blockchain with the correct script, Bob can publish the Monero transaction containing the Monero UTXO with the aggregate key Xm=Xma+Xmb+kiGm.

Claim XTR

When Alice sees that the Monero UTXO that Bob created is mined on the Monero blockchain containing the correct aggregate key Xm, she can provide Bob with the required pre_image to spend the Tari UTXO. She does not have the missing key xmb to claim the Monero yet, but it will be revealed when Bob claims the Tari.

Bob can now supply the pre_image and his Monero private key as transaction input to unlock the script.

Claim XMR

Alice can now see that Bob spent the Tari UTXO, and by examining the input_data required to satisfy the script, she can learn Bob's secret Monero key. Although this private key xmb is now public knowledge, her part of the Monero spend key is still private, and thus only she knows the complete Monero spend key. She can use this knowledge to claim the Monero UTXO.

The refund

If something goes wrong and Bob never publishes the Monero or disappears, Alice needs to wait for the lock height height_1 to pass. This will allow her to reclaim her Tari, but in doing so, she needs to publish her Monero secret key as input to the script to unlock the Tari. When Bob comes back online, he can use this public knowledge to reclaim his Monero, as only he knows both parts of the Monero UTXO spend key.

The lapse transaction

If something goes wrong and Alice never gives Bob the required pre_image, Bob needs to wait for the lock height height_2 to pass. This will allow him to claim the Tari he wanted all along, but in doing so, he needs to publish his Monero secret key as input to the script to unlock the Tari. When Alice comes back online, she can use this public knowledge to claim the Monero she wanted all along as only she now knows both parts of the Monero UTXO spend key.

Method 2

Detail

This method is based on work by the Farcaster project and the Comit team. It utilizes adapter signatures and multi-party commitment signatures to ensure that the spending party leaks their private Monero key part. Because all keys are aggregates keys, we need to ensure that the refund and lapse transactions are negotiated and signed before Alice publishes the Tari UTXO. This will allow either Alice or Bob to claim the refund and lapse transactions, respectively, without the other party being online.

TariScript

The Script used for the Tari UTXO is as follows:

CheckHeight(height_1) LtZero IFTHEN PushPubkey(K_{Ss}) Else CheckHeight(height_2) LtZero IFTHEN PushPubkey(K_{Sr}) Else PushPubkey(K_{Sl}) ENDIF ENDIF

Before height_1, Bob can claim the Tari UTXO if Alice gives him the correct signature to complete the transaction. After height_1 but before height_2, Alice can claim the Tari UTXO. After height_2, Bob can claim the Tari UTXO.

Negotiation

Alice and Bob have to negotiate the exchange rate and the amount exchanged in the atomic swap. They also need to decide how the two UTXO's will look on the blockchain. To accomplish this, the following needs to be finalized:

  • Amount of Tari to swap for the amount of Monero
  • Monero public key parts Xma, Xmb, and its aggregate form X
  • Tari script key parts KSsa, KSsb, and its aggregate form KSs for the swap transaction
  • Tari script key parts KSra, KSrb, and its aggregate form KSr for the refund transaction
  • Tari script key parts KSla, KSlb, and its aggregate form KSl for the lapse transaction
  • Tari sender offset key parts KOsa, KOsb, and its aggregate form KOs for the swap transaction
  • Tari sender offset key parts KOra, KOrb, and its aggregate form KOr for the refund transaction
  • Tari sender offset key parts KOla, KOlb, and its aggregate form KOl for the lapse transaction
  • All of the nonces used in the script signature creation and Metadata signature for the swap, refund, and lapse transactions
  • The script offset used in both the swap, refund, and lapse transactions
  • The TariScript to be used in the Tari UTXO
  • The blinding factor ki for the Tari UTXO, which can be a Diffie-Hellman between their addresses.

Key selection

Using (1), we create the Monero keys as they are multi-party aggregate keys.

The script key parts for Alice and Bob is constructed as follows:

kSsa=H(H(KSsaKSsb)KSsa)kSsakSsb=H(H(KSsaKSsb)KSsb)kSsbkSs=kSsa+ksbkSra=H(H(KSraKSrb)KSra)kSrakSrb=H(H(KSraKSrb)KSrb)kSrbkSr=kSra+kSrbkSla=H(H(KSlaKSlb)KSla)kSlakSlb=H(H(KSlaKSlb)KSlb)kSlbkSl=kSla+kSlb

The sender offset key parts for Alice and Bob is constructed as follows:

kOsa=H(H(KOsaKOsb)KOsa)kOsakOsb=H(H(KOsaKOsb)KOsb)kOsbkOs=kOsa+kSsbkOra=H(H(KOraKOrb)KOra)kOrakOrb=H(H(KOraKOrb)KOrb)kOrbkOr=kOra+kSrbkOla=H(H(KOlaKOlb)KOla)kOlakOlb=H(H(KOlaKOlb)KOlb)kOlbkOl=kOla+kSlb

The Monero key parts for Alice and Bob is constructed as follows:

xma=xaxmb=xbXma=xaGmXmb=xbGmXa=xaGXb=xbGxa=H(H(XaXb)Xa)xaxb=H(H(XaXb)Xb)xbx=xa+xb+kiXm=Xma+Xmb+kiGmX=Xa+Xb+kiG

Commitment phase

Similar to method 1, this phase allows Alice and Bob to commit to using their keys and requires more than one round to complete. Some of the information that needs to be committed depends on previous knowledge.

Starting values

Alice needs to provide Bob with the following:

  • Output commitment Cr of the refund transaction's output
  • Output features Fr of the refund transaction's output
  • Output script αr of the refund transaction's output
  • Output commitment Cl of the lapse transaction's output
  • Output features Fl of the lapse transaction's output
  • Output script αl of the lapse transaction's output
  • Public keys: KSsa, KSra, KSla, KOsa, KOra, KOla, Xa
  • Nonces: RSsa, RSra, RSla, RMsa, RMra, RMla

Bob needs to provide Alice with the following:

  • Output commitment Cs of the swap transaction's output
  • Output features Fs of the swap transaction's output
  • Output script αs of the swap transaction's output
  • Public keys: KSsb, KSrb, KSlb, KOsb, KOrb, KOlb, Xb
  • Nonces: RSsb, RSrb, RSlb, RMsb, RMrb, RMlb

After Alice and Bob have exchanged the variables, they start trading calculated values.

Construct adaptor signatures and DLEQ proofs

Alice needs to provide Bob with the following values:

  • Adaptor signature part bSra for bSra
  • Signature part aSra
  • Monero public key Xa encoded with Ristretto
  • Monero public key Xma encoded with ed25519
  • DLEQ proof for Xma and Xa: (RZTa,RZMa,sZa)

Alice constructs the adaptor signature of the input script signature parts for the refund transaction ( aSra and bSra ) with:

aSra=rSraa+er(vi)bSra=rSrab+er(kSra+ki)er=H((RSr+(Xa))αrθr(KSra+KSrb)Ci)RSr=rSraaH+rSrabG+RSrbXa=xaG

Alice constructs the DLEQ proof:

e=H(XaXmaRZTaRZMa)sZa=r+e(xa)RZTa=rGRZMa=rGm

Bob needs to provide Alice with the following values:

  • Adaptor signature part bSsb for bSsb
  • Signature part aSsb
  • Adaptor signature part bSlb for bSlb
  • Signature part aSlb
  • Monero public key Xb encoded with Ristretto
  • Monero public key Xmb encoded with ed25519
  • DLEQ proof for Xmb and Xb: (RZTb,RZMb,sZb)

Bob constructs the adaptor signatures of the input script signature parts for the swap transaction ( aSsb, bSsb ) and the lapse transaction ( aSlb and bSlb ) with

aSsb=rSsba+es(vi)bSsb=rSsbb+es(kSsb+ki)es=H((RSr+(Xb))αiθi(KSsa+KSsb)Ci)RSs=rSsbaH+rSsbbG+RSsaaSlb=rSlba+el(vi)bSlb=rSlbb+el(kSlb+ki)el=H((RSl+(Xb))αiθi(KSla+KSlb)Ci)RSl=rSlbaH+rSlbbG+RSlaXb=xbG

Bob constructs the DLEQ proof:

e=H(XbXmbRZTbRZMb)sZb=r+e(xb)RZTb=rGRZMb=rGm

Verify adaptor signatures and DLEQ proofs

Alice needs to verify Bob's adaptor signatures with:

aSsbH+bSsbG=RSsb+(Ci+KSsb)esaSlbH+bSlbG=RSlb+(Ci+KSlb)el

Alice needs to verify Bob's Monero public keys using the zero-knowledge proof:

e=H(XbXmbRZTbRZMb)sZbG=RZTb+e(Xb)sZbGm=RZMb+e(Xmb)

Bob needs to verify Alice's adaptor signature with:

aSraH+bSraG=RSra+(Ci+KSra)er

Bob needs to verify Alice's Monero public keys using the zero-knowledge proof:

e=H(XaXMaRZTaRZMa)sZaG=RZTa+e(Xa)sZaGm=RZMa+e(Xma)

Swap out refund and lapse transactions

If Alice and Bob are happy with the verification, they need to swap out refund and lapse transactions.

Alice needs to provide Bob with the following:

Alice constructs for the lapse transaction signatures. aSla=rSlaa+el(vi)bSla=rSlab+el(kSla)el=H((RSl+(Xb))αiθi(KSla+KSlb)Ci)RSl=rSlaaH+rSlabG+RSlbbMla=rMlab+e(kOla)RMla=bMlaGe=H((RMla+RMlb)αlFl(KOla+KOlb)Cl)γla=kSlakOla

Bob needs to provide Alice with the following:

Bob constructs for the refund transaction signatures. aSrb=rSrba+er(vi)bSrb=rSrbb+er(kSrb)er=H((RSr+(Xa))αiθi(KSra+KSrb)Ci)RSl=rSrbaH+rSrbbG+RSrabMrb=rMrbb+e(kOrb)RMrb=bMrbGe=H((RMra+RMrb)αrFr(KOra+KOrb)Cr)γrb=kSrbkOrb

Although the script validation on output Ci will not pass due to the lock height, both Alice and Bob need to verify that the total aggregated signatures and script offset for the refund and lapse transaction are valid should they need to publish them at a future date without the other party’s presence.

XTR payment

If Alice and Bob are happy with all the committed values, Alice will construct the Tari UTXO with the correct script and publish the containing transaction to the blockchain. Because Bob already gave her the required signatures for his part of the refund transaction, Alice can easily compute the required aggregated signatures by adding the parts together. She has all the knowledge to spend this after the lock expires.

XMR Payment

When Bob sees that the Tari UTXO that Alice created is mined on the Tari blockchain with the correct script, he can go ahead and publish the Monero UTXO with the aggregate key Xm=Xma+Xmb.

Claim XTR

When Alice sees that the Monero UTXO that Bob created is mined on the Monero blockchain containing the correct aggregate key Xm, she can provide Bob with the following allowing him to spend the Tari UTXO:

  • Script signature for the swap transaction (aSsabSsa),RSsa
  • Metadata signature for swap transaction (bMsa,RMsa)
  • Script offset for swap transaction γsa

She does not have the missing key xb to claim the Monero yet, but it will be revealed when Bob claims the Tari.

Alice constructs for the swap transaction. aSsa=rSsaa+es(vi)bSsa=rSsab+es(kSsa)es=H((RSs+(Xb))αiθi(KSsa+KSsb)Ci)RSs=rSsaaH+rSsabG+RSsbbMsa=rMsab+e(kOsa)RMsa=bMsaGe=H((RMsa+RMsb)αsFs(KOsa+KOsb)Cs)γsa=kSsakOsa

Bob constructs the swap transaction. aSsb=rSsba+es(vi)bSsb=rSsbb+xb+es(kSsb+ki)es=H((RSs+(Xb))αiθi(KSsa+KSsb)Ci)aSs=aSsa+aSsbbSs=bSsa+bSsbRSs=rSsabH+rSsbbG+RSsaaMsb=rMsba+e(vs)bMsb=rMsbb+e(kOsb+ks)RMsb=aMsbH+bMsbGe=H((RMsa+RMsb)αsFs(KOsa+KOsb)Cs)RMs=RMsa+RMsbγsb=kSsbkOsbγs=γsa+γsb

Bob's transaction now has all the required signatures to complete the transaction. He will then publish the transaction.

Claim XMR

Because Bob has now published the transaction on the Tari blockchain, Alice can calculate the missing Monero key xb as follows:

bSs=bSsa+bSsbbSsbSsa=bSsbbSsb=rSsbb+xb+es(kSsb+ki)bSsbbSsb=rSsbb+xb+es(kSsb+ki)(rSsbb+es(kSsb+ki))bSsbbSsb=xb

With xb in hand, she can calculate X=xa+xb, and with this, she claims the Monero.

The refund

If something goes wrong and Bob never publishes the Monero, Alice needs to wait for the lock height height_1 to pass. This will allow her to create the refund transaction to reclaim her Tari.

Alice constructs the refund transaction with

aSra=rSraa+es(vi)bSra=rSrab+xa+es(kSra+ki)er=H((RSr+(Xa))αiθi(KSra+KSrb)Ci)aSr=aSra+aSrbbSr=bSra+bSrbRSr=rSraaH+rSrabG+RSrbaMra=rMraa+e(vr)bMra=rMrab+e(kOra+kr)RMra=aMraH+bMraGe=H((RMra+RMrb)αsFs(KOra+KOrb)Cr)RMr=RMra+RMrbγra=kSrakOraγr=γra+γrb

This allows Alice to claim back her Tari, but it also exposes her Monero key xa This means if Bob did publish the Monero UTXO, he could calculate X using: bSr=bSra+bSrbbSrbSra=bSrabSra=rSrab+xa+er(kSra+ki)bSrabSra=rSrab+xa+er(kSra+ki)(rSrab+er(kSra+ki))bSrabSra=xa

The lapse transaction

If something goes wrong and Alice never publishes her refund transaction, Bob needs to wait for the lock height height_2 to pass. This will allow him to create the lapse transaction to claim the Tari.

Bob constructs the lapse transaction with aSlb=rSlba+el(vi)bSlb=rSlbb+xb+el(kSlb+ki)el=H((RSl+(Xb))αiθi(KSla+KSlb)Ci)aSl=aSla+aSlbbSl=bSla+bSlbRSl=rSlbaH+rSlbbG+RSlaaMlb=rMlba+e(vl)bMlb=rMlbb+e(kOlb+kl)RMlb=aMlbH+bMlbGe=H((RMla+RMlb)αlFl(KOla+KOlb)Cl)RMl=RMla+RMlbγlb=kSlbkOlbγr=γla+γlb

This allows Bob to claim the Tari he originally wanted, but it also exposes his Monero key xb This means if Alice ever comes back online, she can calculate X and claim the Monero she wanted all along using: bSl=bSlb+bSlbbSlbSlb=bSlbbSlb=rSlbb+xa+er(kSlb+ki)bSlbbSlb=rSlbb+xb+er(kSlb+ki)(rSlbb+er(kSlb+ki))bSlbbSlb=xb

Notation

Where possible, the "usual" notation is used to denote terms commonly found in cryptocurrency literature. Lower case characters are used as private keys, while uppercase characters are used as public keys. New terms introduced here are assigned greek lowercase letters in most cases. Some terms used here are noted down in TariScript.

NameSymbolDefinition
subscript ssThe swap transaction
subscript rrThe refund transaction
subscript llThe lapse transaction
subscript aaBelongs to Alice
subscript bbBelongs to Bob
Monero keyXAggregate Monero public key encoded with Ristretto
Alice's Monero keyXaAlice's partial Monero public key encoded with Ristretto
Bob's Monero keyXbBob's partial Monero public key encoded with Ristretto
Monero keyXmAggregate Monero public key encoded with Ed25519
Alice's Monero keyXmaAlice's partial Monero public key encoded with Ed25519
Bob's Monero keyXmbBob's partial Monero public key encoded with Ed25519
Script keyKsThe script key of the utxo
Alice's Script keyKsaAlice's partial script key
Bob's Script keyKsbBob's partial script key
Alice's adaptor signaturebSaAlice's adaptor signature for the signature bSa of the script_signature of the utxo
Bob's adaptor signaturebSbBob's adaptor signature for the bSb of the script_signature of the utxo
Ristretto G generatorkGValue k over Curve25519 G generator encoded with Ristretto
Ristretto H generatorkHValue k over Tari H generator encoded with Ristretto
ed25519 G generatorkGmValue k over Curve25519 G generator encoded with Ed25519