📢 Gate Square Exclusive: #WXTM Creative Contest# Is Now Live!
Celebrate CandyDrop Round 59 featuring MinoTari (WXTM) — compete for a 70,000 WXTM prize pool!
🎯 About MinoTari (WXTM)
Tari is a Rust-based blockchain protocol centered around digital assets.
It empowers creators to build new types of digital experiences and narratives.
With Tari, digitally scarce assets—like collectibles or in-game items—unlock new business opportunities for creators.
🎨 Event Period:
Aug 7, 2025, 09:00 – Aug 12, 2025, 16:00 (UTC)
📌 How to Participate:
Post original content on Gate Square related to WXTM or its
In-depth analysis of DLC technology principles and discussion of optimization solutions
Discussion on DLC Technology Principles and Optimization Solutions
1. Overview
Discrete Log Contracts ( DLC ) is a contract execution scheme based on oracles proposed by MIT's Tadge Dryja in 2018. DLC allows both parties to make conditional payments based on predefined conditions, executing payments through pre-signatures and oracle-signed results. Compared to the Lightning Network, DLC has significant advantages in terms of privacy, support for complex financial contracts, and reduced counterparty risk.
Although DLC has broad application prospects in the Bitcoin ecosystem, there are still some issues to be resolved, such as key security, oracle decentralization, and fixed denomination change. This article will analyze the principles of DLC and propose some optimization solutions.
2. How DLC Works
Taking Alice and Bob betting on the parity of the hash value of the n+k-th block as an example, the basic process of DLC is as follows:
Each party generates a key pair: Oracle (z, Z), Alice (x, X), Bob (y, Y)
Alice and Bob create a 2-of-2 multi-signature funding transaction, each locking 1 BTC.
Create two contract execution transactions (CET), for the expenditure of capital injection transaction.
The oracle generates commitments R and S, S'
Alice and Bob calculate the new public keys PK^Alice and PK^Bob
The oracle broadcasts s or s' based on the parity of the block hash value.
The winning party calculates the new private key to extract assets using s/s'.
3. DLC Optimization Plan
3.1 Key Management
The leakage or loss of the oracle private key and random number can lead to various security issues. It is recommended to adopt the following measures:
3.2 Decentralized Oracle
Implementing decentralized oracles using Schnorr threshold signatures offers the following advantages:
3.3 Decentralization and Key Management Coupling
In a decentralized scenario, the complete private key does not exist, and it cannot be directly used to derive from BIP32. A distributed key derivation method can be adopted, utilizing Lagrange interpolation polynomials to establish the correspondence between private key shares and the complete private key.
3.4 OP-DLC: Trust-minimized Oracles
Introduce an optimistic challenge mechanism, where oracles need to stake in advance. Any honest participant can challenge a malicious oracle, and winning the challenge can confiscate the malicious party's deposit.
3.5 OP-DLC + BitVM Double Bridge
Combine OP-DLC and BitVM to solve the problem of fixed denomination change in DLCs, achieving arbitrary granularity of change and improving capital liquidity.
4. Conclusion
DLC technology combined with Taproot, BitVM, and others can achieve more complex off-chain contract verification and settlement. Through the OP challenge mechanism, it can minimize oracle trust, laying the foundation for the widespread application of DLC.