-
-
# Overview
In order to report a misbehaviour we need to obtain and utilise proofs of this misbehaviour from underlying multi-party-ecdsa library (further MPE).
# Research:
- Mapping between MPE par…
-
**Issue summary**
When we originally modified the Zengo mp-ecdsa, we added additional encryption to P2P messages because we were originally broadcasting/gossiping all messages over our network,
So…
-
I touched upon this earlier in [this comment](https://github.com/ZenGo-X/multi-party-ecdsa/issues/138#issuecomment-985936882) but want to create a separate issue to explain context and discuss this pr…
tmpfs updated
2 years ago
-
Currently we follow multi-party-ecdsa logic of two dlog proofs
see here: https://github.com/ZenGo-X/fs-dkr/pull/17/files#diff-386a609f746d74ecbc3e04d7ae0e82e2e7a58a72a16908d2fbbb955b9d355971R73
…
-
Could you please publish `multi-party-ecdsa` to crates.io?
I would like to depend on this crate and publish to crates.io but cannot as I need to use `git` dependencies to reference `multi-party-ecd…
-
Write Rust doc for Lindell 2017 2P-ECDSA (https://doc.rust-lang.org/book/first-edition/documentation.html). Mention in the doc papers, math formula and plain english description.
See: https://githu…
-
Here are some resources I've managed to collect so far.
I'm not working on ECDSA-2P yet, but sharing this in case other people want to spend time on it.
2018 scaling bitcoin
a talk by lightnin…
-
Do you plan to implement support for the multi-party threshold (t,n) ECDSA described by Lindell et al. in their newer (2018) paper -> https://eprint.iacr.org/2018/987.pdf ?
-
Amazing library. We really love it. For work, we can't use the Signing function, instead we need to generate a valid {t,n} threshold ecdsa (PublicKey, PrivateKey) pair. We can even ask the `t` out of …