-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xaddd158c9356b53616dbca3a7f6f2e63bbe511da1dc3456403cebec50c3e76c3
**Severity:** medium
**Description:**
**Descriptio…
-
Hi,
I've been digging into the code for the past week but I couldn't find if you're actually using the threshold signature scheme.
I couldn't find the distribution of the partial signatures and …
-
Hello. I was using the program and observed some possible issues in `crypto/bls12/bls12/go`.
Namely, the methods `CreateThresholdSignature()` and `VerifyThresholdSignature()` actually create (and v…
-
This task aims to define the testing plan for assuring the quality of the project's cryptographic components.
### Goals:
Since cryptographic code is often difficult to test, we should design our t…
-
Is Threshold MPC signatures or MPC secret computing considered as fancy?
-
I believe the most advanced threshold signature implementation is https://github.com/poanetwork/threshold_crypto but they do not provide our abstractions, and one should optimize the arithmetic ala ht…
-
It's said in readme that BLS can be used well for threshold signatures, with link to article that describes how it works cryptographically.
However I couldn't find how to do it using noble-curves. Is…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x33551783c3c3753e4436143823b03dcdd07a24798b7e41aff963bddcaa875531
**Severity:** medium
**Description:**
**Descriptio…
-
This is not the highest priority task, but it is relatively straightforward and can also be good for testing the overall system.
https://www.cc.gatech.edu/~aboldyre/papers/bold.pdf
-
### Description
Depends on https://github.com/hyperledger/cactus/issues/296
As a maintainer I want us to have a unified crypto interface for threshold signatures so that it can be re-used in the…