-
Was reading this section of DID core,
https://www.w3.org/TR/did-core/#group-control
> In the case of group control, the [DID controllers](https://www.w3.org/TR/did-core/#dfn-did-controllers) are…
-
The current plan is to do complete rewrite of the lightning module code by creating a new module instead of updating the legacy code.
- [x] Implement threshold point encryption based on BLS cryptogra…
-
**Is your feature request related to a problem? Please describe.**
Implementing complex cryptography in smart contracts is painful and error-prone. Thus, I suggest adding some cryptography features t…
-
It's said in readme that BLS can be used well for threshold signatures, with link to article that describes how it works cryptographically.
However I couldn't find how to do it using noble-curves. Is…
-
# Open Grant Proposal: Threshold cryptographic quests SDK for autonomous accomplishment graphs and decentralized social platforms
**Name of Project:**
Labyrinth SDK Suite
**Proposal Category:*…
-
https://eprint.iacr.org/2022/1389.pdf details a DKG which they claim runs in O(n) without faults, yet in O(n log n) with arbitrary faults.
The existing DKG operates in O(n^2), and moving to O(n) is…
-
Add some integrated mechanism for generating on-chain randomness using a commit-reveal scheme or threshold cryptography (preferred).
-
Secure Two-party Threshold ECDSA from ECDSA Assumptions (https://eprint.iacr.org/2018/499.pdf) is a work done by Doerner et al. The PoC code is provided in https://gitlab.com/neucrypt/mpecdsa . The co…
-
given the refactoring of storeshare.proto I think `ShamirInterfaces` spec is wrong . It should just provide for splitting a byte[] and recombining byte[]s the other parameters are not relevant?
Pl…
-
An example is given in #8 for cryptographic signature verification. Further examples that can be added for the API functions may include:
* message encryption with `PublicKey::encrypt` and decryption…