You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
During the private shares step, all signers will compute a private share representing the evaluation of their polynomial f(X) at a scalar i and then encrypt it for another signer. This is done by first computing a shared secret using elliptic curve Diffie-Hellman and then using a custom key derivation scheme to derive a key to be used by the symmetric encryption scheme. However, this protocol is not documented and appears to be a custom creation. Since this key-exchange, key derivation and encryption protocol has not been analyzed, and other protocols using very similar elements have been analyzed and provide security guarantees, there is an unnecessary risk being taken that could be eliminated.
The text was updated successfully, but these errors were encountered:
During the private shares step, all signers will compute a private share representing the evaluation of their polynomial f(X) at a scalar i and then encrypt it for another signer. This is done by first computing a shared secret using elliptic curve Diffie-Hellman and then using a custom key derivation scheme to derive a key to be used by the symmetric encryption scheme. However, this protocol is not documented and appears to be a custom creation. Since this key-exchange, key derivation and encryption protocol has not been analyzed, and other protocols using very similar elements have been analyzed and provide security guarantees, there is an unnecessary risk being taken that could be eliminated.
The text was updated successfully, but these errors were encountered: