Computing on Bitcoin #77
February 20, 2026 - Week 08

Welcome to a new edition of Computing on Bitcoin News!
Each week we bring deeper updates that are pushing the boundaries of what can be expressed while preserving Bitcoin’s minimal and robust base layer.

Let's dive in.

01

Oleksandr Kurbatov published a detailed follow-up on BLISK (Boolean circuit Logic Integrated into the Single Key), describing a proof-of-concept framework that compiles monotone boolean authorization policies into a single Schnorr verification key. The proposal combines MuSig2, ECDH, and NIZK proofs to enable structured policies like (A ∨ B) ∧ (C ∨ D) while preserving a single on-chain key and signature.

delvingbitcoin.org
🔗 BLISK: Boolean circuit Logic Integrated into the Single Key

We built a PoC framework that compiles a monotone boolean policy (AND/OR logic) over users’ long-term keys into a single signature verification key (one EC point). On-chain part remains boring: verification of one Schnorr signature against one key. All the policy “drama” happens off-chain.

02

Bitfinity published a technology overview describing its 2026 blockchain privacy stack, including layers for private transactions, selective disclosure, and on-chain confidentiality tooling. The post situates these components in context with broader ecosystem trends, noting how privacy primitives may interface with systems like BitVM-anchored L2s and other Bitcoin-focused construction patterns.

blog.bitfinity.network
🔗 The Technology Stack Powering Blockchain Privacy in 2026

For a while, the majority of blockchain networks have operated like a 'glass house', where every transaction on them has always been fully visible. To many of these networks, privacy has often been viewed as optional or a nice-to-have feature.
But as more of the world's finance comes on-chain, privacy is no longer an option; it is a requirement. To meet this requirement, the last few years have been characterised by several improvements in blockchain.

03

Nadav Kohen of Chaincode Labs introduced NestedMuSig2, a recursive extension of MuSig2 that enables trees of aggregated cosigners to generate BIP340 Schnorr signatures while preserving indistinguishability and non-interactive key aggregation. The paper provides a security reduction to the AOMDL assumption in the random oracle model, formalizing the safety of nesting MuSig2 keys in higher-level constructions.

eprint.iacr.org
🔗 Nested MuSig2

Bitcoin Improvement Proposal 327 specifies a variant of the MuSig2 multi-signature protocol that is becoming widely adopted in Bitcoin applications. This protocol enables multiple participants to collaboratively compute (BIP 340) Schnorr signatures for a single aggregate public key efficiently, while preventing external parties from distinguishing whether multiple signers were involved.

As advances strengthen the toolkit available to builders designing secure, scalable, and verifiable systems on top of Bitcoin, we’ll continue tracking the research and implementations shaping this evolution.

See you next week!

-The Fairgate Team