>   or we can just allow on-chain covenants (txhash) that can trivially make secret-reveal scheme paths secure without signatures

You'd still need  BIP 360 P2MR (or P2TRD) since OP_TXHASH needs tapscript, and the only available tapscript supporting output type, P2TR, isn't quantum safe.

I'm going to assume:
- you mean to use this commit-reveal for migrating between signature algorithms, not for everyday use,
- TXHASH is being used because you are waiting for the commitment to be confirmed on-chain rather than lifeboat's out-of-band commitment system

 The main disadvantages of using commit-reveal in this manner are:

Once you post your commit-txn, but before it confirms, other parties can post competing commit-txns that double spend your output. If one of malicious transactions confirm, you must now wait for a timelock to expire and then try to post your transaction. They can block you again. Each time they burn some of you coins in fees. Miners get the fees, so they might be incentivized to do this. Thus, we must trust miners not to do this. Lifeboat doesn't have this issue since it uses out-of-band commitments, but out-of-band commitments have their own issues.

Miners are now trusted more, since reorgs can steal funds.

I prefer SLH_DSA over commit-reveal as it preserves Bitcoin's trust assumptions and user expectations. I see commit-reveal as valuable for the case where our signature algorithms weaken rapidly and we don't have time to push through a more complex solution.

On Tue, Feb 10, 2026 at 5:06 PM Erik Aronesty <erik@q32.com> wrote:
or we can just allow on-chain covenants (txhash) that can trivially make secret-reveal scheme paths secure without signatures

adding a flag that opts-in to path disablement on "q day" is nice because 99% chance it will never be needed, but is a good safety valve



On Tue, Feb 10, 2026 at 12:49 PM Ethan Heilman <eth3rs@gmail.com> wrote:
Appreciate your feedback on this proposal, Jonas

>  I agree that reusing an already standardized scheme like SLH-DSA has the real benefit of building on an existing ecosystem and allowing for faster deployment. The downside is that SLH-DSA is less efficient for Bitcoin than alternative hash-based signatures.

I want to introduce some new terminology here:

Everyday signature algorithms: These are the signature algorithms users employ for daily transactions.
Backup signature algorithms: These are signature algorithms used to migrate from a broken everyday signature algorithm to new everyday signature algorithm.

I agree that for the everyday signatures we need something much smaller than SLH_DSA's 8kb signature. If we expect everyday signature algorithms to weaken at a rate requiring replacement every 40 years, backup signatures will represent a very small fraction of Bitcoin signatures, making their size less important. Even then, if a break in a everyday signature algorithm is not unexpected, we can use everyday signatures to make the transition to the new everyday signature algorithm.

The most likely use for backup signatures is for someone who stored their BTC in an output for 50 years, didn't move their coins when the everyday signature algorithm was weakened, and then didn't move their coins when it was completely broken. Say someone who put their coins in a safety deposit box, got sick, died and their estate now wants to safely move the coins. They would use the backup signature to move to a new output because there is no other safe option.

>  Those costs are therefore a more binding design constraint than ecosystem support, which can be built up over time through focused effort.

I agree with you here, as long as we constrain ourselves to everyday signature algorithms. Backup signatures should optimize for security and standardness.

>  If Bitcoin disables Taproot key path spends before Q-day, then doing this via Taproot instead of BIP 360 would be preferable.

I worry about making the transition to quantum-safe outputs depend on a contentious debate over a confiscatory soft fork. Uncertainty over whether the soft fork would be released and if released would be activated means that wallets and custodians are unlikely to have invested the resources into upgrading to support script only P2TR.

The benefit of BIP 360's P2MR (Pay-to-Merkle-Root) + SLH_DSA is that it avoids this controversy by being opt-in and non-confiscatory. This also means that BIP 360  + SLH_DSA is likely to activated early, allowing wallets and custodians ample time to build support after activation.

>  We could define a new SegWit version that is a copy of Taproot. The new version number simply signals that the owner consents to a future deactivation of key path spends. Unlike BIP 360, this
approach would still require actually disabling the key path before Q-day, but it is not confiscatory and allows using Taproot's benefits until then (with a privacy hit from having two versions of Taproot in parallel).

Let's call this  P2TRD (Pay-to-Tap-Root-Disablable). BIP 360 evolved from this P2TRD idea, to minimize the following hazards in P2TRD.

1.  P2TRD requires a soft fork that depends on accurately predicting Q-day or when EC Schnorr is classically broken. We must not only predict Q-day but also convince the community that the prediction is correct. If we mess up the timing, Bitcoin is significantly harmed. This means that people will constantly be yelling that we are messing up the timing. It will make quantum FUD worse not better.

2.  P2TRD (Pay-to-Tap-Root-Disablable) to be non-confiscatory users must create a script spend that replicates their key spend, But users and wallets are likely to screw this up and not create script spends. The is no way to see if a wallet is actually creating the script spend on the blockchain.

3. To be safe from long-exposure attacks P2TRD can't use the same public key for the script spend as the key spend. Since wallets will prefer the key spend to the script spend, a user might not realize if they lost the keying material for their script spend until after activation.

Hazard 2 and 3 make harzard 1 worse by making the Q-day soft-fork to disable key spends in P2TRD more controversial. Imagine a giant custodian finds out all their coins are burned after the soft fork activates, they might bribe miners to unactivate the soft fork to give a chance to move the coins.  That probably won't happen but why take the risk? Signaling a willingness to take unnecessary risks could also harm Bitcoin's credibility.

Additionally, by only having script path spends in BIP 360, wallets who want to claim to use BIP 360 support must actually build script spend support. Users will know that their script spends work because they are actively using them.  

BIP 360 +SLH_DSA solves problem 1 by never allowing key path spends in BIP 360 outputs. This allows us to reach quantum safety without having to predict Q-Day. This also allows Bitcoin to demonstrate it is quantum safe, rather than the hopes of quantum-safety depend on an uncertain future soft fork. This settles the safety issue early, removing the risk of a Q-day soft fork disaster and calming fears about such an event.







On Tue, Feb 10, 2026 at 4:11 AM Jonas Nick <jonasd.nick@gmail.com> wrote:
Hi Ethan,

Thanks for the thoughts. A few comments on the specifics follow.

 > I prefer SLH_DSA because it is likely to be well supported outside of Bitcoin
 > and Bitcoin can benefit from this ecosystem of support in the form of HSMs,
 > hardware acceleration and software liberties.

I agree that reusing an already standardized scheme like SLH-DSA has the real
benefit of building on an existing ecosystem and allowing for faster deployment.
The downside is that SLH-DSA is less efficient for Bitcoin than alternative
hash-based signatures.

If this is not intended to be a short-term solution, efficiency considerations
(e.g., ~50% smaller signatures) likely outweigh the benefits of an established
ecosystem. While the Bitcoin space does have the ability to standardize new
efficient schemes and invest in software libraries and custom HSM support, the
verification resource constraints of the entire Bitcoin network are much harder
to influence. Those costs are therefore a more binding design constraint than
ecosystem support, which can be built up over time through focused effort.

 > Q: Couldn’t you do this without BIP 360 by using Taproot instead and then
 > disabling the taproot key spend path?
 > A: Yes, however this would be confiscatory, since Taproot allows key spend
 > path only outputs.

If Bitcoin disables Taproot key path spends before Q-day, then doing this via
Taproot instead of BIP 360 would be preferable. It would allow users to benefit
from Taproot's efficiency and privacy properties until key path spends are
disabled.

There's also an alternative that Matt Corallo mentioned to me recently which I
haven't seen discussed on the mailing list. We could define a new SegWit version
that is a copy of Taproot. The new version number simply signals that the owner
consents to a future deactivation of key path spends. Unlike BIP 360, this
approach would still require actually disabling the key path before Q-day, but
it is not confiscatory and allows using Taproot's benefits until then (with a
privacy hit from having two versions of Taproot in parallel).

--
You received this message because you are subscribed to the Google Groups "Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/ea3a12db-e3fd-44b2-a22c-b960ed7ec6d3%40gmail.com.

--
You received this message because you are subscribed to the Google Groups "Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/CAEM%3Dy%2BU_PV7dA5Azr7D4Rnr40QaHKUrxdLmx0zPPjYoE-HZ%3DHw%40mail.gmail.com.

--
You received this message because you are subscribed to the Google Groups "Bitcoin Development Mailing List" group.
To unsubscribe from this group and stop receiving emails from it, send an email to bitcoindev+unsubscribe@googlegroups.com.
To view this discussion visit https://groups.google.com/d/msgid/bitcoindev/CAEM%3Dy%2BWdPbjVH24Bhb9pJGFoHe0k7%3DJRwG9VU49%2B7ZeCip0Csg%40mail.gmail.com.