ZIP: 227
Title: Issuance of Zcash Shielded Assets
Owners: Pablo Kogan <pablo@qed-it.com>
Vivek Arte <vivek@qed-it.com>
Daira-Emma Hopwood <daira-emma@electriccoin.co>
Jack Grigg <str4d@electriccoin.co>
Credits: Daniel Benarroch
Aurelien Nicolas
Deirdre Connolly
Teor
Status: Draft
Category: Consensus
Created: 2022-05-01
License: MIT
Discussions-To: <https://github.com/zcash/zips/issues/618>
Pull-Request: <https://github.com/zcash/zips/pull/680>
Terminology
The key words "MUST", "MUST NOT", "SHOULD", "RECOMMENDED", and "MAY" in this document are to be interpreted as described in BCP 14 1 when, and only when, they appear in all capitals.
The term "network upgrade" in this document is to be interpreted as described in ZIP 200 7.
The terms "Orchard" and "Action" in this document are to be interpreted as described in ZIP 224 9.
We define the following additional terms:
Asset: A type of note that can be transferred on the Zcash blockchain. Each Asset is identified by an Asset Identifier Specification: Asset Identifier.
ZEC is the default (and currently the only defined) Asset for the Zcash mainnet.
TAZ is the default (and currently the only defined) Asset for the Zcash testnet.
We use the term "Custom Asset" to refer to any Asset other than ZEC and TAZ.
Native Asset: a Custom Asset with issuance defined on the Zcash blockchain.
Wrapped Asset: a Custom Asset with native issuance defined outside the Zcash blockchain.
Issuance Action: an instance of a single issuance of a Zcash Shielded Asset. It defines the issuance of a single Asset Identifier.
Issuance Bundle: the bundle in the transaction that contains all the issuance actions of that transaction.
Abstract
This ZIP (ZIP 227) proposes the Zcash Shielded Assets (ZSA) protocol, in conjunction with ZIP 226 10. This protocol is an extension of the Orchard protocol that enables the creation, transfer and burn of Custom Assets on the Zcash chain. The creation of such Assets is defined in this ZIP (ZIP 227), while the transfer and burn of such Assets is defined in ZIP 226 10. This ZIP must only be implemented in conjunction with ZIP 226 10. The proposed issuance mechanism is only valid for the Orchard-ZSA transfer protocol, because it produces notes that can only be transferred under ZSA.
Motivation
This ZIP introduces the issuance mechanism for Custom Assets on the Zcash chain. While originally part of a single ZSA ZIP, the issuance mechanism turned out to be substantial enough to stand on its own and justify the creation of this supporting ZIP for ZIP 226 10.
This ZIP only enables transparent issuance. As a first step, transparency will allow for proper testing of the applications that will be most used in the Zcash ecosystem, and will enable the supply of Assets to be tracked.
The issuance mechanism described in this ZIP is broad enough for issuers to either create Assets on Zcash (i.e. Assets that originate on the Zcash blockchain), as well as for institutions to create bridges from other chains and import Wrapped Assets. This enables what we hope will be a useful set of applications.
Use Cases
The design presented in this ZIP enables issuance of shielded Assets in various modes:
The issuer may or may not know the receivers of the issued Asset in advance.
The Asset can be of non-fungible type, where each Asset type can be made part of a single “series”.
The supply of the Asset can be limited in advance or not.
The Asset can be a wrapped version of an Asset issued by another chain (as long as there is a bridge that supports transfer of that Asset between chains).
Any user of the Zcash blockchain can issue Custom Assets on chain.
The issuance mechanism should enable public tracking of the supply of the Assets on the Zcash blockchain.
Issuing or changing the attributes of a specific Asset should require cryptographic authorization.
The Asset identification should be unique (among all shielded pools) and different issuer public keys should not be able to generate the same Asset Identifier.
An issuer should be able to issue different Assets in the same transaction. In other words, in a single "issuance bundle", the issuer should be able publish many "issuance actions", potentially creating multiple Custom Assets.
Every "issuance action" should contain a
\(\mathsf{finalize}\)
boolean that defines whether the specific Custom Asset can have further tokens issued or not.
Specification: Issuance Keys and Issuance Authorization Signature Scheme
The Orchard-ZSA Protocol adds the following keys to the key components 2122:
The issuance authorizing key, denoted as
\(\mathsf{isk}\!\)
, is the key used to authorize the issuance of Asset Identifiers by a given issuer, and is only used by that issuer.
The issuance validating key, denoted as
\(\mathsf{ik}\!\)
, is the key that is used to validate issuance transactions. This key is used to validate the issuance of Asset Identifiers by a given issuer, and is used by all blockchain users (specifically the owners of notes for that Asset, and consensus validators) to associate the Asset in question with the issuer.
The relations between these keys are shown in the following diagram:
Issuance Authorization Signature Scheme
We instantiate the issuance authorization signature scheme
\(\mathsf{IssueAuthSig}\)
as a BIP-340 Schnorr signature over the secp256k1 curve. The signing and validation algorithms, signature encoding, and public key encoding MUST follow BIP 340 19.
Batch verification MAY be used. Precomputation MAY be used if and only if it produces equivalent results; for example, for a given verification key
\(pk\)
and
\(\mathit{lift\_x}(\mathit{int}(pk))\)
MAY be precomputed.
We define the constants as per the secp256k1 standard parameters, as described in BIP 340.
The associated types of the
\(\mathsf{IssueAuthSig}\)
signature scheme are as follows:
where
\(\mathbb{B}^{\mathbb{Y}^{[k]}}\)
denotes the set of sequences of
\(k\)
bytes, and
\(\mathbb{B}^{\mathbb{Y}^{[\mathbb{N}]}}\)
denotes the type of byte sequences of arbitrary length, as defined in the Zcash protocol specification 20.
The issuance authorizing key generation algorithm and the issuance validating key derivation algorithm are defined in the Issuance Key Derivation section, while the corresponding signing and validation algorithms are defined in the Issuance Authorization Signing and Validation section.
Issuance Key Derivation
Issuance authorizing key generation for hierarchical deterministic wallets
The issuance authorizing key is generated using the Hardened-only key derivation process defined in ZIP 32 3. For the
\(\mathsf{Issuance}\)
context, we define the following constants:
Let
\(S\)
be a seed byte sequence of a chosen length, which MUST be at least 32 and at most 252 bytes. We define the master extended issuance key
\(m_{\mathsf{Issuance}} := \mathsf{MKGh}^{\mathsf{Issuance}}(S)\!\)
.
We use hardened-only child key derivation as defined in ZIP 32 4 for the issuance authorizing key.
We use the notation of ZIP 32 6 for shielded HD paths, and define the issuance authorizing key path as
\(m_{\mathsf{Issuance}} / \mathit{purpose}' / \mathit{coin\_type}' / \mathit{account}'\!\)
. We fix the path levels as follows:
\(\mathit{purpose}\)
: a constant set to
\(227\)
(i.e.
\(\mathtt{0xe3}\!\)
).
\(\mathit{purpose}'\)
is thus
\(227'\)
(or
\(\mathtt{0x800000e3}\!\)
) following the BIP 43 recommendation.
Return
\(\bot\)
if the
\(\textit{PubKey}\)
algorithm invocation fails, otherwise return
\(\mathsf{ik}\!\)
.
where the
\(\textit{PubKey}\)
algorithm is defined in BIP 340 19. Note that the byte representation of
\(\mathsf{ik}\)
is in big-endian order as defined in BIP 340.
It is possible for the
\(\textit{PubKey}\)
algorithm to fail with very low probability, which means that
\(\mathsf{IssueAuthSig}.\!\mathsf{DerivePublic}\)
could return
\(\bot\)
with very low probability. If this happens, discard the keys and repeat with a different
\(\mathsf{isk}\!\)
.
This allows the issuer to use the same wallet it usually uses to transfer Assets, while keeping a disconnect from the other keys. Specifically, this method is aligned with the requirements and motivation of ZIP 32 2. It provides further anonymity and the ability to delegate issuance of an Asset (or in the future, generate a multi-signature protocol) while the rest of the keys remain in the wallet safe.
Let the auxiliary data
\(a = [\mathtt{0x00}]^{32}\!\)
.
Let
\(\text{σ} = \mathsf{Sign}(\mathsf{isk}, M)\!\)
.
Return
\(\bot\)
if the
\(\mathsf{Sign}\)
algorithm fails in the previous step, otherwise return
\(\text{σ}\!\)
.
where the
\(\mathsf{Sign}\)
algorithm is defined in BIP 340 and
\(a\)
denotes the auxiliary data used in BIP 340 19. Note that
\(\mathsf{IssueAuthSig}.\!\mathsf{Sign}\)
could return
\(\bot\)
with very low probability.
Return
\(1\)
if
\(\mathsf{Verify}(\mathsf{ik}, M, \text{σ})\)
succeeds, otherwise
\(0\!\)
.
where the
\(\mathsf{Verify}\)
algorithm is defined in BIP 340 19.
Specification: Asset Identifier
For every new Asset, there MUST be a new and unique Asset Identifier, denoted
\(\mathsf{AssetId}\!\)
. We define this to be a globally unique pair
\(\mathsf{AssetId} := (\mathsf{ik}, \mathsf{asset\_desc})\!\)
, where
\(\mathsf{ik}\)
is the issuance key and
\(\mathsf{asset\_desc}\)
is a byte string.
A given Asset Identifier is used across all Zcash protocols that support ZSAs -- that is, the Orchard-ZSA protocol and potentially future Zcash shielded protocols. For this Asset Identifier, we derive an Asset Digest,
\(\mathsf{AssetDigest}\!\)
, which is simply is a
\(\textsf{BLAKE2b-512}\)
hash of the Asset Identifier. From the Asset Digest, we derive a specific Asset Base within each shielded protocol using the applicable hash-to-curve algorithm. This Asset Base is included in shielded notes.
Let
\(\mathsf{asset\_desc}\)
be the asset description, which includes any information pertaining to the issuance, and is a byte sequence of up to 512 bytes which SHOULD be a well-formed UTF-8 code unit sequence according to Unicode 15.0.0 or later.
\(\mathsf{ik}\)
be the issuance validating key of the issuer, a public key used to verify the signature on the issuance transaction's SIGHASH.
Define
\(\mathsf{AssetDigest_{AssetId}} := \textsf{BLAKE2b-512}(\texttt{"ZSA-Asset-Digest"},\; \mathsf{EncodeAssetId}(\mathsf{AssetId}))\!\)
, where
In the case of the Orchard-ZSA protocol, we define
\(\mathsf{ZSAValueBase}(\mathsf{AssetDigest_{AssetId}}) := \mathsf{GroupHash}^\mathbb{P}(\texttt{"z.cash:OrchardZSA"}, \mathsf{AssetDigest_{AssetId}})\)
where
\(\mathsf{GroupHash}^\mathbb{P}\)
is defined as in 23.
The relations between the Asset Identifier, Asset Digest, and Asset Base are shown in the following diagram:
Note: To keep notations light and concise, we may omit
\(\mathsf{AssetId}\)
(resp.
\(\mathsf{Protocol}\!\)
) in the subscript (resp. superscript) when the Asset Identifier (resp. Protocol) is clear from the context.
Wallets MUST NOT display just the
\(\mathsf{asset\_desc}\)
string to their users as the name of the Asset. Some possible alternatives include:
Wallets could allow clients to provide an additional configuration file that stores a one-to-one mapping of names to Asset Identifiers via a petname system. This allows clients to rename the Assets in a way they find useful. Default versions of this file with well-known Assets listed can be made available online as a starting point for clients.
The Asset Digest could be used as a more compact bytestring to uniquely determine an Asset, and wallets could support clients scanning QR codes to load Asset information into their wallets.
Specification: Global Issuance State
Issuance requires the following additions to the global state:
A map,
\(\mathsf{issued\_assets}\!\)
, from the Asset Base,
\(\mathsf{AssetBase}\)
, to a tuple
\((\mathsf{balance}, \mathsf{final})\!\)
, for every Asset that has been issued. For each Asset:
The amount of the Asset in circulation, computed as the amount of the Asset that has been issued less the amount of the Asset that has been burnt, is stored in
\(\mathsf{balance}\!\)
.
The boolean
\(\mathsf{final}\)
stores the finalization status of the Asset (i.e.: whether the
\(\mathsf{finalize}\)
flag has been set to
\(1\)
in some preceding issuance transaction for the Asset). The value of
\(\mathsf{final}\)
for any Asset cannot be changed from
\(1\)
to
\(0\)
.
We use the notation
\(\mathsf{issued\_assets}(\mathsf{AssetBase}).\!\mathsf{balance}\)
and
\(\mathsf{issued\_assets}(\mathsf{AssetBase}).\!\mathsf{final}\)
to access, respectively, the balance and finalization status of the Asset stored in the global state.
Rationale for Global Issuance State
It is necessary to ensure that the balance of any issued Custom Asset never becomes negative within a shielded pool, along the lines of ZIP 209 8. However, unlike for the shielded ZEC pools, there is no individual transaction field that directly corresponds to both the issued and burnt amounts for a given Asset. Therefore, we require that all nodes maintain a record of the current amount in circulation for every issued Custom Asset, and update this record based on the issuance and burn transactions processed. This allows for efficient detection of balance violations for any Asset, in which scenario we specify a consensus rule to reject the transaction or block.
Nodes also need to reject transactions that issue Custom Assets that have been previously finalized. The
\(\mathsf{issued\_assets}\)
map allows nodes to store whether or not a given Asset has been finalized.
Specification: Issuance Action, Issuance Bundle and Issuance Protocol
Issuance Action Description
An issuance action, IssueAction, is the instance of issuing a specific Custom Asset, and contains the following fields:
assetDescSize: the size of the Asset description, a number between
\(0\)
and
\(512\!\)
.
asset_desc: the Asset description, a byte string of up to 512 bytes as defined in the Specification: Asset Identifier section.
vNotes: an array of Note containing the unencrypted output notes of the recipients of the Asset.
flagsIssuance: a byte that stores the
\(\mathsf{finalize}\)
boolean that defines whether the issuance of that specific Custom Asset is finalized or not.
The
\(\mathsf{finalize}\)
boolean is set by the Issuer to signal that there will be no further issuance of the specific Custom Asset. As we will see in Specification: Consensus Rule Changes, transactions that attempt to issue further amounts of a Custom Asset that has previously been finalized will be rejected.
The complete encoding of these fields into an IssueAction is defined in ZIP 230 13.
We note that the output note commitment of the recipient's notes are not included in the actual transaction, but when added to the global state of the chain, they will be added to the note commitment tree as a shielded note. This prevents future usage of the note from being linked to the issuance transaction, as the nullifier key is not known to the validators and chain observers.
Issuance Bundle
An issuance bundle is the aggregate of all the issuance-related information. Specifically, contains all the issuance actions and the issuer signature on the transaction SIGHASH that validates the issuance itself. It contains the following fields:
\(\mathsf{ik}\)
: the issuance validating key, that allows the validators to verify that the
\(\mathsf{AssetId}\)
is properly associated with the issuer.
vIssueActions: an array of issuance actions, of type IssueAction.
\(\mathsf{issueAuthSig}\)
: the signature of the transaction SIGHASH, signed by the issuance authorizing key,
\(\mathsf{isk}\!\)
, that validates the issuance.
The issuance bundle is added within the transaction format as a new bundle. The detailed encoding of the issuance bundle as a part of the V6 transaction format is defined in ZIP 230 14.
Issuance Protocol
The issuer program performs the following operations:
For all actions IssueAction:
encode
\(\mathsf{asset\_desc}\)
as a UTF-8 byte string of size up to 512.
compute
\(\mathsf{AssetDigest}\)
from the issuance validating key
\(\mathsf{ik}\)
and
\(\mathsf{asset\_desc}\)
as decribed in the Specification: Asset Identifier section.
set the
\(\mathsf{finalize}\)
boolean as desired (if more issuance actions are to be created for this
\(\mathsf{AssetBase}\!\)
, set
\(\mathsf{finalize} = 0\!\)
, otherwise set
\(\mathsf{finalize} = 1\!\)
).
for each recipient
\(i\)
:
generate a ZSA output note that includes the Asset Base. For an Orchard-ZSA note this is
\(\mathsf{note}_i = (\mathsf{d}_i, \mathsf{pk}_{\mathsf{d}_i}, \mathsf{v}_i, \text{ρ}_i, \mathsf{rseed}_i, \mathsf{AssetBase}, \mathsf{rcm}_i)\!\)
.
encode the IssueAction into the vector vIssueActions of the bundle.
For the IssueBundle:
encode the vIssueActions vector.
encode the
\(\mathsf{ik}\)
as 32 byte-string.
sign the SIGHASH transaction hash with the issuance authorizing key,
\(\mathsf{isk}\!\)
, using the
\(\mathsf{IssueAuthSig}\)
signature scheme. The signature is then added to the issuance bundle.
Note: that the commitment is not included in the IssuanceAction itself. As explained below, it is computed later by the validators and added to the note commitment tree.
Specification: Consensus Rule Changes
For the IssueBundle:
Validate the issuance authorization signature,
\(\mathsf{issueAuthSig}\!\)
, on the SIGHASH transaction hash,
\(\mathsf{SigHash}\!\)
, by invoking
\(\mathsf{IssueAuthSig}.\!\mathsf{Validate}(\mathsf{ik}, \mathsf{SigHash}, \mathsf{issueAuthSig})\!\)
.
For each IssueAction in IssueBundle:
check that
\(0 < \mathtt{assetDescSize} \leq 512\!\)
.
check that
\(\mathsf{asset\_desc}\)
is a string of length
\(\mathtt{assetDescSize}\)
bytes.
retrieve
\(\mathsf{AssetBase}\)
from the first note in the sequence and check that
\(\mathsf{AssetBase}\)
is derived from the issuance validating key
\(\mathsf{ik}\)
and
\(\mathsf{asset\_desc}\)
as described in the Specification: Asset Identifier section.
check that
\(\mathsf{issued\_assets(AssetBase).final} \neq 1\)
in the global state.
check that every note in the IssueAction contains the same
\(\mathsf{AssetBase}\)
and is properly constructed as
\(\mathsf{note} = (\mathsf{g_d}, \mathsf{pk_d}, \mathsf{v}, \text{ρ}, \mathsf{rseed}, \mathsf{AssetBase})\!\)
.
If all of the above checks pass, do the following:
For each note,
compute the note commitment as
\(\mathsf{cm} = \mathsf{NoteCommit^{OrchardZSA}_{rcm}}(\mathsf{repr}_{\mathbb{P}}(\mathsf{g_d}), \mathsf{repr}_{\mathbb{P}}(\mathsf{pk_d}), \mathsf{v}, \text{ρ}, \text{ψ}, \mathsf{AssetBase})\)
as defined in the Note Structure and Commitment section of ZIP 226 11.
Add
\(\mathsf{cm}\)
to the Merkle tree of note commitments.
Increase the value of
\(\mathsf{issued\_assets(AssetBase).balance}\)
by the value of the note,
\(\mathsf{v}\)
.
If
\(\mathsf{finalize} = 1\!\)
, set
\(\mathsf{issued\_assets(AssetBase).final}\)
to
\(1\)
in the global state.
(Replay Protection) If issue bundle is present, the fees MUST be greater than zero.
Rationale
The following is a list of rationale for different decisions made in the proposal:
The issuance key structure is independent of the original key tree, but derived in an analogous manner (via ZIP 32). This is in order to keep the issuance details and the Asset Identifiers consistent across multiple shielded pools.
The design decision is not to have a chosen name to describe the Custom Asset, but to delegate it to an off-chain mapping, as this would imply a land-grab “war”.
The
\(\mathsf{asset\_desc}\)
is a general byte string in order to allow for a wide range of information type to be included that may be associated with the Assets. Some are:
links for storage such as for NFTs.
metadata for Assets, encoded in any format.
bridging information for Wrapped Assets (chain of origin, issuer name, etc)
information to be committed by the issuer, though not enforceable by the protocol.
We limit the size of the
\(\mathsf{asset\_desc}\)
string to 512 bytes as it is a reasonable size to store metadata about the Asset, for example in JSON format.
We require non-zero fees in the presence of an issue bundle, in order to preclude the possibility of a transaction containing only an issue bundle. If a transaction includes only an issue bundle, the SIGHASH transaction hash would be computed solely based on the issue bundle. A duplicate bundle would have the same SIGHASH transaction hash, potentially allowing for a replay attack.
Concrete Applications
Asset Features
By using the
\(\mathsf{finalize}\)
boolean and the burning mechanism defined in 10, issuers can control the supply production of any Asset associated to their issuer keys. For example,
by setting
\(\mathsf{finalize} = 1\)
from the first issuance action for that Asset Identifier, the issuer is in essence creating a one-time issuance transaction. This is useful when the max supply is capped from the beginning and the distribution is known in advance. All tokens are issued at once and distributed as needed.
Issuers can also stop the existing supply production of any Asset associated to their issuer keys. This could be done by
issuing a last set of tokens of that specific
\(\mathsf{AssetId}\!\)
, for which
\(\mathsf{finalize} = 1\!\)
, or by
issuing a transaction with a single note in the issuance action pertaining to that
\(\mathsf{AssetId}\!\)
, where the note will contain a
\(\mathsf{value} = 0\!\)
. This can be used for application-specific purposes (NFT collections) or for security purposes to revoke the Asset issuance (see Security and Privacy Considerations).
The issuance and burn mechanisms can be used in conjunction to determine the supply of Assets on the Zcash ecosystem. This allows for the bridging of Assets defined on other chains.
Furthermore, NFT issuance is enabled by issuing in a single bundle several issuance actions, where each
\(\mathsf{AssetId}\)
corresponds to
\(\mathsf{value} = 1\)
at the fundamental unit level. Issuers and users should make sure that
\(\mathsf{finalize} = 1\)
for each of the actions in this scenario.
TxId Digest - Issuance
This section details the construction of the subtree of hashes in the transaction digest that corresponds to issuance transaction data. Details of the overall changes to the transaction digest due to the Orchard-ZSA protocol can be found in ZIP 226 12. As in ZIP 244 15, the digests are all personalized BLAKE2b-256 hashes, and in cases where no elements are available for hashing, a personalized hash of the empty byte array is used.
A new issuance transaction digest algorithm is defined that constructs the subtree of the transaction digest tree of hashes for the issuance portion of a transaction. Each branch of the subtree will correspond to a specific subset of issuance transaction data. The overall structure of the hash is as follows; each name referenced here will be described in detail below:
In case the transaction has no issuance components, ''issuance_digest'' is:
BLAKE2b-256("ZTxIdSAIssueHash", [])
T.5a: issue_actions_digest
A BLAKE2b-256 hash of Issue Action information for all Issuance Actions belonging to the transaction. For each Action, the following elements are included in the hash:
In case the transaction has no Issue Notes, ''issue_notes_digest'' is:
BLAKE2b-256("ZTxIdIAcNoteHash", [])
T.5a.i.1: recipient
This is the raw encoding of an Orchard shielded payment address as defined in the protocol specification 24.
T.5a.i.2: value
Note value encoded as little-endian 8-byte representation of 64-bit unsigned integer (e.g. u64 in Rust) raw value.
T.5a.i.3: assetBase
Asset Base encoded as the 32-byte representation of a point on the Pallas curve.
T.5a.i.4: rho
Nullifier encoded as 32-byte representation of a point on the Pallas curve.
T.5a.i.5: rseed
The ZIP 212 32-byte seed randomness for a note.
T.5a.ii: assetDescription
The Asset description byte string.
T.5a.iii: flagsIssuance
An 8-bit value representing a set of flags. Ordered from LSB to MSB:
\(\mathsf{finalize}\)
The remaining bits are set to 0!.
T.5b: issuanceValidatingKey
A byte encoding of issuance validating key for the bundle as defined in the Issuance Key Derivation section.
Signature Digest
The per-input transaction digest algorithm to generate the signature digest in ZIP 244 16 is modified so that a signature digest is produced for each transparent input, each Sapling input, each Orchard action, and additionally for each Issuance Action. For Issuance Actions, this algorithm has the exact same output as the transaction digest algorithm, thus the txid may be signed directly.
The overall structure of the hash is as follows. We highlight the changes for the Orchard-ZSA protocol via the [ADDED FOR ZSA] text label, and we omit the descriptions of the sections that do not change for the Orchard-ZSA protocol:
The personalization field remains the same as in ZIP 244 15.
S.5: issuance_digest
Identical to that specified for the transaction identifier.
Authorizing Data Commitment
The transaction digest algorithm defined in ZIP 244 17 which commits to the authorizing data of a transaction is modified by the Orchard-ZSA protocol to have the following structure. We highlight the changes for the Orchard-ZSA protocol via the [ADDED FOR ZSA] text label, and we omit the descriptions of the sections that do not change for the Orchard-ZSA protocol:
The pair (Transaction Identifier, Auth Commitment) constitutes a commitment to all the data of a serialized transaction that may be included in a block.
The personalization field of this hash remains the same as in ZIP 244.
A.4: issuance_auth_digest
In the case that Issuance Actions are present, this is a BLAKE2b-256 hash of the field encoding of the issueAuthSig field of the transaction:
A.4a: issueAuthSig (field encoding bytes)
The personalization field of this hash is set to:
"ZTxAuthZSAOrHash"
In the case that the transaction has no Orchard Actions, issuance_auth_digest is
BLAKE2b-256("ZTxAuthZSAOrHash", [])
Security and Privacy Considerations
Displaying Asset Identifier information to users
Wallets need to communicate the names of the Assets in a non-confusing way to users, since the byte representation of the Asset Identifier would be hard to read for an end user. Possible solutions are provided in the Specification: Asset Identifier section.
Issuance Key Compromise
The design of this protocol does not currently allow for rotation of the issuance validating key that would allow for replacing the key of a specific Asset. In case of compromise, the following actions are recommended:
If an issuance validating key is compromised, the
\(\mathsf{finalize}\)
boolean for all the Assets issued with that key should be set to
\(1\)
and the issuer should change to a new issuance authorizing key, and issue new Assets, each with a new
\(\mathsf{AssetId}\!\)
.
Bridging Assets
For bridging purposes, the secure method of off-boarding Assets is to burn an Asset with the burning mechanism in ZIP 226 10. Users should be aware of issuers that demand the Assets be sent to a specific address on the Zcash chain to be redeemed elsewhere, as this may not reflect the real reserve value of the specific Wrapped Asset.
Other Considerations
Implementing Zcash Nodes
Although not enforced in the global state, it is RECOMMENDED that Zcash full validators keep track of the total supply of Assets as a mutable mapping
\(\mathsf{issuanceSupplyInfoMap}\)
from
\(\mathsf{AssetId}\)
to
\((\mathsf{totalSupply}, \mathsf{finalize})\)
in order to properly keep track of the total supply for different Asset Identifiers. This is useful for wallets and other applications that need to keep track of the total supply of Assets.
Fee Structures
The fee mechanism described in this ZIP will follow the mechanism described in ZIP 317 18.