@@ -57,7 +57,7 @@ avoids the first problem but amplifies surveillance risk: anyone who gains these
5757etc... Even with encryption at the cloud provider, an attacker or a subpoena can
5858compel access, and each extra copy multiplies the attack surface.
5959
60- These constraints lead to an acute need for an ** encrypted, deterministic ** , and
60+ These constraints lead to an acute need for an ** encrypted** , and
6161ideally compact backup format that:
6262
6363* can be ** safely stored in multiple places** , including untrusted on-line services,
@@ -105,8 +105,6 @@ parties (typically, a subset of the cosigners).
105105* ** Easy to implement** : it should not require any sophisticated tools.
106106* ** Vendor-independent** : it should be easy to implement using any hardware signing
107107device.
108- * ** Deterministic** : the result of the backup is the same for the same payload. Not
109- crucial, but a nice-to-have.
110108
111109### Scope
112110
@@ -127,14 +125,6 @@ interactive workflows.
127125
128126Note: in the followings sections, the operator ⊕ refers to the bitwise XOR.
129127
130- ### Security considerations
131-
132- Deterministic encryption, by definition, cannot satisfy the standard [ semantic
133- security] ( https://en.wikipedia.org/wiki/Semantic_security ) property commonly used in
134- cryptography; however, in our context, it is safe to assume that the adversary does
135- not have access to plaintexts, and no other plaintext will be encrypted with the
136- same secrets.
137-
138128### Secret generation
139129
140130* Let ` p_1 ` , ` p_2 ` , .., ` p_n ` be the public keys in the descriptor/wallet policy, in
0 commit comments