Storm: escrowed storage and messaging at L2/L3



Summary:

The email conversation between ZmnSCPxj and Maxim Orlovsky has been provided, where they discuss the issue with probabilistic proof and possible solutions. The need for an asymmetrical encryption that separates encryption and decryption keys is highlighted. ZmnSCPxj proposes a solution using EC, which can be used to encrypt/decrypt with hash of the secret decryption key d whose equivalent encryption key is e. The possibility of implementing the solution with threshold ECDSA signatures is also discussed. They also acknowledge that intermediate nodes potentially become subject to attack in case of routing failure and thus, the solution is limited to a single LN channel. However, ZmnSCPxj proposes an interesting solution that uses EC magic homomorphisms to get around this problem. Maxim Orlovsky intends to analyze it in more detail and open an issue on GitHub for discussion.


Updated on: 2023-06-13T21:03:30.951564+00:00