Saint Wenhao, > Also, I wonder if collisions in P2SH will be used as a "wrapped Taproot". I love this idea. The cost to so this is about 2^81 not 2^80. You aren't trying to find any collision, you are trying to find a collision for Alice's script and Bob's script. If you a giant lookup table of 2^80 Alice Script hashes, you could try Bob Script hashes until one collides with this lookup table. This should be an additional 2^79.5 work. This means with more storage existing on the planet you can do this in 2^80.5 calls, assuming HASH-160 has no cryptanalytic weaknesses that make collisions easier. This lookup table would be absurdly huge: 2^80 * (20+12) bytes = 2^45 terabytes = ~100 trillion 1 TB harddrives You can use time-memory tradeoffs here. In fact this is the same hash collision problem that colliderscript deals with. See ColliderScript: Covenants in Bitcoin via 160-bit hash collisions https://eprint.iacr.org/2024/1802.pdf appendix E and F in the CollidierScript paper for equations you can use to find an exact value. Using the more realistic memory assumptions from ColliderScript, you could probably get it down to approx, ~2^81 hash queries and 2^56 storage (~4096 1TB harddrives). Assuming you built an ASICs for this, it would cost between $100,000 and $2 million in electricity per collision. This is much cheaper than the cost for colliderscript because colliderscript must account for some other parameters that don't matter here. On Wed, Mar 18, 2026 at 6:18 AM Saint Wenhao wrote: > > You were of course in fact pubkey-prefixing here (with the hash-160 of P) > > Yes, I also thought about that. But then, it means after around 2^80 > operations, you could have a potential RIPEMD-160 collision in the future. > Which also means, that 160-bit hashes may be later unsafe anyway. And if > you pick 256-bit ones, then putting x-value pubkey gives the same size. > > Also, I wonder if collisions in P2SH will be used as a "wrapped Taproot". > Because then, instead of building some MAST, it could be possible to simply > prepare a collision, and use older addresses in that way. Then, Alice can > for example use " OP_CHECKSIG", and Bob can use "