Bitcoin Forum
May 11, 2024, 09:55:49 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Shared K in multisig?  (Read 216 times)
trisel (OP)
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
February 25, 2020, 08:41:20 PM
 #1

Now in each signature we have to specify r and s explicitly. What about choosing some "shared K value" and calculate it as kValueA*kValueB*...*kValueZ*basePoint? In this way all parties can agree on the same r and safely exchange partial s values defined as "(z+r*privKeyA)/kValueA", "(z+r*privKeyB)/kValueB", etc. Then, everyone have to divide received value by its chosen part of K and in result everyone can receive sA="(z+r*privKeyA)/(kValueA*kValueB*...*kValueZ)", sB="(z+r*privKeyB)/(kValueA*kValueB*...*kValueZ)", ..., sZ and include it in the final transaction.
1715464549
Hero Member
*
Offline Offline

Posts: 1715464549

View Profile Personal Message (Offline)

Ignore
1715464549
Reply with quote  #2

1715464549
Report to moderator
1715464549
Hero Member
*
Offline Offline

Posts: 1715464549

View Profile Personal Message (Offline)

Ignore
1715464549
Reply with quote  #2

1715464549
Report to moderator
1715464549
Hero Member
*
Offline Offline

Posts: 1715464549

View Profile Personal Message (Offline)

Ignore
1715464549
Reply with quote  #2

1715464549
Report to moderator
If you want to be a moderator, report many posts with accuracy. You will be noticed.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715464549
Hero Member
*
Offline Offline

Posts: 1715464549

View Profile Personal Message (Offline)

Ignore
1715464549
Reply with quote  #2

1715464549
Report to moderator
dmitrygerasimov
Newbie
*
Offline Offline

Activity: 17
Merit: 2


View Profile
February 27, 2020, 08:20:49 AM
Merited by ABCbits (1), koch44 (1)
 #2

Thats a bad idea, would compromise security
ewaspiro
Member
**
Offline Offline

Activity: 74
Merit: 10


View Profile
March 01, 2020, 07:40:33 AM
 #3

Thats a bad idea, would compromise security

can you tell more?

If I dont reply to your PM means I dont want to have you send me more PMs
athanred
Newbie
*
Offline Offline

Activity: 8
Merit: 36


View Profile
March 01, 2020, 10:09:38 AM
Merited by ABCbits (2), hugeblack (1)
 #4

Quote
everyone have to divide received value by its chosen part of K
This is insecure, because when you know some number and you know number/K, then you can calculate someone else's K.

But even if all parties could agree on some K and create such signatures, it is still not enough, because you can still calculate someone else's private key.

sA=(z+r*privKeyA)/(kValueA*kValueB)
sB=(z+r*privKeyB)/(kValueA*kValueB)
sA/sB=(z+r*privKeyA)/(z+r*privKeyB)
privKeyA=(sA/sB-z)/r
privKeyB=(sB/sA-z)/r

Everyone knows sA, sB, z and r, so everyone can calculate anyone private key if you use the same K in both signatures.
dmitrygerasimov
Newbie
*
Offline Offline

Activity: 17
Merit: 2


View Profile
April 02, 2020, 09:17:02 AM
 #5

Thats a bad idea, would compromise security

can you tell more?

mathematically developed functions can calculate and backward engineer a multisig with same K to steal funds without multisig as you would be able to recover the private key from the others in the multisig wallet.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!