-
I suggest adding shamir's secret sharing scheme as described [Satoshi Labs's SLIP0039](https://github.com/satoshilabs/slips/blob/master/slip-0039.md)
My idea is to introduce command that generates …
-
**Summary**
A vulnerability has been identified in the Shamir Secret Sharing Scheme implementation. The reconstruction process yields plausible but incorrect results when shares are corrupted, indica…
-
**Research Context:**
We're exploring security enhancements for our web3-based wallet platform using Shamir's Secret Sharing scheme. Our primary objective is to prevent the platform from having dir…
-
> Shamir's Secret Sharing is an algorithm in cryptography created by Adi Shamir. It is a form of secret sharing, where a secret is divided into parts, giving each participant its own unique part. To r…
-
Under the current scheme, only two backups need to be compromised for someone to gain access to the encrypted data. We _could_ require 3 or more people to collaborate to decrypt a backup. This would b…
-
At the moment, threshold scheme(threshold signature scheme, threshold secret scheme) is the key component of ABFT consensus algorithm. We need to figure out the details and choose one solution.
Som…
-
There are a few *secure* ways of generating a new share at a given index for a new party. This is useful for "repairing" a device that has lost its share or for "enrolling" a new party with a never be…
-
Clarify whether having `MPCProtocol` be generic over a secret-shared number with an associated type makes sense for the kinds of MPC protocols we want to support.
-
This is a placeholder issue for tracking this topic.
## Why
Publishing updates is important.
Being able to do it without dependency on censorable DNS, or paying for Gas to some blockchain gro…
-
The message header format defines the primary artifact that OnEncrypt produced as "Encrypted Data Keys". Not all encryption schemes will need to literally create only multiple encrypted copies of the …