You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Or instead, taking ctx = SerializeElement(pk) || ctx_original as input to BlindPublicKey, this could be reformulated using the original construct, but where the implementation of BlindPrivateKey needs to also provide:
That function would inherit the security properties of BlindPrivateKey, such as not leaking information about Combine(sk, bf), making it impossible to form bf in such a way that it leaks information about sk. Furthermore, by including bf in the context over which the blinding factor is derived using a hash, it is infeasible to construct bf in such a way that it cancels the DeriveBlindingFactor output.
This would require no updates to Key Blinding for Signature Schemes, but would require changes to ARKG:
make ARKG-Derive-Private-Key to accept a bf parameter (default 0 for additive, 1 for multiplicative blinding), which is used to call BlindBlindedPrivateKey
make ARKG-Derive-Public-Key prefix the application context string with SerializeElement(pk)
The text was updated successfully, but these errors were encountered:
sander
added a commit
to sander/arkg-rfc
that referenced
this issue
Jan 20, 2025
Discussed during the 2025-01-20 meeting with @mickrau and @emlun: we may replace:
with:
Or instead, taking
ctx = SerializeElement(pk) || ctx_original
as input to BlindPublicKey, this could be reformulated using the original construct, but where the implementation of BlindPrivateKey needs to also provide:That function would inherit the security properties of BlindPrivateKey, such as not leaking information about
Combine(sk, bf)
, making it impossible to formbf
in such a way that it leaks information aboutsk
. Furthermore, by includingbf
in the context over which the blinding factor is derived using a hash, it is infeasible to constructbf
in such a way that it cancels the DeriveBlindingFactor output.This would require no updates to Key Blinding for Signature Schemes, but would require changes to ARKG:
bf
parameter (default 0 for additive, 1 for multiplicative blinding), which is used to call BlindBlindedPrivateKeySerializeElement(pk)
The text was updated successfully, but these errors were encountered: