Matt Whitlock [ARCHIVE] on Nostr: 📅 Original date posted:2014-03-29 📝 Original message:On Saturday, 29 March ...
📅 Original date posted:2014-03-29
📝 Original message:On Saturday, 29 March 2014, at 9:44 am, Tamas Blummer wrote:
> I used Shamir's Secret Sharing to decompose a seed for a BIP32 master key, that is I think more future relevant than a single key.
> Therefore suggest to adapt the BIP for a length used there typically 16 or 32 bytes and have a magic code to indicate its use as key vs. seed.
I have expanded the BIP so that it additionally applies to BIP32 master seeds of sizes 128, 256, and 512 bits.
https://github.com/whitslack/btctool/blob/bip/bip-xxxx.mediawikiThe most significant change versus the previous version is how the coefficients of the polynomials are constructed. Previously they were SHA-256 digests. Now they are SHA-512 digests, modulo a prime number that is selected depending on the size of the secret.
Published at
2023-06-07 15:16:35Event JSON
{
"id": "0d4cb9290b4f4ad95dadb666cb8392a2ba43f5cbe134c5c942d4a896c4401b5a",
"pubkey": "f00d0858b09287e941ccbc491567cc70bdbc62d714628b167c1b76e7fef04d91",
"created_at": 1686150995,
"kind": 1,
"tags": [
[
"e",
"cd470d06d90a3107c21da4b48b344ebdd3b4ab813362bb85b0e7a02311012700",
"",
"root"
],
[
"e",
"d98e863584c260f1d6df887c886bd2542112757f8a536fb9b95356883a08eb57",
"",
"reply"
],
[
"p",
"f00d0858b09287e941ccbc491567cc70bdbc62d714628b167c1b76e7fef04d91"
]
],
"content": "📅 Original date posted:2014-03-29\n📝 Original message:On Saturday, 29 March 2014, at 9:44 am, Tamas Blummer wrote:\n\u003e I used Shamir's Secret Sharing to decompose a seed for a BIP32 master key, that is I think more future relevant than a single key.\n\u003e Therefore suggest to adapt the BIP for a length used there typically 16 or 32 bytes and have a magic code to indicate its use as key vs. seed.\n\nI have expanded the BIP so that it additionally applies to BIP32 master seeds of sizes 128, 256, and 512 bits.\n\nhttps://github.com/whitslack/btctool/blob/bip/bip-xxxx.mediawiki\n\nThe most significant change versus the previous version is how the coefficients of the polynomials are constructed. Previously they were SHA-256 digests. Now they are SHA-512 digests, modulo a prime number that is selected depending on the size of the secret.",
"sig": "e923027d454c87b3b3328f3cb7943516974fe8b48f062e96ff29f95b8337889c98a06fa2bb7701b07b34d4afb2cd701ff0fa4a539ea682cf6e7fd64d7ec127e5"
}