2021
DOI: 10.1007/978-3-030-84242-0_8
|View full text |Cite
|
Sign up to set email alerts
|

MuSig2: Simple Two-Round Schnorr Multi-signatures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
28
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 79 publications
(28 citation statements)
references
References 30 publications
0
28
0
Order By: Relevance
“…These two features make the signature algorithm highly attractive to application developers. Several Schnorrbased signature methods [27,28] have been developed by academics to improve Bitcoin's efficiency and user privacy, and the Bitcoin community is contemplating implementing the Schnorr signature algorithm [29]. We should eagerly anticipate the practical implementation of the Schnorr signature algorithm.…”
Section: The Signature Scheme Proposed By Schnorrmentioning
confidence: 99%
“…These two features make the signature algorithm highly attractive to application developers. Several Schnorrbased signature methods [27,28] have been developed by academics to improve Bitcoin's efficiency and user privacy, and the Bitcoin community is contemplating implementing the Schnorr signature algorithm [29]. We should eagerly anticipate the practical implementation of the Schnorr signature algorithm.…”
Section: The Signature Scheme Proposed By Schnorrmentioning
confidence: 99%
“…A : Compromise privacy of the custody operation (determine the set of public UTxOs) Without privacy support for advanced descriptors (such as by using MuSig2 [30] or MuSig-DN [31] if the proposed Taproot [1] upgrade is activated by the Bitcoin network) Revault's operational privacy is brittle. A Theft Tx that consumes all available deposit UTxOs would be catastrophic since this comprises the majority of funds.…”
Section: Common Attack Sub-treesmentioning
confidence: 99%
“…Using these protocols, a certain set of parties may transfer their joint right to generate a signature to any subset among themselves equal to or a Correspondence should be addressed to Nikita Snetkov: nikita.snetkov@cyber.ee larger than a specific threshold. There are threshold variants of RSA [62,31,22], Schnorr [49,56,29,27], Ed-DSA [44,15,57,50] and ECDSA [52,35,23,1,67] signatures, which could be used in the blockchain infrastructure or as an authentication solution [21]. With several parties being required to participate in the generation of a signature, it is not unreasonable to somewhat relax the security requirements on any single party, related to the storage or handling of its private key material.…”
Section: Introductionmentioning
confidence: 99%