📢 Gate Square #Creator Campaign Phase 2# is officially live!
Join the ZKWASM event series, share your insights, and win a share of 4,000 $ZKWASM!
As a pioneer in zk-based public chains, ZKWASM is now being prominently promoted on the Gate platform!
Three major campaigns are launching simultaneously: Launchpool subscription, CandyDrop airdrop, and Alpha exclusive trading — don’t miss out!
🎨 Campaign 1: Post on Gate Square and win content rewards
📅 Time: July 25, 22:00 – July 29, 22:00 (UTC+8)
📌 How to participate:
Post original content (at least 100 words) on Gate Square related to
DLC Optimization Plan: Enhance the Security and Application Potential of the Bitcoin Ecosystem
Discussion on the Technical Principles and Optimization Ideas of DLC
1. Introduction
Discrete Log Contracts ( DLC ) are a type of condition payment scheme based on oracles, proposed by MIT's Tadge Dryja in 2018. DLC allows both parties to make conditional payments based on predefined conditions, with participants pre-signing possible outcomes and executing payments when the oracle signs the result. This enables DLC to facilitate new decentralized financial applications while ensuring the security of Bitcoin deposits.
Compared to the Lightning Network, DLC has the following advantages:
However, there are still some risks and issues with DLC:
This article will propose some optimization solutions to these issues in order to enhance the security of the Bitcoin ecosystem.
2. DLC Principle
Taking Alice and Bob signing a betting agreement as an example, the bet is on the parity of the hash value of the n+k-th block. DLC constructs conditional signatures by transmitting block information through oracles, allowing the winning party to win the assets.
The main steps include:
Analysis shows that only the correct party can calculate the new private key and successfully withdraw the tokens. A time lock also needs to be added to prevent the assets from being withdrawn by the other party.
3. DLC Optimization
3.1 Key Management
The private key and random number of the oracle in DLC are crucial; leakage or loss may result in:
It is recommended to use BIP32 to derive child keys or grandchild keys, and to use the hash value of the private key and counter as a random number to enhance security.
3.2 Decentralized Oracle
Using Schnorr threshold signatures can achieve decentralized oracles, with the following advantages:
3.3 Decentralization and Key Management Coupling
In the scenario of decentralized oracles, the complete private key does not appear, making it impossible to directly use BIP32 to derive keys. A distributed key derivation method can be employed, implemented based on Lagrange interpolation polynomials. However, the compatibility issues between enhanced and non-enhanced BIP32 must be considered.
3.4 OP-DLC: Oracle Trust Minimization
Propose the OP-DLC scheme and introduce an optimistic challenge mechanism. The oracle needs to stake in advance to build on-chain OP games and commit to not acting maliciously. Any honest participant can initiate a challenge to punish the malicious oracle. This allows oracle nodes to supervise each other and achieve minimal trust.
3.5 OP-DLC + BitVM dual bridge
Combining OP-DLC and BitVM to solve the limitations of DLC in fund distribution:
4. Conclusion
DLC technology combined with new technologies like Taproot and BitVM can achieve more complex off-chain contract verification and settlement. Through the OP challenge mechanism, it can further achieve oracle trust minimization, bringing more possibilities to the Bitcoin ecosystem.