-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xaddd158c9356b53616dbca3a7f6f2e63bbe511da1dc3456403cebec50c3e76c3
**Severity:** medium
**Description:**
**Descriptio…
-
This task aims to define the testing plan for assuring the quality of the project's cryptographic components.
### Goals:
Since cryptographic code is often difficult to test, we should design our t…
-
Hi,
I've been digging into the code for the past week but I couldn't find if you're actually using the threshold signature scheme.
I couldn't find the distribution of the partial signatures and …
-
Is Threshold MPC signatures or MPC secret computing considered as fancy?
-
Hello. I was using the program and observed some possible issues in `crypto/bls12/bls12/go`.
Namely, the methods `CreateThresholdSignature()` and `VerifyThresholdSignature()` actually create (and v…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0x33551783c3c3753e4436143823b03dcdd07a24798b7e41aff963bddcaa875531
**Severity:** medium
**Description:**
**Descriptio…
-
## Context / issue
IMU `Safe` contract does not currently have the functionality to simulate a safe transaction without requiring the threshold of owner signatures. This limitation makes it difficu…
-
It's said in readme that BLS can be used well for threshold signatures, with link to article that describes how it works cryptographically.
However I couldn't find how to do it using noble-curves. Is…
-
### UpgradeableOwners script
#### User Requirements
##### ✅ A user can mint the protocol token if the owners agree.
This is achievable spending the protocol UTXO with the `TokenMint` redeemer…
-
I believe the most advanced threshold signature implementation is https://github.com/poanetwork/threshold_crypto but they do not provide our abstractions, and one should optimize the arithmetic ala ht…