Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security 2020
DOI: 10.1145/3372297.3417236
|View full text |Cite
|
Sign up to set email alerts
|

MuSig-DN: Schnorr Multi-Signatures with Verifiably Deterministic Nonces

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 52 publications
(20 citation statements)
references
References 28 publications
0
11
0
Order By: Relevance
“…The application of ECC is catching up recently for IoT and allied application. [44] proposed the Edwards curve to optimise the power and memory consumption in a physical device. [45] presented a fast, low power and highly secure cryptography for IoT by using a binary Edwards curve.…”
Section: Edwards Curve Application In Iotmentioning
confidence: 99%
See 1 more Smart Citation
“…The application of ECC is catching up recently for IoT and allied application. [44] proposed the Edwards curve to optimise the power and memory consumption in a physical device. [45] presented a fast, low power and highly secure cryptography for IoT by using a binary Edwards curve.…”
Section: Edwards Curve Application In Iotmentioning
confidence: 99%
“…MuSig is a new Schnorrbased multi-signature scheme proposed by [53].The use of Schnorr signatures makes it simple, efficient and support key aggregation. In [54] the authors introduced a security model for general aggregate signature schemes based on multi-user and thereby achieved a significant reduction EC/DSS/DSA Domain Solution # Edwards Curve IoT Security enhancement [9], [13], [44], [45], [17] , [76] ECC [19], [43] Table 4: Elliptic and Edwards curve application in IoT.…”
Section: Schnorr's Signature For Multi-signaturementioning
confidence: 99%
“…As an improvement scheme of MuSig, Yannick Seurin et al proposed MuSig-DN [21], and J. Nick et al proposed MuSig2 [20]. MuSig-DN allows the use of a deterministic nonce generated from a private key instead of a nonce generated from a pseudo-random generator, and the other signers can verify the authenticity since this deterministic nonce was used for signing using zero-knowledge proofs.…”
Section: Prior Work 221 Musigmentioning
confidence: 99%
“…As two advanced applications of MuSig, MuSig-DN [21] supports deterministic nonce instead of using a random number generator, and MuSig2 [20] supports a two-round protocol, respectively. Since these schemes are improvements related to the signing algorithm, we believe that updating KAIAS supports these modifications.…”
Section: What About the Use Of Deterministic Nonce And Modification To The 2-round Protocol?mentioning
confidence: 99%
“…A : Compromise privacy of the custody operation (determine the set of public UTxOs) Without privacy support for advanced descriptors (such as by using MuSig2 [30] or MuSig-DN [31] if the proposed Taproot [1] upgrade is activated by the Bitcoin network) Revault's operational privacy is brittle. A Theft Tx that consumes all available deposit UTxOs would be catastrophic since this comprises the majority of funds.…”
Section: Common Attack Sub-treesmentioning
confidence: 99%