Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Erik Aronesty via bitcoin-dev
- Adaptive r choice shouldn't be possible since r is derived from the original threshold prf and it's not possible for a party to have any adaptive impact on the value of r - I'm guess I don't see how an attacker can use adaptive key choice in this context either. Any modification of the key sh

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Gregory Maxwell via bitcoin-dev
On Mon, Jul 9, 2018 at 4:33 PM, Erik Aronesty wrote: >>> with security assumptions that match the original Schnorr construction more >>> closely, >> More closely than what? > More closely than musig. Musig is instructions on using the original schnorr construction for multiparty signing which is

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Dan Robinson via bitcoin-dev
Can you please clarify which terms in that description are elliptic curve points, and which are scalars? On Mon, Jul 9, 2018 at 11:10 AM Erik Aronesty via bitcoin-dev < bitcoin-dev@lists.linuxfoundation.org> wrote: > Actually, it looks like in order to compute a multiparty signature you > will nee

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Erik Aronesty via bitcoin-dev
> More closely than what? More closely than musig. In fact there's no need to distribute the hash at all if you have the first round, you can leave the schnorr construction... thanks for the feedback. I literally can't think about this stuff without someone asking questions. 1. For those who ask

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Gregory Maxwell via bitcoin-dev
On Mon, Jul 9, 2018 at 3:02 PM, Erik Aronesty via bitcoin-dev wrote: > and where H(g*x) can > be considered their public index for the purposes of Shamir polynomial > interpolation This is isomorphic to the insecure musig variant where keys are blinded by H(g*x) instead of a commitment to all key

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Gregory Maxwell via bitcoin-dev
On Mon, Jul 9, 2018 at 3:02 PM, Erik Aronesty via bitcoin-dev wrote: > with > security assumptions that match the original Schnorr construction more > closely, More closely than what? ___ bitcoin-dev mailing list bitcoin-dev@lists.linuxfoundation.org ht

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Erik Aronesty via bitcoin-dev
Actually, it looks like in order to compute a multiparty signature you will need to broadcast shares of r first, so it's not offline :( It is still seems, to me, to be a simpler mechanism than musig - with security assumptions that match the original Schnorr construction more closely, and should t

Re: [bitcoin-dev] Multiparty signatures

2018-07-09 Thread Erik Aronesty via bitcoin-dev
Because it's non-interactive, this construction can produce multisig signatures offline. Each device produces a signature using it's own k-share and x-share. It's only necessary to interpolate M of n shares. There are no round trips. The security is Shamir + discrete log. it's just something

Re: [bitcoin-dev] BIP sighash_noinput

2018-07-09 Thread Peter Todd via bitcoin-dev
On Tue, Jul 03, 2018 at 11:45:22PM +, Gregory Maxwell wrote: > On Tue, Jul 3, 2018 at 5:21 AM, Peter Todd wrote: > > The problem with that name is `SIGHASH_REUSE_VULNERABLE` tells you nothing > > about what the flag actually does. > > I believe that making the signature replayable is 1:1 with