-
Hi. I am using `0.2.8` version of `multi-party-ecdsa`.
In particular, I have used `{1,3}` party scheme.
I have recently faced with the following error during signature generation process:
```
DEB…
-
Secure Two-party Threshold ECDSA from ECDSA Assumptions (https://eprint.iacr.org/2018/499.pdf) is a work done by Doerner et al. The PoC code is provided in https://gitlab.com/neucrypt/mpecdsa . The co…
-
# Overview
CGGMP paper defines ZK proof Π-mod (See Fig 16 https://eprint.iacr.org/2021/060.pdf#page=36) for ensuring that the Paillier modulus is a semiprime and `gcd(N, phi(N)) = 1`. There is an …
-
# Overview
The current implementation is an evaluation over different protocols. There is some mismatch between the proofs and values being transmitted with the papers, leading to potential vulnera…
-
Does the implementation of GG2020 support key re-sharing?
If so, is there an example of the re-sharing part of the protocol I could take a look at.
Thanks, as always 🙏
tmpfs updated
2 years ago
-
My understanding is that currently it supports two-party signatures. Is there a plan to support a multi-party scheme?
-
Hello, does your code implement identifiable abort? Thank you very much for your answer!
-
Recently you released curv v0.8, which is a very good thing. Unfortunately, using it comes with certain limitations. In particular, it appears to me, that we won't be able to use v0.8 in our products …
-
The type `ecdsa.Signature` included `R` and `S` but no recovery id (or `v`) value which would be required for ethereum-style recoverable signatures.
If memory serves correctly `v` is just whether t…
-
There seems to be an error in encoding/decoding of a GE ([Ed25519Point](https://github.com/ZenGo-X/curv/blob/b3b9c39b3113395604c50a248dfd3b9bbaa034fa/src/elliptic/curves/ed25519.rs#L45)) in version 0.…