Bitcoin Forum
November 05, 2024, 08:57:22 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Shared K in multisig?  (Read 231 times)
trisel (OP)
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
February 25, 2020, 08:41:20 PM
 #1

Now in each signature we have to specify r and s explicitly. What about choosing some "shared K value" and calculate it as kValueA*kValueB*...*kValueZ*basePoint? In this way all parties can agree on the same r and safely exchange partial s values defined as "(z+r*privKeyA)/kValueA", "(z+r*privKeyB)/kValueB", etc. Then, everyone have to divide received value by its chosen part of K and in result everyone can receive sA="(z+r*privKeyA)/(kValueA*kValueB*...*kValueZ)", sB="(z+r*privKeyB)/(kValueA*kValueB*...*kValueZ)", ..., sZ and include it in the final transaction.
dmitrygerasimov
Newbie
*
Offline Offline

Activity: 17
Merit: 2


View Profile
February 27, 2020, 08:20:49 AM
Merited by ABCbits (1), koch44 (1)
 #2

Thats a bad idea, would compromise security
ewaspiro
Member
**
Offline Offline

Activity: 74
Merit: 10


View Profile
March 01, 2020, 07:40:33 AM
 #3

Thats a bad idea, would compromise security

can you tell more?

If I dont reply to your PM means I dont want to have you send me more PMs
athanred
Newbie
*
Offline Offline

Activity: 10
Merit: 37


View Profile
March 01, 2020, 10:09:38 AM
Merited by ABCbits (2), hugeblack (1)
 #4

Quote
everyone have to divide received value by its chosen part of K
This is insecure, because when you know some number and you know number/K, then you can calculate someone else's K.

But even if all parties could agree on some K and create such signatures, it is still not enough, because you can still calculate someone else's private key.

sA=(z+r*privKeyA)/(kValueA*kValueB)
sB=(z+r*privKeyB)/(kValueA*kValueB)
sA/sB=(z+r*privKeyA)/(z+r*privKeyB)
privKeyA=(sA/sB-z)/r
privKeyB=(sB/sA-z)/r

Everyone knows sA, sB, z and r, so everyone can calculate anyone private key if you use the same K in both signatures.
dmitrygerasimov
Newbie
*
Offline Offline

Activity: 17
Merit: 2


View Profile
April 02, 2020, 09:17:02 AM
 #5

Thats a bad idea, would compromise security

can you tell more?

mathematically developed functions can calculate and backward engineer a multisig with same K to steal funds without multisig as you would be able to recover the private key from the others in the multisig wallet.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!