-
IMA MultiSig issue - Binance has a solution that splits the primary key (Binance threshold ECDSA). Need to investigate and see if there is anything applicable to us.
┆Issue is synchronized with thi…
-
Hey! Thanks for maintaining `rust-tuf` :) I'm [trying this library out] with the Sigstore TUF instance, evaluating if we can replace [`tough`](https://github.com/awslabs/tough) in our Sigstore client.…
-
I am working on a small proof of concept ([code](https://github.com/tnunamak/multisig-decrypt-demo/blob/main/main.go)) and would appreciate any suggestions for further debugging. My goal is to use DKG…
-
Amazing library. We really love it. For work, we can't use the Signing function, instead we need to generate a valid {t,n} threshold ecdsa (PublicKey, PrivateKey) pair. We can even ask `t` out of `n` …
-
## Overview
The Internet Computer implements a novel threshold ECDSA (tECDSA) protocol to produce chain-key signatures. In this protocol, the private ECDSA key is held in a secret-shared manner by …
-
Here are some resources I've managed to collect so far.
I'm not working on ECDSA-2P yet, but sharing this in case other people want to spend time on it.
2018 scaling bitcoin
a talk by lightnin…
-
![image](https://github.com/Cypherock/MPC-TSS/assets/19384581/d680e943-acd4-4420-be89-1954e97ed760)
Is sign time almost 40 seconds?
-
User's unfamiliar with Haskell and Cardano complain about incomprehensible error messages. For example:
![Screenshot 2023-08-22 at 16 58 35](https://github.com/input-output-hk/trustless-sidechain/ass…
-
Currently following scenarios are fully verified and tested:
- same set key rotation
- key handover (with new parties)
If a party is removed from the new committee resharing will be stuck at [`ro…
-
As part of our `tofino` design, the entropy threshold signature server is going to be run in a trusted execution environment. This is a proposed feature for attestation that validators have correctly…