-
Is there any example to reconstruct private key from each private keys or share keys?
-
Currently, the MPInt used by the YACL library is not as efficient compared to a highly optimized $\mathbb{F}_p$. This might not be favorable for cryptography based on $\mathbb{F}_p$. It is well-known …
-
Secure Two-party Threshold ECDSA from ECDSA Assumptions (https://eprint.iacr.org/2018/499.pdf) is a work done by Doerner et al. The PoC code is provided in https://gitlab.com/neucrypt/mpecdsa . The co…
-
Hello,
I am unable to run programs for three or more participants, whether it is ./mascot-ecdsa-party.x or ./mascot-bls-party.x. Additionally, I cannot set different input sizes for different parti…
-
Does the implementation of GG2020 support key re-sharing?
If so, is there an example of the re-sharing part of the protocol I could take a look at.
Thanks, as always 🙏
tmpfs updated
2 years ago
-
# Overview
CGGMP paper defines ZK proof Π-mod (See Fig 16 https://eprint.iacr.org/2021/060.pdf#page=36) for ensuring that the Paillier modulus is a semiprime and `gcd(N, phi(N)) = 1`. There is an …
-
Recently you released curv v0.8, which is a very good thing. Unfortunately, using it comes with certain limitations. In particular, it appears to me, that we won't be able to use v0.8 in our products …
-
My understanding is that currently it supports two-party signatures. Is there a plan to support a multi-party scheme?
-
Hello, does your code implement identifiable abort? Thank you very much for your answer!
-
The type `ecdsa.Signature` included `R` and `S` but no recovery id (or `v`) value which would be required for ethereum-style recoverable signatures.
If memory serves correctly `v` is just whether t…