You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi @briancrypto ,
There is no security issue here, In ECDSA we used multiplicative update because the 2 party protocol in the paper we implemented dictated multiplicative sharing of the private key. In fact, The paper could have been written using additive secret sharing and work fine.
For the same reason - we use additive updates in Schnorr, since the protocol is based on additive secret sharing.
Hi,
I noticed the formula used to generate public key in HD Wallet for ECDSA and Schnorr is slightly different.
In ECDSA, it is link to code
let pub_key = pubkey * &f_l_fe;
In Schnorr, it is link to code
let pub_key = pubkey.clone() + &g * &f_l_fe;
Is there some security issue hence the need to multiply the Schnorr public key with generator?
Thanks!
The text was updated successfully, but these errors were encountered: