-
The reissue operation seems to allow giving different new DBCs to different mints in the same transaction. Let's assume we have a 3-of-5 threshold and 3 "old" DBCs (O1, O2, O3) with all signatures. A …
-
Hello!
```
n = key.params['n'].to_i
r = (rand*(n-1)).to_i
```
Don't you have to use here `2**n` instead of n?
All the best,\
Robert
-
Summarizing some disjoint threads. #1522 which is going to phase 1 listed implementing crypto and other large-number mathematical primitives as a leading motivation. We have had two suggestions along …
-
According to [Wikipedia](https://en.wikipedia.org/wiki/Blind_signature):
> The resulting blind signature can be publicly verified against the original, unblinded message
While it does not wor…
-
As it stands, Rundeck will not connect to any host running OpenSSH >8.8 without changing each and every one of their /etc/ssh/sshd_config files to re-enable ssh-rsa key types. This is massively encum…
-
Suppose the ballot is something nice and compact, say 63 bit random ID (user selectable to avoid identical ballot collisions) and a bit for yes vs no on some issue. Then all 64 bit strings are valid b…
-
Quantum computers have the potential to break many of the cryptographic algorithms that are currently used to secure communications and protect data. This is because quantum computers can perform cert…
-
- [ ] ML-DSA / [Dilithium](https://pq-crystals.org/dilithium/)
- [ ] SLH-DSA
- [x] DSA
- [x] ECDSA
- [x] NIST P-256 (via [`p256`](https://docs.rs/p256/latest/p256/ecdsa/index.html))
- [x] NIS…
-
At Red Hat, we set the SECLEVEL to 2 in DEFAULT and LEGACY policies (in crypto-policies [1], not providers). So when SECLEVEL 2 is in use, the creation and verification of SHA-1 signatures is rejected…
-
One of the suggested ways of preventing PCM fraud is to use blinded signatures. This issue tracks that potential solution.