You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: bip-0075.mediawiki
+18-2Lines changed: 18 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -67,6 +67,21 @@ A Bitcoin wallet developer would like to use a public Store & Forward service fo
67
67
68
68
With this BIP, returned payment information is encrypted with an ECDH-computed shared key before sending to a Store & Forward service. In this case, a successful attack against a Store & Forward service would not be able to read or modify wallet address or payment information, only delete encrypted messages.
69
69
70
+
==Modifying BIP70 pki_type==
71
+
This BIP adds additional possible values for the pki_type variable in the PaymentRequest message. The complete list is now as follows:
72
+
73
+
{| class="wikitable"
74
+
! pki_type !! Description
75
+
|-
76
+
| x509+sha256 || A x.509 certificate, as described in BIP70
77
+
|-
78
+
| pgp+sha256 || An [[https://en.wikipedia.org/wiki/Pretty_Good_Privacy#OpenPGP|OpenPGP]] certificate
79
+
|-
80
+
| ecdsa+sha256 || A [[https://en.bitcoin.it/wiki/Secp256k1|secp256k1]] [[https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm|ECDSA]] public key
81
+
|}
82
+
83
+
'''NOTE''': Although SHA1 was supported in BIP70, it has been deprecated and BIP75 only supports SHA256. The hashing algorithm is still specified in the values listed above for forward and backwards compatibility.
84
+
70
85
==New Messages==
71
86
Updated [/bip-0075/paymentrequest.proto paymentrequest.proto] contains the existing PaymentRequest Protocol Buffer messages as well as the messages newly defined in this BIP.
72
87
@@ -94,7 +109,7 @@ message InvoiceRequest {
94
109
|-
95
110
| amount || amount is integer-number-of-satoshis (default: 0)
@@ -343,8 +358,9 @@ If a Store & Forward server wishes to protect themselves from spam or abuse, the
343
358
Clients SHOULD keep in mind Receivers can broadcast a transaction without returning an ACK. If a Payment message needs to be updated, it SHOULD include at least one input referenced in the original transaction to prevent the Receiver from broadcasting both transactions and getting paid twice.
344
359
345
360
==Public Key & Signature Encoding==
346
-
* All EC public keys ('''sender_public_key''', '''receiver_public_key''') included in any message defined in this BIP MUST be DER [ITU.X690.1994] encoded.
361
+
* All EC public keys ('''sender_public_key''', '''receiver_public_key''') or x.509 certificates included in any message defined in this BIP MUST be DER [ITU.X690.1994] encoded.
347
362
* All ECC signatures included in any message defined in this BIP MUST use the SHA-256 hashing algorithm and MUST be DER [ITU.X690.1994] encoded.
363
+
* All OpenPGP certificates must follow [[https://tools.ietf.org/html/rfc4880|RFC4880]], sections 5.5 and 12.1.
348
364
349
365
==Implementation==
350
366
A reference implementation for a Store & Forward server supporting this proposal can be found here:
0 commit comments