Blinded 2-party Musig2



Summary:

The author suggests that every time a public key is transmitted, it should be accompanied by a "proof of secret key" to prevent potential vulnerabilities. The author proposes that this measure should be integrated into low-level protocols.


Updated on: 2023-08-11T15:36:15.844115+00:00