-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Proof Multiplicative Key Blinding #77
Comments
References Definition of key blinding using elliptic curve addition (draft-bradleylundberg-cfrg-arkg-03) Security Analysis of ARKG (Asynchronous Remote Key Generation: An Analysis of Yubico's Proposal for W3C WebAuthn., Fryman et al. ) |
This security argument may be helpful: https://crypto.stackexchange.com/a/111066 |
Possibly relevant: Security Analysis of Signature Schemes with Key Blinding, related to draft-irtf-cfrg-signature-key-blinding. It proves unlinkability and unforgeability of multiplicative ECDSA blinding. |
In #7 the question came up, whether there is a formal security proof for the multiplicative blinding.
To make here progress, we should first define the exact properties for which we need a security proof and should make clear what parts of HDK are affected.
The text was updated successfully, but these errors were encountered: