Skip to content

Commit d9d02ff

Browse files
committed
remove mentions about deterministic
1 parent 19fde61 commit d9d02ff

File tree

1 file changed

+1
-11
lines changed

1 file changed

+1
-11
lines changed

bip-encrypted-backup.md

Lines changed: 1 addition & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -57,7 +57,7 @@ avoids the first problem but amplifies surveillance risk: anyone who gains these
5757
etc... Even with encryption at the cloud provider, an attacker or a subpoena can
5858
compel access, and each extra copy multiplies the attack surface.
5959

60-
These constraints lead to an acute need for an **encrypted, deterministic**, and
60+
These constraints lead to an acute need for an **encrypted**, and
6161
ideally compact backup format that:
6262

6363
* can be **safely stored in multiple places**, including untrusted on-line services,
@@ -105,8 +105,6 @@ parties (typically, a subset of the cosigners).
105105
* **Easy to implement**: it should not require any sophisticated tools.
106106
* **Vendor-independent**: it should be easy to implement using any hardware signing
107107
device.
108-
* **Deterministic**: the result of the backup is the same for the same payload. Not
109-
crucial, but a nice-to-have.
110108

111109
### Scope
112110

@@ -127,14 +125,6 @@ interactive workflows.
127125

128126
Note: in the followings sections, the operator ⊕ refers to the bitwise XOR.
129127

130-
### Security considerations
131-
132-
Deterministic encryption, by definition, cannot satisfy the standard [semantic
133-
security](https://en.wikipedia.org/wiki/Semantic_security) property commonly used in
134-
cryptography; however, in our context, it is safe to assume that the adversary does
135-
not have access to plaintexts, and no other plaintext will be encrypted with the
136-
same secrets.
137-
138128
### Secret generation
139129

140130
* Let `p_1`, `p_2`, .., `p_n` be the public keys in the descriptor/wallet policy, in

0 commit comments

Comments
 (0)