ZIP: 325
Title: Account Metadata Keys
Owners: Jack Grigg <jack@electriccoin.co>
        Daira-Emma Hopwood <daira@electriccoin.co>
        Kris Nuttycombe <kris@electriccoin.co>
Status: Draft
Category: Standards / Wallet
Created: 2025-02-18
License: MIT

Terminology

The key words “MUST NOT”, “SHOULD”, and “MAY” in this document are to be interpreted as described in BCP 14 1 when, and only when, they appear in all capitals.

Abstract

This ZIP specifies the key tree for Account Metadata Keys. These are derived from the same seed as a ZIP 32 2 account, and can be used by wallets to derive encryption keys for local / off-chain metadata.

Motivation

A wallet’s main data source is the Zcash chain: from this it can detect notes received by an account, determine whether those notes are spent, build witnesses for spending, recover on-chain memo data, and so on. However, wallets also generate significant quantities of off-chain metadata as they are used, such as:

This metadata is valuable to users, and highly desirable to ensure to be backed up. If the user’s device is wiped or lost and the user recovers their wallet from a backed-up mnemonic phrase, they will lose all of this metadata if it is not stored somewhere.

For other kinds of mobile device data, it is expected by users that their device’s normal backup storage will have saved (most of) their data, such that access to e.g. the associated Apple or Google account will be sufficient for data recovery. However, metadata such as mappings between Zcash addresses and recipient names can be particularly sensitive, meaning that users may not want these to be backed up unencrypted in their device’s normal backup storage. Similarly, the inability to alter on-chain data means that permanently storing metadata in transaction memo fields may also not be an option.

Additionally, it is currently the case that users only need to back up a single secret (a mnemonic seed phrase), once, in order to recover all information for accounts derived from that secret. If metadata were encrypted using independent key material, these keys would also need to be backed up, leading to fragility of wallet restoration.

Requirements

Specification

Metadata key tree

This ZIP registers the following ZIP 32 Registered Key Derivation 3 tree:

The tree has the following general structure, specified in more detail below:

Non-leaf keys in the key tree MUST NOT be used directly to encrypt metadata. Encryption keys are leaves in this key tree. The sole exception to this is private-use keys (for which part of their key derivation is outside the scope of this specification): encryption keys MAY be derived from the private-use key leaves.

Account Metadata Key

The Account Metadata Key is the root of a subtree that corresponds to a ZIP 32 account represented elsewhere in the overall tree. It is derived from the seed \(\mathsf{S}\) as:

\(\mathsf{AccountMetadataKey} = \mathsf{CKDreg}(\mathsf{CKDreg}(\mathsf{RegKD}(\texttt{“MetadataKeys”}, \mathsf{S}, 325), \mathsf{coinType}, [\,]), \mathsf{account}, [\,])\)

or, in path notation:

m_metadata / 325' / coin_type' / account'

Inherent metadata keys

The Account-level Inherent Metadata Key’s subtree contains keys used for metadata associated with the Account Metadata Key’s corresponding account. The key is derived as:

\(\mathsf{CKDreg}(\mathsf{AccountMetadataKey}, 0, [\,])\)

External metadata keys

The Account-level External Metadata Key’s subtree contains keys used for metadata associated with imported UFVKs. Unlike the inherent metadata keys which can leverage the inherent domain separation provided by the account index, here domain separation between metadata keys is provided by the UFVKs themselves.

As UFVKs may in general change over time (due to the inclusion of new higher-preference FVK items, or removal of older deprecated FVK items), there is no guarantee that the exact same set of FVK items will be present at both backup creation time and recovery time. Instead, the most preferred FVK item within a UFVK is used as the domain in which keys can be generated, and the Imported UFVK Metadata Key is derived as:

\(\mathsf{CKDreg}(\mathsf{CKDreg}(\mathsf{AccountMetadataKey}, 1, [\,]), 0, \mathsf{FVKTypedItem})\)

where \(\mathsf{FVKTypedItem}\) is the encoding of the most preferred FVK item within the ZIP 316 raw encoding of a UFVK. 4

Usage of the Imported UFVK Metadata Key trees SHOULD follow ZIP 316 preference order: 4

Standardised metadata protocols

The following metadata protocols have been standardised:

The remaining range of child indices from 0 to \(\texttt{0x7FFFFFFE}\) inclusive are reserved for future updates to this ZIP. Wallet developers can propose new standardised metadata protocols by writing a 2000-series ZIP that specifies the protocol as an update to this ZIP.

Private-use metadata keys

In some contexts there is a need for deriving ad-hoc key trees for private use by wallets, without ecosystem coordination and without any kind of compatibility guarantees. This ZIP reserves child index \(\mathtt{0x7FFFFFFF}\) (the maximum valid hardened child index) within its key tree for this purpose.

:::warning It is the responsibility of wallet developers to ensure that they do not use colliding \(\mathsf{PrivateUseSubject}\) values, and to analyse their private use for any security risks related to potential cross-protocol attacks (in the event that two wallet developers happen to select a colliding \(\mathsf{PrivateUseSubject}\)). Wallet developers that are unwilling to accept these risks SHOULD propose new standardised metadata protocols instead, to benefit from ecosystem coordination and review. :::

Reference implementation

References


  1. Information on BCP 14 — “RFC 2119: Key words for use in RFCs to Indicate Requirement Levels” and “RFC 8174: Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words”  ↩︎

  2. ZIP 32: Shielded Hierarchical Deterministic Wallets  ↩︎

  3. ZIP 32: Shielded Hierarchical Deterministic Wallets, Section: Registered key derivation  ↩︎

  4. ZIP 316: Unified Addresses and Unified Viewing Keys  ↩︎