You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on May 8, 2020. It is now read-only.
The current CoSi design requires that the holders of public keys used in a collective signature prove ownership of the corresponding private key, e.g., via a self-signed certificate, to ensure that a member of a collective signing group cannot pick a public key maliciously so as to cancel out the contributions of other, honest "victim" members of the collective signing group. This is currently discussed in section 8.5 "Related-Key Attacks" and mentioned more briefly earlier in the document.
However, there are ways to increase the signing scheme's robustness to such related-key attacks even if parties relying on the collective signatures do not check self-signed certificates for all members of a collective signing group: see for example "Schnorr Multisignatures for Bitcoin" by @sipa. There are multiple such potential related-key-attack-hardening designs to be considered, with different tradeoffs. Perhaps the main discussion should be held on the CFRG mailing list if/when collective signing becomes a CFRG WG item, but further thoughts and other relevant background references are welcome here as well.
The current CoSi design requires that the holders of public keys used in a collective signature prove ownership of the corresponding private key, e.g., via a self-signed certificate, to ensure that a member of a collective signing group cannot pick a public key maliciously so as to cancel out the contributions of other, honest "victim" members of the collective signing group. This is currently discussed in section 8.5 "Related-Key Attacks" and mentioned more briefly earlier in the document.
However, there are ways to increase the signing scheme's robustness to such related-key attacks even if parties relying on the collective signatures do not check self-signed certificates for all members of a collective signing group: see for example "Schnorr Multisignatures for Bitcoin" by @sipa. There are multiple such potential related-key-attack-hardening designs to be considered, with different tradeoffs. Perhaps the main discussion should be held on the CFRG mailing list if/when collective signing becomes a CFRG WG item, but further thoughts and other relevant background references are welcome here as well.
See also bford/golang-x-crypto#1 by @prusnak