Gregory Maxwell [ARCHIVE] on Nostr: 📅 Original date posted:2014-03-29 📝 Original message:On Sat, Mar 29, 2014 at ...
đź“… Original date posted:2014-03-29
📝 Original message:On Sat, Mar 29, 2014 at 10:38 AM, Matt Whitlock <bip at mattwhitlock.name> wrote:
> But can threshold ECDSA work with BIP32?
Yes.
>In other words, can a threshold ECDSA public key be generated from separate, precomputed private keys,
No.
> can it only be generated interactively?
Yes.
But see the first question. Basically you can do an interactive step
to generate a master pubkey and then use BIP32 non-hardened derivation
to build thresholded children.
On Sat, Mar 29, 2014 at 10:42 AM, Matt Whitlock <bip at mattwhitlock.name> wrote:
> Respectfully, it's also possible to take a base58-encoded private key and run it through GPG, which is included in most Linux distros. But yet we have BIP38.
BIP38 is a bad example (because it was created without public
discussion due to a technical snafu).
In this case I don't see anything wrong with specifying secret
sharing, but I think— if possible— it should be carefully constructed
so that the same polynomials and interpolation code can be used for
threshold signatures (when encoding compatible data).
If it requires entirely different code than the code for threshold
signing it might as well be a file generic tool like SSSS.
Published at
2023-06-07 15:16:43Event JSON
{
"id": "e7fcd91999de3fc8ec4c818107eaabe9f88662bc6d656db38923f006bdc7bd95",
"pubkey": "4aa6cf9aa5c8e98f401dac603c6a10207509b6a07317676e9d6615f3d7103d73",
"created_at": 1686151003,
"kind": 1,
"tags": [
[
"e",
"cd470d06d90a3107c21da4b48b344ebdd3b4ab813362bb85b0e7a02311012700",
"",
"root"
],
[
"e",
"9e4460c581d2ca1fa8378cae6c64b747e7555e9568f8b979c18de794c3d84e08",
"",
"reply"
],
[
"p",
"f00d0858b09287e941ccbc491567cc70bdbc62d714628b167c1b76e7fef04d91"
]
],
"content": "📅 Original date posted:2014-03-29\n📝 Original message:On Sat, Mar 29, 2014 at 10:38 AM, Matt Whitlock \u003cbip at mattwhitlock.name\u003e wrote:\n\u003e But can threshold ECDSA work with BIP32?\n\nYes.\n\n\u003eIn other words, can a threshold ECDSA public key be generated from separate, precomputed private keys,\nNo.\n\n\u003e can it only be generated interactively?\n\nYes.\n\nBut see the first question. Basically you can do an interactive step\nto generate a master pubkey and then use BIP32 non-hardened derivation\nto build thresholded children.\n\nOn Sat, Mar 29, 2014 at 10:42 AM, Matt Whitlock \u003cbip at mattwhitlock.name\u003e wrote:\n\u003e Respectfully, it's also possible to take a base58-encoded private key and run it through GPG, which is included in most Linux distros. But yet we have BIP38.\n\nBIP38 is a bad example (because it was created without public\ndiscussion due to a technical snafu).\n\nIn this case I don't see anything wrong with specifying secret\nsharing, but I think— if possible— it should be carefully constructed\nso that the same polynomials and interpolation code can be used for\nthreshold signatures (when encoding compatible data).\n\nIf it requires entirely different code than the code for threshold\nsigning it might as well be a file generic tool like SSSS.",
"sig": "364d9333897b960716f5b8a4277d0a91dcb47b0b0528e28165f97a59795d5c3d15441ad6edc8117a4cf8ee5a3d62553ce2493e1542e1973eaa78c2fbc2239f0a"
}