Skip to content
This repository was archived by the owner on May 8, 2020. It is now read-only.
This repository was archived by the owner on May 8, 2020. It is now read-only.

cosi: consider delinearization schemes to increase robustness to related-key attacks #1

@bford

Description

@bford

The current CoSi design requires that the holders of public keys used in a collective signature prove ownership of the corresponding private key, e.g., via a self-signed certificate, to ensure that a member of a collective signing group cannot pick a public key maliciously so as to cancel out the contributions of other, honest "victim" members of the collective signing group. This is currently discussed in section 8.5 "Related-Key Attacks" and mentioned more briefly earlier in the document.

However, there are ways to increase the signing scheme's robustness to such related-key attacks even if parties relying on the collective signatures do not check self-signed certificates for all members of a collective signing group: see for example "Schnorr Multisignatures for Bitcoin" by @sipa. There are multiple such potential related-key-attack-hardening designs to be considered, with different tradeoffs. Perhaps the main discussion should be held on the CFRG mailing list if/when collective signing becomes a CFRG WG item, but further thoughts and other relevant background references are welcome here as well.

See also bford/golang-x-crypto#1 by @prusnak

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions