Replies: 3 comments 10 replies
-
Hi! Thank you for opening this. This is something that we're interested in but we need to look more closely into it. I'll keep you posted. |
Beta Was this translation helpful? Give feedback.
-
A fixed chaincode could be used, similar to the MuSig2 Derivation BIP:
|
Beta Was this translation helpful? Give feedback.
-
A few points:
I have a suggestion which should address these issues. ProcedureThe group runs the DKG as normal to generate the group's master public key Each participant computes two namespaced hashes of
The participants can build a depth-3 xpub (imagine it as an xpub at
Observations
|
Beta Was this translation helpful? Give feedback.
-
I've created this discussion for the potential of BIP32 derivation of FROST keys as I raised here: #584 (comment)
Because the private key is unknown, it is not possible to do hardened derivation in accordance with the BIP32 scheme. However it is possible to do unhardened derivation which could still be useful for deriving new keys without requiring DKG each time. This could be as simple as applying BIP32 tweaks to the group key and the private and public shares.
The chain code could be determined from the public shares without requiring any extension to the DKG protocol. However it has been pointed out that if the public shares are revealed, this would also reveal the chain code, and it would not be compatible with schemes that modify the set of public shares.
Therefore the master chain code might be best generated separately. This might be done by participants providing commitments to other participants first before sharing values that are combined into a chain code.
Perhaps it's not so important to have public commitments for the chain code as a malicious participant could leak the chain code in any event and does it matter if they could manipulate its value? Participants should always behave as if the chain code is public information and ultimately details about relationships between keys could be leaked. However BIP32 provides some advantages over only having a single key or having to generate many keys.
Are there any other considerations for, or implications of BIP32 derivation? Maybe there are potential improvements to be had over BIP32?
Beta Was this translation helpful? Give feedback.
All reactions