-
> In practice, p should be reasonably large. Breaking S into multiple parts introduces complexity and opportunities for malicious actors. Also, in some verifiable secret sharing schemes, a large p is …
-
It would be useful to mark or italicize the initial words "tuna acid epic gyro" as these are the same for all SSKRs. This means that these can be left off of metal plates that archive the remainin…
-
Hey @fresheneesz --
One area I've been thinking a fair bit about lately is the master passphrase.
On generating the master passphrase, I found option 1 here on Trezor's blog pretty compelling to e…
-
Implement flows for enabling and disabling 2FA, including using recovery codes.
Implement login flow for 2FA. (This looks like "oauth success -> user requires 2fa, enter otp code -> on success cont…
-
## Description
To implement DKG and distributed private key management for BLS threshold cryptography
## Motivation
- IOTA Smart Contract security depends on the key management. Essentially, …
-
Ability to store encrypted encryption keys to be able to easily setup new client software.
Something like gpg encrypted file, stored in the cloud storage or ldap, that can be decrypted with a passphr…
-
Hello :)
I have read your paper and wanted to try out your implementation of Dijkstra's algorithm. The README mentions a test_graph.mpc file, however, it seems to be missing in this repository. Could…
-
We've had various interest in having a @RustCrypto implementation of ElGamal. This issue is intended for discussion and planning around how it should be implemented.
While there are existing implem…
-
Add a field for bip39 mnemonic, which automatically converts the mnemonic to entropy and fills the master secret.
Likewise when combining use the master secret to generate and display a bip39 mnemo…
-
There are a lot of people and projects addressing decentralised and self-sovereign identity, from formal specs to apps. We should list them so that we can get a better understanding of the space.
I…