PQC Multisig V3.1: Equal-Participants Multisig with Per-Output Forward Privacy
Status: DRAFT v1.1 — incorporates three rounds of adversarial wargame feedback and the resolved prover-verification mechanism Supersedes:
PQC_MULTISIG.md(original), the standalone V3.1 governance and receiving drafts, and v1.0 of this consolidated spec Companion:PQC_MULTISIG_V3_1_ANALYSIS.md(size analysis, attack catalog, cryptographer review targets, design rationale) Consensus impact: None. Wallet-layer protocol on existing V3 consensus rules.
Table of Contents
- Purpose and Scope
- Design Principles
- Threat Model
- Roles
- Group Setup
- Address Format
- Receiving Outputs
- Wallet Scanning and Receive-Time Validation
- Spend Intent
- Canonical Construction
- Spending: Prover and Signing
- Messages and Transport
- State Machine and Counter Recovery
- Security Properties
- Forward Compatibility
- Implementation Plan
- Appendix A: Canonical Test Vectors
- Appendix B: Mapping from Original Spec
1. Purpose and Scope
Shekyl V3.1 multisig replaces the original coordinator-based design with an equal-participants model that:
- Eliminates the central coordinator role as a power center
- Achieves deterministic transaction construction
- Provides per-output forward privacy on the receive side (Option C model)
- Composes cleanly with the existing
scheme_id = 2consensus rules
This document is the single source of truth. It supersedes the original
PQC_MULTISIG.md and the two split drafts that were merged into v1.0, as
well as v1.0 itself.
No consensus changes are made by V3.1. All bindings, checks, and authorizations rely on rules and code paths already present in V3.
2. Design Principles
- Symmetric authority. The four authorities historically conflated in "coordinator" — proposal, construction, signing, assembly — are split. Only the FCMP++ proving role retains a designated holder per output, and that role rotates deterministically across the group.
- Deterministic construction. Given a spend intent and a committed chain snapshot, every participant produces byte-identical transaction bytes. There is no interface latitude.
- Per-output forward privacy. Each output to a multisig group derives N fresh ephemeral hybrid keypairs. Two spends from the same group are cryptographically indistinguishable from spends by two different groups of the same cardinality.
- No consensus changes. Every binding is achievable within existing V3 rules. The worst-case failure of a wallet-layer bug is a failed broadcast, never a chain split.
- Get it right. Where deferring a feature lets us avoid shipping speculative cryptography, we defer. FROST SAL (V4), the full rotation protocol (V3.2), and chain-anchored group registries (V3.3+) are all explicitly out of V3.1 scope, with reserved namespace for clean future addition.
- Honest-signer protocol invariants. Where consensus cannot enforce a property without a hard fork, the property is enforced at the wallet layer by honest signers. These invariants are enumerated in §2.7 and each one is made mechanically unbypassable in supported client stacks.
- Forward-compatible primitives. Cryptographic primitives that might
change in future versions (spend-auth keys, prover schemes) are
abstracted behind a
versionbyte so future schemes slot in without protocol rewrites.
2.7 Honest-Signer Invariants (Authoritative List)
Several security properties in V3.1 cannot be enforced at the consensus layer without a hard fork. These properties are instead enforced at the wallet layer by honest signers. This section is the authoritative list of such invariants; the signing path in supported wallets MUST enforce each one before producing a signature.
| # | Invariant | Enforced in | §reference |
|---|---|---|---|
| I1 | Spend intent passes all invariant checks in §9.2 | Pre-signing verification | §9.2 |
| I2 | Chain state fingerprint matches signer's local view | Pre-signing verification | §9.3 |
| I3 | FCMP++ proof binds to signer's independently-computed signing payload | Pre-signing verification | §11.3 |
| I4 | BP+ range proofs verify against signer's independently-computed commitments | Pre-signing verification | §10.2 |
| I5 | Output public key O matches the assigned prover's spend-auth pubkey | Pre-signing verification | §11.3 |
| I6 | tx_hash commitment agrees across all M SignatureShares before assembly | Pre-assembly verification | §11.5 |
| I7 | Receive-time: every tracked output's O matches spend_auth_pubkeys[rotating_prover_index(...)] | Receive-time validation | §8.3 |
Implementation requirements:
- Each invariant MUST be checked in the core signing path. It MUST NOT be possible to produce a valid SignatureShare without the corresponding check having executed and returned success.
- On any invariant violation, the wallet MUST:
- Abort the signing operation
- Publish a signed
InvariantViolationmessage (type0x09; see §12.2.6) - Move the intent to
REJECTEDstate
- Wallets MUST NOT expose
--unsafe-skip-verificationflags or equivalents. Tests that bypass invariants MUST be gated behind compile-time feature flags that are excluded from release builds. - Interop test suite (see §16.8) MUST include cases where a malicious client attempts each invariant violation; all conforming clients MUST reject identically.
This list is closed. New invariants require a spec update and reviewer sign-off before addition.
3. Threat Model
3.1 In scope
| Adversary | Capabilities | Defended by |
|---|---|---|
| Malicious sender | Constructs outputs to grief recipients | §7.6 wallet-side filtering; §8.3 receive-time validation |
| Malicious group member (single) | Tries to spend alone, redirect funds, or DoS | M-of-N threshold; §2.7 I5 honest-signer prover verification; veto |
| Malicious prover | Tries to construct invalid or substitute proof | §2.7 I3, I4 signer-side proof verification before signing |
| Malicious assembler | Tries to broadcast tampered tx | §2.7 I6 tx-hash commitments |
| Network observer | Tries to identify groups, link spends | §6 file-based addresses; §7 per-output ephemeral keys; §12 encrypted transport |
| Malicious relay operator | Drops, reorders, injects messages | §12.4 mandatory multi-relay with operator uniqueness; §13.3 heartbeat protocol |
| Network partition | Causes state divergence | §13.4 CounterProof recovery |
| Scanner resource exhaustion | Burns scanner CPU via griefing outputs | §7.6 per-sender griefing scores + hard caps |
3.2 Out of scope
| Threat | Reason |
|---|---|
| M-of-N collusion | Defeats any multisig by definition |
| Compromise of group's enduring KEM private keys | Catastrophic by design; mitigated by V3.2 full rotation |
| Quantum break of both ML-KEM and X25519 simultaneously | The hybrid scheme's whole point |
| Permanent loss of a participant's keys | 1/N of group's outputs become unrecoverable; documented limitation; V3.1 requires setup-time acknowledgment per §5.4 |
| FCMP++ prover liveness on permanent participant loss | 1/N of outputs locked; V4 FROST SAL fixes |
| Selective disclosure by M signers to outside auditor | Inherent to any threshold scheme |
3.3 Accepted but bounded threats
Griefing via malformed multisig output. A malicious sender can construct
outputs that appear to target a multisig group (correct tx_extra
fields, correct group-id claim) but whose KEM ciphertexts or spend-auth
pubkey bindings do not correspond to the group's real keys. The
recipient's wallet attempts decap and receive-time validation, rejects,
and the output is discarded. The attacker pays the fee; the recipient
gets nothing.
This attack is bounded by attacker fee cost. §7.6 specifies scanner- side resource limits (per-sender griefing scores, hard caps, 7-day cooldowns) to bound the scanner CPU cost of sustained griefing. A consensus-layer fix would require a chain-anchored group registry (V3.3+ candidate); accepted as residual risk for V3.1.
3.4 Attacks mitigated by previous work
| Attack | Mitigation |
|---|---|
| Scheme downgrade (output committed scheme_id=2, spent as scheme_id=1) | §7.5 indirect binding via leaf hash + pqc_auth size check; wired expected_scheme_id and expected_group_id for defense in depth |
| Key substitution within a group | Existing verify_multisig Check 8 (key uniqueness) |
| Signer index manipulation | Existing verify_multisig Checks 6 and 7 (range, ascending) |
| Blob truncation/padding | Strict size checks in tx_pqc_verify.cpp |
| Replay across groups | group_id binding in canonical signing payload |
| Replay within group | intent_id + tx_counter + expires_at + reference_block_hash + kem_randomness_seed freshness |
4. Roles
| Role | Authority | Who | Adversarial bound |
|---|---|---|---|
| Proposer | Publishes signed spend intent | Any group member | Signers veto by refusing to sign |
| Prover | Constructs FCMP++ membership proof for a specific output | Deterministically rotated per output; see §11.1 | Cannot modify tx; proof binds to signers' computed payload |
| Signer | Produces hybrid signature over canonical payload | Any M of the N members | Cannot individually authorize; needs M−1 collaborators |
| Assembler | Collects M signatures, broadcasts | Any group member with M sigs | Can only broadcast what signers produced |
The prover role is the only structural asymmetry remaining in V3.1, and even it is per-output rather than per-group. V4 FROST SAL eliminates the prover role entirely by threshold-sharing the classical key.
5. Group Setup
5.1 Group parameters
A group is defined by:
n_total: total signers,1 ≤ n_total ≤ 7(consensus cap)m_required: threshold,1 ≤ m_required ≤ n_totalgroup_version:0x01for V3.1 (reserved for future rotation)spend_auth_version:0x01for V3.1 classical ephemeral spend-auth- N hybrid signing keypairs (Ed25519 + ML-DSA-65), one per participant
- N hybrid KEM keypairs (X25519 + ML-KEM-768), one per participant
5.2 Distributed Key Generation (mandatory, no testing escape)
V3.1 groups MUST be created via Distributed Key Generation for the group shared transport secret. There is NO simple-mode fallback: production wallet builds MUST NOT compile any code path that distributes this secret without DKG.
Specifically:
- The
multisig-v3.1feature flag, when enabled in release builds, MUST activate a compile-time assertion that disables all simple-mode code paths. - Development and test builds MAY include simple-mode behind a separate
unsafe-testing-onlyfeature flag that is mutually exclusive with the release-build feature flag. Simple-mode code, if present, MUST emit runtime warnings on every invocation and MUST refuse to broadcast transactions constructed from simple-mode groups. - CI MUST verify that release builds do not contain simple-mode symbols.
The DKG ceremony uses the existing dkg-pedpop infrastructure already
present in shekyl-wallet-core/src/multisig/dkg.rs. The DKG output is
the 32-byte group_shared_secret from which per-message encryption keys
are derived (see §12.3).
DKG is performed once at group creation. The shared secret persists for the lifetime of the group's transport layer. This secret is distinct from any cryptographic spend key; its only purpose is encrypting multisig coordination messages.
5.3 group_id derivation
The 32-byte group_id binds the group's identity:
group_id = cn_fast_hash(
group_version ||
scheme_id (= 2) ||
spend_auth_version ||
n_total ||
m_required ||
concat(sorted(hybrid_signing_pubkeys))
)
The signing pubkeys (not KEM pubkeys) define group identity. This allows KEM-only rotation (compromised KEM keys) without changing authorization identity in a future V3.2 enhancement.
spend_auth_version is included so that a future rotation to a new
spend-auth scheme produces a new group_id, preventing silent
reinterpretation of outputs across prover schemes.
5.4 1/N permanent-loss acknowledgment (mandatory)
Before a group is activated, each participant MUST acknowledge the following through an explicit wallet UI action:
"I understand that V3.1 multisig assigns proving duties across the group's members by rotation. If any participant permanently loses their keys, approximately 1/N of outputs the group receives will become permanently unspendable. For N=3 that is 33%; for N=5, 20%; for N=7, 14%.
I have an independent operational plan for key loss. I will not place value in this group that I cannot tolerate losing if one participant's keys are destroyed."
Each participant's acknowledgment is signed (hybrid-signed) and shared with all other participants. A group is not activated (cannot receive funds) until all N acknowledgments are collected.
Wallets MUST persist the acknowledgments as part of group state and MUST NOT allow activation without them.
5.5 Setup ceremony (informative summary)
Concrete steps for participants forming a new group:
- Each participant generates fresh hybrid signing and KEM keypairs.
- Participants exchange signing public keys and KEM public keys via authenticated out-of-band channels (cryptographic verification: each participant signs a setup attestation with their hybrid signing key over the canonical encoding of all participants' public keys).
- Each participant independently computes
group_idand verifies all others derived the same value. - Participants jointly run the DKG ceremony for
group_shared_secret. - Each participant constructs the full multisig address locally; all should produce byte-identical addresses.
- Each participant completes the 1/N risk acknowledgment (§5.4).
- Address is exported as a file (too large for QR/clipboard at most N values).
- Participants store group state: their own keypairs, the N pubkeys of
others, group_id, group_version, spend_auth_version, threshold
parameters, DKG-derived shared secret, acknowledgments, and an
initial
tx_counter = 0.
6. Address Format
6.1 Bech32m encoding with new HRP
Multisig addresses use a new Bech32m human-readable prefix:
single-sig: shekyl1:<version 0x01><classical>/<pqc>
single-sig tn: shekyltest1:<...>
multisig: shekyl1m:<version 0x01><group_metadata>
multisig tn: shekyltest1m:<...>
The visible m suffix prevents wallet confusion. Wallets MUST
type-check the HRP at parse time.
Reserved: shekyl1n... (rotated-key multisig, V3.2+). Do not issue.
6.2 Multisig address payload
MultisigAddressPayload {
version: u8 (= 0x01)
group_version: u8 (= 0x01)
spend_auth_version: u8 (= 0x01)
network_byte: u8
n_total: u8 (1..=7)
m_required: u8 (1..=n_total)
hybrid_kem_pubkeys: [HybridKemPubkey; n_total]
// Each: X25519 (32 B) + ML-KEM-768 (1184 B) = 1216 B
// Canonically ordered by participant_index (0..n_total)
hybrid_sign_pubkeys: [HybridSignPubkey; n_total]
// Each: Ed25519 (32 B) + ML-DSA-65 (1952 B) = 1984 B
// Canonically ordered by participant_index (0..n_total)
checksum: [u8; 4] // Bech32m
}
Total payload: 10 + N × 3200 bytes.
| N | Payload bytes | Bech32m chars |
|---|---|---|
| 2 | 6,410 | ~10,260 |
| 3 | 9,610 | ~15,380 |
| 5 | 16,010 | ~25,620 |
| 7 | 22,410 | ~35,860 |
6.3 Address handling, fingerprint UX, and provenance
Wallets MUST handle multisig addresses via file export and import: canonical payload written to a file, transferred via authenticated channel, imported at recipient end.
Fingerprint display: wallets MUST display a 32-byte fingerprint during send confirmation:
address_fingerprint = cn_fast_hash(canonical(MultisigAddressPayload))
The fingerprint MUST be displayed in three parallel representations:
- Hex format (64 characters, grouped as 4-char blocks for reading)
- Grouped-word checksum phrase (derived from the fingerprint via a fixed wordlist; 10-word phrase, stable, deterministic, for human verbal verification)
- Structured metadata badge:
(m)-of-(n), spend_auth v(X), group v(Y)
Provenance tracking: wallets MUST persist address provenance in local state:
AddressProvenance {
address_fingerprint: [u8; 32]
first_imported_at: u64
imported_from_source: string (file path, URL, QR, etc.)
user_assigned_label: string
last_used_at: u64
prior_fingerprints: [[u8; 32]] // history of changed fingerprints for same label
}
Dual confirmation on changes: when a user initiates a payment to a label that previously resolved to a different fingerprint, the wallet MUST require dual confirmation:
- Display the new fingerprint prominently alongside the old
- Display the user-assigned label and warn that the underlying address has changed
- Require a second confirmation step (e.g., typing "CONFIRM CHANGED")
This protects against address file substitution attacks where an attacker swaps a victim's address file between payments.
6.4 Mandatory fingerprint verification UI
For every multisig send, the sender's wallet MUST:
- Compute and display the recipient address fingerprint (all three representations from §6.3)
- Require explicit user confirmation that the displayed fingerprint matches what the recipient communicated out-of-band
- Refuse to construct the transaction if confirmation is not given
This is the primary defense against social-engineering attacks on multisig addresses.
6.5 Future: chain-anchored group registry
A V3.3+ candidate enhancement would add a CreateGroup transaction type
that commits a group's pubkeys on-chain at a short identifier. Addresses
would reference the on-chain group by short hash (~100 B address). This is
explicitly out of V3.1 scope and would be a consensus change.
7. Receiving Outputs
7.1 Per-output KEM fan-out with published spend-auth pubkeys (Option C + Solution C)
For each multisig-recipient output, the sender performs N separate KEM
encapsulations, producing N independent ephemeral hybrid signing keypairs
and N independent ephemeral classical spend-auth keypairs. The spend-
auth pubkeys are published explicitly in tx_extra to enable public
prover-assignment verification.
def construct_multisig_output(
sender_tx_secret_key: secret_key,
recipient_address: MultisigAddress,
amount: u64,
output_index_in_tx: u64,
reference_block_hash: [u8; 32],
kem_seed: [u8; 32], # see §7.3
):
kem_ciphertexts = [] # N × HybridKemCiphertext
ephemeral_sign_pks = [] # N × HybridSignPubkey
spend_auth_pubkeys = [] # N × 32 bytes (classical Y_i = y_i * G)
view_tag_hints = [] # N × u8
ss_by_index = {} # cache for commitment mask derivation
for i in range(recipient_address.n_total):
# Per-participant deterministic KEM randomness
kem_randomness_i = HKDF_Expand(
kem_seed,
b"shekyl-v31-multisig-kem" || u64_le(output_index_in_tx) || u8(i),
64
)
# Encap to participant i's KEM pubkey
ct_i, ss_i = HybridKEM.encap_deterministic(
recipient_address.hybrid_kem_pubkeys[i],
kem_randomness_i
)
kem_ciphertexts.append(ct_i)
ss_by_index[i] = ss_i
# Derive per-output ephemeral material with DOMAIN SEPARATION
# See §7.2 for KDF label definitions
hybrid_sign_kdf = HKDF_Expand(
ss_i, b"shekyl-v31-hybrid-sign", 64
)
hybrid_sign_pk_i = derive_hybrid_sign_pubkey(hybrid_sign_kdf)
ephemeral_sign_pks.append(hybrid_sign_pk_i)
classical_spend_kdf = HKDF_Expand(
ss_i, b"shekyl-v31-classical-spend", 64
)
y_i = derive_classical_scalar(classical_spend_kdf)
Y_i = y_i * G # 32-byte compressed Ed25519 point
spend_auth_pubkeys.append(Y_i)
# View tag hint (1 byte) for fast scanner identification
view_tag_hints.append(
HKDF_Expand(ss_i, b"shekyl-v31-view-tag", 1)[0]
)
# Determine assigned prover using SENDER-COMPUTABLE rule (§11.1)
tx_secret_key_hash = cn_fast_hash(sender_tx_secret_key)
assigned_prover = rotating_prover_index(
recipient_address.group_id,
output_index_in_tx,
tx_secret_key_hash,
reference_block_hash,
recipient_address.n_total
)
# Output public key binds to the assigned prover's spend-auth pubkey
O = spend_auth_pubkeys[assigned_prover]
# Commitment uses the assigned prover's commitment mask
commitment_mask = derive_commitment_mask(
ss_by_index[assigned_prover], output_index_in_tx
)
commitment = Commit(amount, commitment_mask)
# Canonical leaf container includes all three components
leaf_container = MultisigKeyContainer {
version: 0x01,
n_total: recipient_address.n_total,
m_required: recipient_address.m_required,
hybrid_sign_pubkeys: ephemeral_sign_pks,
spend_auth_pubkeys: spend_auth_pubkeys,
}
# 4th leaf scalar covers the full container
h_pqc = multisig_pqc_leaf_hash(leaf_container)
return OutputConstruction {
output_pubkey: O,
commitment,
kem_ciphertexts,
view_tag_hints,
spend_auth_pubkeys, # published separately in tx_extra
h_pqc,
leaf_container,
assigned_prover_index: assigned_prover,
}
7.2 KDF domain separation (CRITICAL)
Per-output material derives from each participant's KEM shared secret
ss_i via three strictly domain-separated HKDF expansions:
| Purpose | Label | Output length |
|---|---|---|
| Hybrid signing keypair | "shekyl-v31-hybrid-sign" | 64 B |
| Classical spend-auth keypair | "shekyl-v31-classical-spend" | 64 B |
| View tag hint | "shekyl-v31-view-tag" | 1 B |
Future spend-auth versions use distinct labels, preventing cross-version key reuse:
| spend_auth_version | KDF label |
|---|---|
| 0x01 (V3.1 classical) | "shekyl-v31-classical-spend" |
| 0x02 (reserved, V4 PQC) | "shekyl-v4-pqc-spend" |
Domain separation is a HARD requirement. Any implementation that uses identical material for two purposes is non-conforming.
7.3 Deterministic KEM seed
The kem_seed derives from the transaction's secret key:
kem_seed = HKDF_Expand(
tx_secret_key,
b"shekyl-v31-kem-seed" || u64_le(output_index_in_tx),
32
)
tx_secret_key MUST be freshly generated per transaction. Wallets MUST
assert freshness and refuse to construct a transaction if tx_secret_key
is reused.
7.4 tx_extra additions
Per multisig-recipient output, the tx_extra includes:
| Tag | Name | Payload |
|---|---|---|
| 0x06 | TX_EXTRA_TAG_PQC_KEM_CIPHERTEXT | N × 1120 B |
| 0x07 | TX_EXTRA_TAG_PQC_LEAF_HASHES | 32 B (hash of full container) |
| 0x09 | TX_EXTRA_TAG_PQC_VIEW_TAG_HINTS | N × 1 B |
| 0x0A | TX_EXTRA_TAG_PQC_SPEND_AUTH_PUBKEYS | 1 + N × 32 B (version byte + N Y_i) |
Tag 0x0A is new in V3.1 and is REQUIRED on every multisig-recipient
output. Its first byte is the spend_auth_version (0x01 for V3.1
classical); subsequent bytes are the N spend-auth pubkeys in canonical
participant order.
TX_EXTRA_TAG_PQC_VIEW_TAG_HINTS (0x09) MUST be absent for single-sig
outputs. Wallets MUST reject any single-sig-shaped output that contains
this tag.
Reserved tags (do not use in V3.1):
| Tag | Reserved for |
|---|---|
| 0x08 | TX_EXTRA_TAG_MULTISIG_MIGRATION (V3.2 group rotation / migration tx) |
7.5 Spend-time consensus binding
The spend-time binding works through the existing FCMP++ leaf hash check
combined with the pqc_auth size check, both already in V3 consensus.
With the Solution C receiving model in place, the binding chain is:
- Output committed at receive time with
O = spend_auth_pubkeys[assigned] - Leaf scalar
h_pqc = H(MultisigKeyContainer)binds the full container including spend_auth_pubkeys - At spend time, the spender presents
pqc_auths[i].hybrid_public_keycontaining the canonicalMultisigKeyContainer(byte-identical to the one committed) blockchain.cpp:3720computesshekyl_fcmp_pqc_leaf_hash(blob)and the FCMP++ proof confirms this leaf is in the curve tree- The FCMP++ proof verifies the key image derives from
O - Honest signers (pre-signing, §2.7 I5) verify
O == spend_auth_pubkeys[rotating_prover_index(...)]— confirming the proof was constructed by the assigned prover
Any blob other than the canonical container fails leaf hash matching;
the proof rejects. Size check at tx_pqc_verify.cpp:206-211 rejects
scheme_id=1 against multisig-shaped blobs.
Defense-in-depth wiring fixes (no consensus rule change, but explicit enforcement of rules already implicitly guaranteed):
blockchain.cpp:3768SHOULD passexpected_scheme_idderived from the output'stx_extra_pqc_ownershiptoverify_transaction_pqc_authrust/shekyl-ffi/src/lib.rs:343SHOULD passexpected_group_idtoverify_multisigwhenscheme_id == 2
7.6 Wallet-side filtering and griefing resource limits
Outputs that pass structural tag parsing but fail KEM decap, view-tag hint check, or receive-time validation (§8.3) are griefing artifacts. Wallets MUST:
- Attempt KEM decap on candidate outputs
- On decap failure or validation failure, mark the output as garbage and never surface it in balance, history, or any user-visible view
- Apply per-sender griefing scores:
- Maintain a rolling 24-hour window of failed-validation counts per sender (keyed by tx author hash, not output)
- After 10 failures from the same sender in 24h, temporarily mark that sender's outputs as low-priority (deprioritized scan) for 7 days with a user-visible banner "possible griefing detected"
- After 100 failures in 24h, skip that sender's outputs entirely for 7 days
- Apply hard caps on garbage state:
- Maximum 10,000 garbage entries retained per wallet at any time
- When cap reached, drop oldest entries first
- Optionally expose griefing-attack indicators via daemon RPC
(
get_griefing_stats) for network-wide monitoring - Periodically purge garbage entries (default every 10,000 blocks; configurable)
This bounds attack to scanner CPU cost, with no user-visible impact and no unbounded state growth.
7.7 Wallet send-side requirements
When sending to a multisig recipient, the sender's wallet MUST:
- Display the address fingerprint (§6.3) and require user confirmation
- Verify that the parsed address has a valid Bech32m checksum
- Verify that all N hybrid pubkey blobs deserialize correctly
- Reject addresses with
n_total > 7orm_required > n_total - Reject addresses with unknown
spend_auth_version(wallets only construct outputs for versions they fully implement) - Compute and surface the per-output size cost
- Determine
assigned_prover_indexvia the sender-computable rule - Set
O = spend_auth_pubkeys[assigned_prover_index]correctly; any wallet bug here would produce unspendable outputs, caught by recipient-side receive-time validation
8. Wallet Scanning and Receive-Time Validation
8.1 Scan-time filtering
Each participant's wallet processes each candidate output:
def scan_output(output, my_participant_index, my_kem_secret):
# Fast tag check
hints = parse_tx_extra_tag(output.tx_extra, 0x09)
if hints is None:
return None # not multisig-shaped
spend_auth_tag = parse_tx_extra_tag(output.tx_extra, 0x0A)
if spend_auth_tag is None:
return None # malformed multisig output
spend_auth_version = spend_auth_tag[0]
if spend_auth_version not in KNOWN_VERSIONS:
return None # unknown scheme — do not scan (forward-compat)
if my_participant_index >= len(hints):
return None # cardinality mismatch
# KEM decap my slot
my_ct = parse_kem_ciphertext_slot(output, my_participant_index)
ss = HybridKEM.decap(my_kem_secret, my_ct)
if ss is None:
register_griefing_failure(output.sender_id)
return None # decap failed
# Fast hint check
expected_hint = HKDF_Expand(ss, b"shekyl-v31-view-tag", 1)[0]
if expected_hint != hints[my_participant_index]:
register_griefing_failure(output.sender_id)
return None # hint mismatch
# Full receive-time validation (§8.3)
if not validate_multisig_output_at_receive(
output, my_participant_index, ss, spend_auth_tag
):
register_griefing_failure(output.sender_id)
return None # structural validation failed
# All checks pass; output is ours
return MatchedOutput { ss, ... }
8.2 Unknown spend_auth_version handling (forward compatibility)
When a wallet encounters an output with spend_auth_version it does not
understand:
- It MUST NOT attempt decap
- It MUST NOT track the output in any form
- It MUST NOT emit an error
- It MUST silently skip the output
This preserves forward compatibility: a V3.1 wallet encountering a V4 output ignores it cleanly. The output remains scannable by upgraded wallets that understand the newer version.
8.3 Receive-time validation (CRITICAL)
Every scanned-and-apparently-ours output MUST be validated for correct prover-assignment binding before being added to the wallet's balance. This is honest-signer invariant I7 from §2.7.
def validate_multisig_output_at_receive(
output, my_participant_index, ss_mine, spend_auth_tag
):
# Derive my own spend-auth pubkey
classical_kdf = HKDF_Expand(ss_mine, b"shekyl-v31-classical-spend", 64)
y_mine = derive_classical_scalar(classical_kdf)
Y_mine_computed = y_mine * G
# Parse the published N spend-auth pubkeys
n_total = (len(spend_auth_tag) - 1) // 32
spend_auth_pubkeys = [
spend_auth_tag[1 + i*32 : 1 + (i+1)*32]
for i in range(n_total)
]
# Check 1: my own published Y matches my derivation
if spend_auth_pubkeys[my_participant_index] != Y_mine_computed:
return False # sender used wrong material for my slot
# Check 2: output pubkey O matches the assigned prover's published Y
tx_secret_key_hash = extract_from_output(output) # via tx_public_key + cn_fast_hash; see §11.1
assigned_prover = rotating_prover_index(
group.group_id,
output.index_in_tx,
tx_secret_key_hash,
output.reference_block_hash,
n_total
)
Y_assigned = spend_auth_pubkeys[assigned_prover]
if output.output_pubkey != Y_assigned:
return False # O doesn't bind to assigned prover
# Validation passes: output is structurally correct for future spend
return True
Rationale: this check catches three distinct failure modes at receive time, before funds enter user-visible balance:
- Malicious sender grief (time-bomb outputs): sender publishes an
output that decaps successfully but binds
Oto the wrong participant. At spend time, honest signers would detect and refuse to sign (I5), leaving funds locked. Receive-time validation rejects before acceptance. - Sender implementation bugs: a buggy wallet produces outputs with incorrect Y_prover assignment. Same outcome as malicious; detected here.
- Spec violations during transition periods: older wallet mis-implements the new derivation. Detected.
Outputs failing receive-time validation are treated as griefing artifacts per §7.6.
8.4 Persistence requirements
For each validated multisig output, the wallet MUST persist:
PersistedMultisigOutput {
output_id: [u8; 32] # local identifier
global_output_index: u64
my_participant_index: u8
my_shared_secret: [u8; 32] # ss_mine from decap
spend_auth_version: u8
spend_auth_pubkeys: [[u8; 32]; n_total] # ALL N pubkeys from tx_extra
output_pubkey: [u8; 32] # O
commitment: [u8; 32]
amount: u64
reference_block_hash: [u8; 32]
output_index_in_tx: u64
tx_secret_key_hash: [u8; 32] # extracted at scan time
assigned_prover_index: u8 # computed once at scan time, cached
received_at_height: u64
eligible_height: u64
}
Persistence of all N spend-auth pubkeys is required so that prover-assignment verification works at spend time without re-reading the transaction from chain (which may be pruned on participant's node).
Seed restore: When a wallet is restored from seed, it rescans the
chain. For each matched output, it reconstructs PersistedMultisigOutput
deterministically from chain data plus the restored seed (which gives
the KEM secret for decap). All fields are reproducible.
8.5 Cost
Per output (fast path): 1 KEM decap + 1 HKDF hint check + 1 structural validation. Each participant processes only their own ciphertext slot. Per-participant scanning cost is not multiplied by N.
False-positive rate from view-tag hint: ~1/256. Each false positive triggers full validation (which fails) and griefing-score increment.
9. Spend Intent
9.1 Schema
SpendIntent {
// Versioning
version: u8 (= 1)
intent_id: [u8; 32] // random per intent
// Group binding
group_id: [u8; 32]
// Proposer
proposer_index: u8
proposer_sig: HybridSignature // over all other fields
// Temporal binding
created_at: u64
expires_at: u64
tx_counter: u64
reference_block_height: u64
reference_block_hash: [u8; 32]
// Content
recipients: [
{ address: Bech32mAddress, amount: u64 }
] // sorted
fee: u64
input_global_indices: [u64] // sorted ascending
// Determinism anchor
kem_randomness_seed: [u8; 32] // 32 fresh random bytes
// Chain state fingerprint
chain_state_fingerprint: [u8; 32] // see §9.3
}
9.2 Invariants (verified before any signer signs; honest-signer invariant I1)
version == 1group_idmatches the verifier's groupproposer_index < n_totalproposer_sigverifies againsthybrid_signing_pubkeys[proposer_index]created_at ≤ now ≤ expires_atexpires_at - created_at ≤ 86400(24-hour validity max)tx_counterequals the group's currently-expected counterreference_block_height ≥ FCMP_REFERENCE_BLOCK_MIN_AGEblocks behind tip and≤ FCMP_REFERENCE_BLOCK_MAX_AGEreference_block_hashmatches the chain's block atreference_block_heightper the verifier's local view- All
input_global_indicesare owned by the group, unspent, and eligible at the reference height, with each input'sassigned_prover_indexlocally known - Recipients are sorted; no duplicate (address, amount) tuples
sum(recipient.amount) + fee == sum(input.amount)per local viewkem_randomness_seedis unique within the group's history ofseen_intents(replay/linkability prevention)chain_state_fingerprintmatches the verifier's local fingerprint (see §9.3); mismatch → do not sign; trigger sync
9.3 Chain state fingerprint (honest-signer invariant I2)
Members must agree on chain state before signing. Each intent commits to:
chain_state_fingerprint = cn_fast_hash(
reference_block_hash ||
sorted_concat(input_global_indices) ||
sorted_concat(input_eligible_heights) ||
sorted_concat(input_amounts) ||
sorted_concat(input_assigned_prover_indices)
)
The proposer computes this. Each verifier independently recomputes from their local view. Mismatch indicates state divergence or manipulation: do not sign; trigger sync.
Including input_assigned_prover_indices ensures all members agree on
which prover is responsible for each input — any disagreement on this is
itself a state divergence that must be resolved before signing.
9.4 Intent hash
intent_hash = cn_fast_hash(canonical_serialize(SpendIntent))
intent_hash is the durable identifier. All subsequent messages
reference it.
10. Canonical Construction
10.1 Algorithm
Given verified SpendIntent, every member runs:
- Pre-flight verification (§9.2 invariants). On any failure, publish
Veto; do not proceed. - Output derivation (§7.1). For each recipient (including change
output, if any), derive output public key, KEM ciphertexts, leaf hash,
spend-auth pubkeys, and set
Oto the assigned prover's pubkey. - Transaction prefix construction. Inputs reference key images
computed from each input's prover-assigned
y(§11.1); outputs are derived per step 2;tx_extraincludes KEM ciphertexts, leaf hashes, view tag hints, spend-auth pubkeys. - RCT base. Type =
RCTTypeFcmpPlusPlusPqc (=7); ecdh info, commitment masks, pseudo outputs all deterministic from intent. - Compute
signing_payload(§10.4).
10.2 Bulletproof+ range proofs (deterministic from intent)
Bulletproof+ range proofs use fresh-looking randomness deterministically derived from the intent. This lets every participant independently reconstruct byte-identical BP+ bytes while keeping the randomness unpredictable to an external observer.
bp_plus_randomness = HKDF_Expand(
intent.kem_randomness_seed,
b"shekyl-v31-bp-plus-randomness" || u64_le(output_index_in_tx),
64
)
Properties:
- Per-output unique (indexed by output)
- Per-intent unique (tied to fresh
kem_randomness_seed) - Reproducible by all group members (deterministic from intent data they all hold)
- Unpredictable to external observers (derived from a group-only secret chain seed)
Signer verification (honest-signer invariant I4): Each signer independently constructs the BP+ proof from this derivation and verifies that the bytes match what the prover published. If they differ: prover equivocated or produced incorrect proof; publish Veto and abort.
This approach was chosen over "prover produces fresh randomness, signers
verify" because it preserves full deterministic construction (every
participant produces byte-identical tx bytes). The cryptographic
question ("is HKDF-derived BP+ randomness sound?") is isolated to one
well-defined concern that cryptographer review explicitly covers
(see PQC_MULTISIG_V3_1_ANALYSIS.md §7 review target).
10.3 Change output handling
When the group sends to itself (a change output):
- The change recipient is the group's own multisig address
- The Option C + Solution C construction (§7.1) applies identically
- N KEM encapsulations to the group's own KEM pubkeys
- N fresh per-output ephemeral signing keypairs derived
- N fresh per-output ephemeral classical spend-auth keypairs derived
- All N spend-auth pubkeys published in
tx_extratag 0x0A Oset to the change output's assigned prover (could be a different participant than any input's assigned prover)- Leaf hash committed
There is no single-sig change escape hatch. Change outputs are full
multisig-bound outputs requiring scheme_id=2 authorization to spend,
identical to any other multisig output.
10.4 Canonical signing payload
signing_payload = cn_fast_hash(
serialize(TransactionPrefixV3) ||
serialize(RctSigBase) ||
cn_fast_hash(serialize(RctSigPrunable_skeleton)) ||
serialize(PqcAuthHeader) ||
H(hybrid_pubkeys[0]) || ... || H(hybrid_pubkeys[n_total-1])
)
Where RctSigPrunable_skeleton excludes the FCMP++ proof (comes from
the prover asynchronously). Its hash is included separately in the
signature share commitment (§12.2.1).
10.5 Tiebreaker for conflicting intents
When two proposers publish conflicting intents at the same tx_counter:
winner = intent for which the prover (per §11.1) emits a signed
ProverReceipt first, where ProverReceipt is published only
after full invariant verification
ProverReceipt mechanics (strengthened from v1.0 in response to R3):
ProverReceipt {
prover_index: u8
intent_hash: [u8; 32]
received_at: u64
local_counter: u64 // monotonic, prover-local, increments per receipt
sig: HybridSignature
}
Requirements:
- Prover emits
ProverReceiptonly after completing full §9.2 invariant verification on the intent. A malformed or invariant-failing intent never earns a receipt. - Prover MUST publish the receipt to all subscribed relays simultaneously (multi-relay mandatory per §12.4)
local_counteris prover-local, monotonic, increments once per receipt. Two receipts from the same prover with non-monotonic counters is equivocation (§12.2.4)- Signers observing conflicting intents wait conflict window (default: 30 seconds) after the first intent before acting, to allow the prover's receipt to propagate across relays
- Signers accept the intent for which the ProverReceipt shows the
lowest
local_counter(earliest-observed by prover) - Members who already signed the losing intent publish a
Vetoto reset
Why the monotonic counter matters: an attacker controlling network
delivery to the prover can attempt to equivocate (claim "received A first"
to some signers, "received B first" to others). The monotonic
local_counter in the receipt makes equivocation detectable: two
receipts with the same counter or out-of-order counters = equivocation
= prover marked untrusted via EquivocationProof (§12.2.4).
Why not hash-based tiebreaking: grindable by attacker varying intent content fields. Prover-receipt shifts the tiebreaker to prover's observation order, which requires network-level asymmetry to exploit rather than content grinding.
11. Spending: Prover and Signing
11.1 Rotating prover assignment (sender-computable)
For each output being spent, the prover is determined deterministically from data the sender knew at construction time:
rotating_prover_index(group_id, output_index_in_tx, tx_secret_key_hash,
reference_block_hash, n_total) -> u8
prover_index = first_byte(
cn_fast_hash(
group_id ||
u64_le(output_index_in_tx) ||
tx_secret_key_hash ||
reference_block_hash
)
) mod n_total
Where:
group_id: from recipient address (sender knows)output_index_in_tx: position of this output within its transaction (sender knows; not consensus-assigned)tx_secret_key_hash = cn_fast_hash(sender_tx_secret_key): sender knows; derivable from tx_public_key only by the senderreference_block_hash: from the spend intent or output's associated tx data (sender knows at construction)n_total: from recipient address
Properties:
- Sender-computable: every input is known to the sender before broadcasting
- Deterministic: every group member, given the same output, computes
the same
prover_index - Unpredictable to observers:
tx_secret_key_hashis not derivable from on-chain data alone (tx_public_key is related but the hash adds a layer; a motivated observer can attempt to correlate but cannot pre-compute) - Roughly uniform: cryptographic hash mod N is uniform over any reasonable input distribution
Grinding resistance: a sender can iterate tx_secret_key values to
bias which participant is assigned prover for specific outputs. This
bounds the sender's ability to target (e.g., always assign to a known-
offline participant). The grinding cost is proportional to the target
bias: to bias all N outputs to one prover requires ~N^k work for k
outputs. For most realistic adversaries, the work cost exceeds the
benefit. Cryptographer review target: formalize this bound
(see PQC_MULTISIG_V3_1_ANALYSIS.md §7).
Recipient-side verification at receive time confirms the sender's computed assignment matches the one the group independently derives. Mismatch rejects the output.
11.2 Prover responsibilities per output
The prover for an input:
- Computes the FCMP++ proof using their per-output classical spend-auth
secret
y_prover_i(derived via the"shekyl-v31-classical-spend"KDF label from their shared secret) - Publishes a
ProverOutputmessage (§12.2) containing the proof
The prover holds ONLY the per-output classical spend-auth keys for outputs they were assigned. Compromise of one prover's host exposes their per-output keys for those outputs only.
11.3 Signer verification of prover assignment (honest-signer invariant I5)
Before producing a signature, honest signers MUST verify:
def verify_prover_assignment_and_proof(intent, input, prover_output):
# Step 1: Recompute assigned prover from persisted output metadata
persisted = get_persisted_output(input.output_id)
assigned_prover = persisted.assigned_prover_index # cached at receive
# Step 2: Read Y_assigned from persisted state
Y_assigned = persisted.spend_auth_pubkeys[assigned_prover]
# Step 3: Verify output public key matches assigned prover
if persisted.output_pubkey != Y_assigned:
# Should never happen if receive-time validation passed
raise PersistedStateInconsistent
# Step 4: Verify the FCMP++ proof binds to the assigned pubkey
if not fcmp_verify(
prover_output.fcmp_proof,
input.key_image,
persisted.output_pubkey, # proof must bind to Y_assigned
intent.reference_block_hash
):
return False
# Step 5: Verify BP+ proofs against independently-computed bytes (I4)
if not verify_bp_plus_deterministic(intent, output_commitments,
prover_output.bp_plus):
return False
# Step 6: Verify the key image is consistent with Y_assigned
# (FCMP++ verify already does this internally, but explicit check
# guards against future implementation drift)
if not key_image_binds_to_pubkey(input.key_image, Y_assigned):
return False
return True
This check uses only publicly-verifiable data. No participant needs
to know another participant's shared secret. spend_auth_pubkeys is
persisted locally at receive time and is the full N-pubkey list.
Enforcement level (§2.7): this check is unbypassable in supported wallets. It runs in the core signing path; any return-false or exception-raise causes:
- Signing aborted
InvariantViolationmessage published (type 0x09)- Intent moved to REJECTED state
11.4 Signing protocol (non-interactive scheme_id=2)
Each signer in the M-of-N selected subset:
- Receives intent + ProverOutput
- Independently reconstructs the canonical transaction (§10)
- Verifies the FCMP++ proof against signing_payload (I3)
- Verifies BP+ proofs match deterministic derivation (I4)
- Verifies prover assignment (I5, §11.3)
- Computes the final tx_hash (including the prover's proof)
- Produces hybrid (Ed25519 + ML-DSA-65) signature over signing_payload
- Publishes
SignatureShare(§12.2.1) including the tx_hash and proof commitments
11.5 Assembly (honest-signer invariant I6)
Any member with M valid SignatureShare messages:
- Verifies all M tx_hash commitments agree
- Verifies all M FCMP++ proof commitments agree
- Verifies all M BP+ proof commitments agree
- Any disagreement → publish EquivocationProof (§12.2.4) and abort
- Otherwise, constructs
pqc_authblob with scheme_id=2 layout, attaches to transaction, submits to daemon
Multiple members may attempt assembly simultaneously. Network picks whichever broadcast succeeds first.
11.6 The 1/N permanent loss limitation
A participant who permanently loses their keys cannot serve as prover for the outputs they were assigned. Approximately 1/N of group outputs become permanently unspendable.
| N | Loss per missing key |
|---|---|
| 3 | ~33% |
| 5 | ~20% |
| 7 | ~14% |
This is an accepted V3.1 limitation. Users MUST complete §5.4 acknowledgment at group setup. Wallets MUST surface, on the multisig dashboard, the estimated percentage of value held by each participant's prover responsibility.
V4 FROST SAL eliminates this entirely. V3.2 may add a key escrow protocol as mitigation.
11.7 Rate limiting (by signing pubkey, not index)
To prevent intent-spam DoS:
- Each proposer's hybrid signing public key (not proposer_index) may have at most 1 active intent per group at a time (active = state in {PROPOSED, VERIFIED, PROVER_READY, SIGNED})
- Rate limit is group-wide configurable at setup (default: 1 active intent per signing pubkey; maximum 1 new proposal per 5 minutes per signing pubkey)
- Keying off signing pubkey prevents a malicious member with multiple proposer_index slots from multi-indexing their way around the limit
- New proposals from the same signing pubkey violating the limit are rejected with rate-limit veto
This bounds verification work to ≤ N concurrent intents.
12. Messages and Transport
12.1 Common envelope
MultisigEnvelope {
version: u8 (= 1)
group_id: [u8; 32]
message_type: u8 // ENCRYPTED in payload
intent_hash: [u8; 32]
sender_index: u8
sender_sig: HybridSignature // over all above + payload
payload: EncryptedBlob
}
The envelope's message_type is encrypted in the payload (§12.3) to
prevent role-pattern leakage. Cleartext envelope fields: version,
group_id, sender_index, intent_hash, sender_sig, encrypted
payload.
12.2 Message types (encrypted)
| Type | Name | Purpose |
|---|---|---|
| 0x01 | SpendIntent | Proposer publishes |
| 0x02 | ProverOutput | FCMP++ proof (BP+ is now in main tx per §10.2) |
| 0x03 | SignatureShare | Signer's hybrid signature + commitments |
| 0x04 | Veto | Refusal or abort |
| 0x05 | ProverReceipt | Prover's tiebreaker acknowledgment |
| 0x06 | Heartbeat | Liveness + censorship detection |
| 0x07 | CounterProof | State recovery |
| 0x08 | GroupStateSummary | Periodic synchronization |
| 0x09 | InvariantViolation | Signed notice that an honest-signer invariant failed |
| 0x0A | RotationIntent (RESERVED) | V3.2 full rotation protocol; reserved in V3.1 |
| 0x0B | EquivocationProof | Prover equivocation evidence |
12.2.1 SignatureShare structure
SignatureShare {
signer_index: u8
hybrid_sig: HybridSignature
tx_hash_commitment: [u8; 32]
fcmp_proof_commitment: [u8; 32]
bp_plus_proof_commitment: [u8; 32]
}
12.2.4 Prover equivocation detection
If a malicious prover sends different ProverOutput messages to
different signer subsets, signature shares will disagree on
fcmp_proof_commitment. Members publish:
EquivocationProof {
prover_index: u8
intent_hash: [u8; 32]
proof_a: ProverOutput // including prover_sig
proof_b: ProverOutput // different, including prover_sig
}
Also detected: two ProverReceipt messages from the same prover for the
same intent with non-monotonic or duplicate local_counter values.
12.2.6 InvariantViolation structure
InvariantViolation {
reporter_index: u8
intent_hash: [u8; 32]
invariant_id: u8 // which of I1-I7 from §2.7 was violated
evidence: bytes // intent or proof bytes demonstrating the violation
reporter_sig: HybridSignature
}
Publishing an InvariantViolation is how honest signers signal that they refused to sign a specific intent. Other members treat a published InvariantViolation as a strong signal to also refuse, and to investigate whether their own state disagrees.
12.3 Encryption
Per-message symmetric key derivation:
message_key = HKDF_Expand(
group_shared_secret,
intent_hash || u8(message_type) || u8(sender_index),
32
)
group_shared_secret is the DKG-derived 32-byte value from §5.2.
AEAD: ChaCha20-Poly1305 with 96-bit nonce:
nonce = HKDF_Expand(
group_shared_secret,
b"nonce" || u8(sender_index) || u64_le(message_counter),
12
)
12.4 Multi-relay with operator uniqueness (mandatory)
Members MUST publish each message to at least 3 independent relays operated by disjoint operators. The relay list is part of group state.
Operator uniqueness enforcement:
- Wallets MUST consume a signed relay directory (updated via GitHub releases or published on-chain as a special metadata transaction). The directory maps relay URLs to operator identifiers.
- At group setup, each participant MUST select relays from at least 3 distinct operators per the directory.
- Each
Heartbeatmessage (§13.3) includes the sender's observed relay operator IDs — the operator IDs corresponding to relays where that member has actually received messages in the last interval. - Members compare observed operator IDs from heartbeats; if all heartbeats come from relays operated by the same entity (or a small subset), they flag this as potential centralization and warn users.
This closes the attack where a single operator running three relays under different names could satisfy "3 relays" without providing actual censorship resistance.
12.5 Cleartext envelope minimization
The encrypted message_type prevents passive observers from inferring
roles (only-prover-sends-0x02, only-signers-send-0x03). Observers see
encrypted blobs at varying sizes addressed to a stable group_id.
Future V3.2 traffic padding + batched delivery can strengthen this; not in V3.1 scope.
12.6 Transport bindings
Nostr relay binding: Each message posted as Nostr kind-30000
replaceable event; d tag includes group_id hash + unique message
identifier. Nostr signature is for relay acceptance only.
Direct P2P binding: Members connect via mTLS with hybrid certificates when topology permits. Messages still subject to envelope /encryption requirements.
File binding (air-gap) with opaque naming:
Rather than the previous draft's metadata-leaking filename convention, file transport now uses:
- Random opaque filenames (e.g.,
shekyl-ms-<random64hex>.bin) - Encrypted manifest inside the file metadata (not in filename)
that contains the
group_id,intent_hash,message_type,sender_indexfor wallet ingestion - Display-only filenames in the UI (e.g., "Intent 0x1a2b... message from member 3") derived from the encrypted manifest once decrypted; never written to disk
This preserves air-gap compatibility while preventing filesystem metadata leakage when files end up on shared media, USB drives, cloud backups, or forensic images.
13. State Machine and Counter Recovery
13.1 Per-intent state
PROPOSED → intent received, not yet verified
VERIFIED → §9.2 invariants pass
PROVER_READY → ProverOutput received; FCMP++ and BP+ verification pass
SIGNED → this member produced and published SignatureShare
ASSEMBLED → M signatures observed
BROADCAST → tx confirmed in mempool / on-chain
REJECTED → veto/invariant-violation threshold reached or chain-rejected
TIMED_OUT → expires_at reached without BROADCAST
13.2 tx_counter advancement
tx_counter advances ONLY upon observed chain state, not local optimism.
Specifically: tx_counter increments to k+1 when a member observes the
broadcast tx confirmed in their local chain at height ≥ N confirmations
(default N=3; configurable).
13.3 Heartbeat protocol
Members publish Heartbeat every HEARTBEAT_INTERVAL (default 5 min)
to all subscribed relays:
Heartbeat {
sender_index: u8
timestamp: u64
last_seen_intent: [u8; 32]
observed_relay_ops: [RelayOperatorId] // which operators this member sees
local_tx_counter: u64
sig: HybridSignature
}
Members compare heartbeats to detect:
- Missing heartbeats from a specific member (offline or censored)
- Disagreement on
last_seen_intent(relay censorship) - Collapse of observed relay operator diversity (censorship + operator collusion)
- tx_counter divergence
- Time skew
Action on anomaly: retry across all subscribed relays, escalate to user, do not advance state optimistically.
13.4 CounterProof recovery (strengthened formalization)
When a member is at stale tx_counter, recovery uses cryptographic
chain proof with explicit advancement-lineage verification:
CounterProof {
sender_index: u8
advancing_to: u64
tx_hash: [u8; 32]
block_height: u64
block_hash: [u8; 32]
tx_position: u16
consumed_inputs: [[u8; 32]] // key images of consumed inputs
resulting_outputs: [[u8; 32]] // output pubkeys produced by the tx
intent_hash: [u8; 32] // the intent this tx broadcast
sender_sig: HybridSignature
}
Verification rules (strengthened from v1.0):
A stale member receiving a CounterProof MUST verify, in order:
block_hashmatches their local chain atblock_height(if local chain lacks this block, wait for sync; do not reject)tx_hashappears attx_positionin that blocktx.pqc_auths[i].scheme_id == 2for all inputs (multisig spend)multisig_pqc_leaf_hash(tx.pqc_auths[i].hybrid_public_key)matches the leaf hash of an output tracked in local state with matchinggroup_id- The
consumed_inputslisted in CounterProof match the tx's actual input key images exactly (no loose matching) - All
consumed_inputsare in local state as tracked unspent outputs owned by the group intent_hashreferences an intent the member has seen (or, if unseen, a note is logged: member was absent during proposal)sender_sigverifies
Advancement rule: only after all checks pass, the member:
- Marks all
consumed_inputsas spent in local state - Adds all
resulting_outputsto scanning (if they belong to the group) - Advances
tx_countertoadvancing_to
If any check fails:
- If the failure is "I don't have the block yet": wait for sync; do not reject; do not advance
- If the failure is "I don't recognize these inputs as my tracked outputs": trigger full wallet rescan from reference height; do not advance based on this CounterProof
- If the failure is structural (scheme_id wrong, leaf hash doesn't match): CounterProof is invalid; do not advance; publish Veto
This formalization prevents:
- Attackers forging CounterProofs for arbitrary on-chain transactions (must reference the group's actual tracked inputs)
- Loose matching leading to false advancement (exact input/output match required)
- Advancement without state consistency (rescan forced if local state is out of sync)
13.5 Disagreement resolution
Conflicting intents same counter → §10.5 ProverReceipt with monotonic counter
Proposer disappears → expires_at → TIMED_OUT
Prover disappears for an output → intent times out; rotating prover means different outputs have different provers; 1/N permanent-loss per missing key
Chain reorg of reference_block → intents referencing orphaned blocks transition to TIMED_OUT; re-propose with new reference
Prover equivocation → §12.2.4 detection and EquivocationProof
Honest-signer invariant violation → §2.7 InvariantViolation published; intent REJECTED
14. Security Properties
14.1 Authorization
| Property | Mechanism |
|---|---|
| No unilateral spend | scheme_id=2 consensus requires M PQC signatures |
| No unilateral redirect | Deterministic construction; signers reconstruct and verify |
| No wrong-prover spend | §11.3 honest-signer prover assignment verification (I5) |
| No sender griefing via malformed assignment | §8.3 receive-time validation (I7) |
| No invariant bypass | §2.7 mechanical enforcement in signing path |
14.2 Privacy
| Property | Mechanism |
|---|---|
| Per-output forward privacy | Option C N-fold KEM fan-out + per-output ephemeral keys |
| Spend-to-spend unlinkability | Different ephemeral N-key blobs per spend |
| Group identity privacy from passive observer | group_id not on-chain; encrypted transport |
| Role-pattern privacy from relay observers | Encrypted message_type in envelope |
| Filesystem metadata privacy | Opaque filenames + encrypted manifest (§12.6) |
14.3 Liveness
| Property | Status |
|---|---|
| Any M honest signers can advance | Yes (assuming assigned prover is among them) |
| Proposer disappearance recovery | Yes (timeout + re-propose) |
| Signer disappearance recovery | Yes if M others remain |
| Prover disappearance per-output | Limited; 1/N outputs lock per missing prover (V4 fixes) |
| Network partition recovery | Yes via formalized CounterProof |
| Relay censorship resistance | Multi-relay + operator uniqueness + heartbeat |
| Scanner resource bounds | Hard caps + per-sender griefing scores (§7.6) |
14.4 Integrity
| Property | Mechanism |
|---|---|
| Tx hash integrity through assembly | tx_hash_commitment in SignatureShare (I6) |
| Prover proof integrity | fcmp_proof_commitment + bp_plus_proof_commitment |
| Prover non-equivocation | EquivocationProof detection (§12.2.4) |
| Counter integrity | Formalized CounterProof advancement lineage (§13.4) |
| Replay resistance | intent_id, kem_randomness_seed freshness, expires_at, reference_block_hash, tx_counter |
| Invariant enforcement | §2.7 mechanical, unbypassable in signing path |
15. Forward Compatibility
15.1 Reserved namespace
| Item | Purpose |
|---|---|
group_version = 0x01 | V3.1; higher values for future rotated groups |
spend_auth_version = 0x01 | V3.1 classical ephemeral; 0x02+ for future schemes |
HRP shekyl1n... | Rotated-key multisig (V3.2+) |
TX_EXTRA_TAG_MULTISIG_MIGRATION (0x08) | V3.2 migration transactions |
Message type 0x0A (RotationIntent) | V3.2 full rotation protocol |
15.2 V3.2 full rotation protocol (hooks reserved, protocol deferred)
V3.1 reserves the message type and namespace for rotation but does NOT implement the rotation protocol itself. The rotation protocol will be specified and shipped in V3.2 as a focused release.
Rationale for deferral: rotation is a complex protocol with multiple rotation modes (individual, group, spend-auth upgrade), migration transaction semantics, race conditions during the rotation window, and privacy considerations on migration txs. These flaws will surface only through actual use. The V3.2 timeline is explicitly chosen so that design flaws surface when real users depend on the feature, not in a rushed pre-launch implementation. This is not a scope-protection argument; it is a design-maturity argument.
V3.1 provides the necessary hooks:
- Versioned
spend_auth_versionfield - Reserved message type 0x0A
- Reserved
tx_extratag 0x08 - Forward-compatible derivation function structure
V3.2 will add:
- Full
RotationIntentprotocol - Individual participant key rotation
- Full group rotation (new group_id)
- Migration transactions consuming old outputs, producing new
- Key escrow protocol as 1/N loss mitigation
15.3 V3.3 candidate features
- Chain-anchored group registry: new tx type; reduces address size
- Traffic padding for transport privacy: fixed-interval heartbeats, dummy messages
15.4 V4 path (FROST SAL + pure-PQC spend-auth)
When lattice threshold signatures are standardized:
- FROST SAL threshold-shares classical (or PQC) spend secrets
spend_auth_version = 0x02deployed alongside V4- Groups can opt to migrate via V3.2 rotation protocol
- V3.1 outputs remain spendable indefinitely under
spend_auth_version = 0x01 - Prover role becomes threshold; 1/N permanent-loss limitation eliminated
15.5 No implicit upgrades
Outputs created under one spend_auth_version MUST NOT be reinterpreted
under another. Upgrading requires explicit migration transaction. This
prevents silent misreinterpretation and preserves auditability across
scheme transitions.
16. Implementation Plan
16.1 New Rust modules
shekyl-wallet-core/src/multisig/v31/
├── intent.rs — SpendIntent type, canonical serialization
├── construction.rs — canonical_construct() deterministic function
├── prover.rs — ProverOutput; rotating prover assignment
├── signing.rs — non-interactive scheme_id=2 signing
├── messages.rs — envelope + message types
├── encryption.rs — group_shared_secret + AEAD
├── invariants.rs — §2.7 honest-signer invariant checks
├── transport/
│ ├── mod.rs
│ ├── nostr.rs
│ ├── p2p.rs
│ ├── file.rs — opaque filenames + encrypted manifest
│ └── relay_directory.rs — operator uniqueness enforcement
├── state.rs — per-intent state machine
├── heartbeat.rs
├── counter_proof.rs
└── tx_counter.rs
shekyl-crypto-pq/src/multisig_receiving.rs
├── construct_multisig_output_for_sender
├── scan_multisig_output_for_participant
├── validate_multisig_output_at_receive — §8.3
├── derive_spend_auth_pubkey — versioned §7.2
└── rotating_prover_index — sender-computable §11.1
16.2 New tx_extra tags
src/cryptonote_basic/tx_extra.h:
TX_EXTRA_TAG_PQC_VIEW_TAG_HINTS = 0x09TX_EXTRA_TAG_PQC_SPEND_AUTH_PUBKEYS = 0x0A- Reserved:
TX_EXTRA_TAG_MULTISIG_MIGRATION = 0x08
16.3 Defense-in-depth wiring fixes
src/cryptonote_core/blockchain.cpp:3768: wireexpected_scheme_idrust/shekyl-ffi/src/lib.rs:343: passexpected_group_idtoverify_multisigfor scheme_id=2
16.4 Modified C++
src/cryptonote_core/cryptonote_tx_utils.cpp: add multisig-aware output construction pathsrc/wallet/wallet2.cpp: multisig output scanning, receive-time validation, garbage filtering with griefing scoressrc/rpc/core_rpc_server.h: addget_griefing_statsendpoint
16.5 New address parsing
rust/shekyl-encoding/src/lib.rs:shekyl1mHRPrust/shekyl-address/:MultisigAddresstype withspend_auth_versionhandling
16.6 GUI wallet changes
- Multisig page: file import/export for addresses
- Multisig page: mandatory fingerprint verification dialog (3 representations)
- Multisig page: 1/N loss acknowledgment gate at group setup
- Multisig page: prover-responsibility distribution view
- Multisig page: address provenance tracking UI with change warnings
- Settings: relay configuration (minimum 3 with operator diversity check)
- DKG ceremony UI for group setup
- Invariant violation alerts surfaced to user
16.7 Feature flag structure
[features]
default = []
multisig-v3.1 = [] # production multisig
frost-sal-v4 = [] # V4 FROST SAL scaffolding
unsafe-testing-only = [] # simple-mode fixtures, dev only
# Mutual exclusion: cargo enforces at compile time
CI verifies release builds do not contain simple-mode symbols.
16.8 Test matrix
Functional:
- 2-of-3, 3-of-5, 5-of-7 happy paths (receive + spend)
- Single-sig → multisig, multisig → multisig
- Change outputs (group → self)
- Staked outputs
Adversarial (per-invariant):
- Malicious proposer attacks each of §9.2 invariants (I1)
- Chain state fingerprint manipulation (I2)
- Malicious prover: wrong payload, malformed proof (I3)
- Malicious prover: incorrect BP+ randomness (I4)
- Wrong-prover key image attack (I5)
- tx_hash commitment disagreement in signing (I6)
- Receive-time validation failures: wrong Y_assigned, wrong my_Y (I7)
Adversarial (other):
- Network partition + CounterProof recovery (including malformed proofs)
- Relay censorship; operator collusion detection
- Conflicting simultaneous intents (ProverReceipt tiebreaking)
- Rotation rule grinding attempts
- Prover equivocation (detection + EquivocationProof)
- Sustained griefing: per-sender score effectiveness, state bounds
- Address fingerprint change: dual confirmation triggers
- Rate limit bypass via multi-indexing (by signing key)
- Unknown spend_auth_version silent skip
- Simple-mode absence in release builds
Interop:
- Malicious client produces invariant-violating SignatureShare; all conforming clients reject identically
- Cross-platform determinism: same intent → same bytes on Linux, macOS, Windows, x86_64, ARM64
Performance:
- Scanner cost at 10k+ tx/block with 5%, 10%, 25% multisig adoption
- Griefing score lookup performance
- Prover proof construction time
- Multi-relay overhead
16.9 Fuzz targets
fuzz_spend_intent_deserialize
fuzz_construction_determinism
fuzz_envelope_parser
fuzz_multisig_address_parse
fuzz_view_tag_hint_check
fuzz_rotating_prover_assignment (uniformity + grindability)
fuzz_counter_proof_verifier (strengthened rules)
fuzz_equivocation_proof_verifier
fuzz_invariant_violation_parser
fuzz_spend_auth_pubkey_derivation
fuzz_receive_time_validation
16.10 Rollout sequencing
| Phase | Duration | Content |
|---|---|---|
| 1 | 4-6 wk | Receiving model (Option C + Solution C), spend-auth derivation, tx_extra tag 0x0A, address format, wallet-side filtering with griefing scores, defense-in-depth wiring |
| 2 | 4-6 wk | Governance protocol, invariants (§2.7), state machine, CounterProof, heartbeat with operator IDs, multi-relay + directory, DKG mandatory enforcement, InvariantViolation message type |
| 3 | 3-4 wk | GUI: fingerprint (3-representation) verification, 1/N acknowledgment gate, prover distribution view, address provenance tracking, relay diversity check, DKG ceremony UI |
| 4 | 3-4 wk | Test matrix, fuzz harness, cross-platform determinism, interop tests across conforming clients |
| 5 | 2-3 wk | External adversarial review (reviewer round 4) |
| 6 | TBD | Cryptographer review of specific targets (see ANALYSIS §7) |
Total estimate: 16-23 weeks engineering + cryptographer review.
17. Appendix A: Canonical Test Vectors
Normative. Implementations MUST produce byte-identical output to these vectors for the input conditions specified. Any implementation that cannot is non-conforming.
Test vectors are maintained in a separate file test_vectors/v3.1/
alongside the implementation. This appendix enumerates required vectors
with their structure; actual bytes will be generated at implementation
time from the reference Rust implementation and cross-verified by at
least two independent implementations before being locked.
A.1 Required vectors
-
Group setup vector
- Input: fixed 5 hybrid signing keypairs, fixed 5 hybrid KEM keypairs, fixed parameters (n=5, m=3, group_version=1, spend_auth_version=1)
- Output: canonical serialized address, computed group_id, fingerprint (hex + word-phrase + structured metadata)
-
Receive-output vector
- Input: fixed recipient address (from A.1), fixed tx_secret_key, fixed output_index_in_tx, fixed reference_block_hash, fixed amount
- Output: full construct_multisig_output result — kem_ciphertexts, spend_auth_pubkeys, view_tag_hints, leaf_container bytes, output_pubkey O, assigned_prover_index, h_pqc
-
Spend-intent vector
- Input: fixed group state (from A.1), fixed input list, fixed recipient list, fixed parameters
- Output: canonical serialized SpendIntent, intent_hash, chain_state_fingerprint
-
Full-construction vector
- Input: fixed spend intent (from A.3), fixed chain reference data
- Output: canonical transaction bytes (prefix + rct_base + rct_prunable_skeleton + pqc_auth_header), signing_payload hash, deterministic BP+ bytes
-
CounterProof vector
- Input: fixed consumed inputs, fixed resulting outputs, fixed block data
- Output: canonical CounterProof bytes, verification pass/fail cases (including malformed attempts)
-
Prover-assignment vector
- Input: grid of (group_id, output_index_in_tx, tx_secret_key_hash, reference_block_hash, n_total)
- Output: expected prover_index for each combination (uniformity verification)
A.2 Generation and verification protocol
- Vectors generated by the reference Rust implementation
- Each vector cross-verified by a second independent implementation (e.g., C++ via FFI)
- Vectors locked in the repository; changes require a spec version bump
- Client certification: any implementation claiming V3.1 conformance MUST pass all vectors in this appendix
18. Appendix B: Mapping from Original Spec
This document supersedes:
PQC_MULTISIG.md(original; coordinator-based)PQC_MULTISIG_V3_1.md(governance draft)PQC_MULTISIG_V3_1_RECEIVING.md(Option C receiving draft)PQC_MULTISIG.mdv1.0 (consolidated draft; superseded by v1.1)
All material from predecessors is consolidated here. Predecessor
documents can be deleted from the repo once this document is merged.
The original PQC_MULTISIG.md should be updated to a single-paragraph
deprecation pointer.
For attack analysis, size analysis, and design rationale, see the
companion document PQC_MULTISIG_V3_1_ANALYSIS.md.