Advertisement · 728 × 90

Posts by siv2r

This property is not observed in MuSig2’s key generation, as it uses additive secret sharing and randomization.

1 year ago 0 0 0 0

ChillDKG uses this property to commit its threshold public key to an unspendable script path, making it Taproot-safe.

1 year ago 0 0 1 0
Proof by Lagrange interpolation

Proof by Lagrange interpolation

While reviewing the ChillDKG BIP, I noticed a neat property: In a t-of-n Shamir sharing scheme, where combining shares s1, s2, and s3 gives a secret c. If you offset these shares by adding a constant k (i.e., s1 + k, s2 + k, s3 + k), the result will be an offset secret c + k.

1 year ago 0 0 1 0