7. Alice spends her bitcoin using the following bitcoin script:
S^k OP_DUP OP_MUL n OP_MOD
OP,
Thanks for sharing. Maybe I'm missing something, but other than implementation challenges, I suspect this scheme is vulnerable to miner theft as once it goes to the mempool, miners can take it and replace the output with theirs. It is because the transaction is not signed, hence forgery is not prohibited.