Bitcoin Forum
May 11, 2024, 04:05:14 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Does repeatedly signing the same address weaken it?  (Read 157 times)
jubalix (OP)
Legendary
*
Offline Offline

Activity: 2618
Merit: 1022


View Profile WWW
January 05, 2018, 12:26:40 PM
Merited by ABCbits (1)
 #1

If you sign the same address repeatedly the security?

and/or if you sign messages with the same address priv key as well does this weaken the security

if so...by how much?





Admitted Practicing Lawyer::BTC/Crypto Specialist. B.Engineering/B.Laws

https://www.binance.com/?ref=10062065
The forum strives to allow free discussion of any ideas. All policies are built around this principle. This doesn't mean you can post garbage, though: posts should actually contain ideas, and these ideas should be argued reasonably.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715400314
Hero Member
*
Offline Offline

Posts: 1715400314

View Profile Personal Message (Offline)

Ignore
1715400314
Reply with quote  #2

1715400314
Report to moderator
1715400314
Hero Member
*
Offline Offline

Posts: 1715400314

View Profile Personal Message (Offline)

Ignore
1715400314
Reply with quote  #2

1715400314
Report to moderator
ranochigo
Legendary
*
Offline Offline

Activity: 2968
Merit: 4177



View Profile
January 05, 2018, 01:37:15 PM
Merited by ABCbits (3)
 #2

It does not, if your wallet creates the signature correctly.

When you spend the transaction/sign a message, you are giving out the public key only, together with the public key. The signatures are signed using ECDSA. As of now, the repeated signing of a signature using the private key does not weaken the address by any extent. However, it would be a different story if your client is flawed. If your client generates the same "K" value for each signature, it is possible to derive the private key using the public key. If quantum computing were to be more advanced, it can potentially break ECDSA.

I've had addresses which were used for more than 3 years, with 700+ transactions and nothing happened. I trust ECDSA to be safe enough, at least for now. The only concerns regarding address reuse is privacy.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
jubalix (OP)
Legendary
*
Offline Offline

Activity: 2618
Merit: 1022


View Profile WWW
January 06, 2018, 09:06:07 AM
 #3

It does not, if your wallet creates the signature correctly.

When you spend the transaction/sign a message, you are giving out the public key only, together with the public key. The signatures are signed using ECDSA. As of now, the repeated signing of a signature using the private key does not weaken the address by any extent. However, it would be a different story if your client is flawed. If your client generates the same "K" value for each signature, it is possible to derive the private key using the public key. If quantum computing were to be more advanced, it can potentially break ECDSA.

I've had addresses which were used for more than 3 years, with 700+ transactions and nothing happened. I trust ECDSA to be safe enough, at least for now. The only concerns regarding address reuse is privacy.

Thanks!

Admitted Practicing Lawyer::BTC/Crypto Specialist. B.Engineering/B.Laws

https://www.binance.com/?ref=10062065
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!