I've been puzzling over your email since receiving it. I'm not sure itis possible to perform the attack you describe with the tree structurespecified in the BIP. If I may rephrase your attack, I believe you areseeking a solution to the following:Want: An innocuous script and a malign script for whichdouble-SHA256(innocuous)is equal to eitherfast-SHA256(double-SHA256(malign) || r) or fast-SHA256(r || double-SHA256(malign))
where r is a freely chosen 32-byte nonce. This would allow theattacker to reveal the innocuous script before funds are sent to theMAST, then use the malign script to spend.Because of the double-SHA256 construction I do not see how this can beaccomplished without a full break of SHA256.