The main problem to be addressed is the potential vulnerability in our Distributed Key Generation (DKG) protocol. The TSSHOCK attack, which allows a single malicious party to completely break the security of Threshold Signature Schemes (TSS) and perform a full private key extraction, could potentially affect our system. This attack, which leaves no trace and appears innocent to other parties, could result in significant cryptocurrency losses for both individual users and institutions. There is also an indication of two more vulnerabilities that need to be investigated apart from the one described.
🛠️ Proposed solution
The proposed solution includes several steps:
Investigate whether our DKG protocol is built on the GG20 scheme, which could potentially affect our susceptibility to the TSSHOCK attack.
If our DKG is built on GG20, we must review and potentially revise our protocol to mitigate this vulnerability.
In parallel, we should identify and investigate the two additional vulnerabilities that have been suggested.
Once these vulnerabilities have been thoroughly examined, we should develop and implement patches or other solutions to address them.
Finally, we should conduct rigorous testing and validation to ensure these solutions are practical and not introduce new vulnerabilities to our system.
🎯 Problem to be solved
The main problem to be addressed is the potential vulnerability in our Distributed Key Generation (DKG) protocol. The TSSHOCK attack, which allows a single malicious party to completely break the security of Threshold Signature Schemes (TSS) and perform a full private key extraction, could potentially affect our system. This attack, which leaves no trace and appears innocent to other parties, could result in significant cryptocurrency losses for both individual users and institutions. There is also an indication of two more vulnerabilities that need to be investigated apart from the one described.
🛠️ Proposed solution
The proposed solution includes several steps:
Investigate whether our DKG protocol is built on the GG20 scheme, which could potentially affect our susceptibility to the TSSHOCK attack.
If our DKG is built on GG20, we must review and potentially revise our protocol to mitigate this vulnerability.
In parallel, we should identify and investigate the two additional vulnerabilities that have been suggested.
Once these vulnerabilities have been thoroughly examined, we should develop and implement patches or other solutions to address them.
Finally, we should conduct rigorous testing and validation to ensure these solutions are practical and not introduce new vulnerabilities to our system.
Sources