Network support for threshold signing mechanism #64
Labels
No Label
bug
C:CLI
C:Crypto
C:Encoding
C:Proto
C:Types
dependencies
docker
documentation
duplicate
enhancement
go
good first issue
help wanted
high priority
in progress
invalid
javascript
low priority
medium priority
question
Status: Stale
Type: ADR
Type: Build
Type: CI
Type: Docs
Type: Tests
urgent
wontfix
Copied from Github
Kind/Breaking
Kind/Bug
Kind/Documentation
Kind/Enhancement
Kind/Feature
Kind/Security
Kind/Testing
Priority
Critical
Priority
High
Priority
Low
Priority
Medium
Reviewed
Confirmed
Reviewed
Duplicate
Reviewed
Invalid
Reviewed
Won't Fix
Status
Abandoned
Status
Blocked
Status
Need More Info
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: cerc-io/laconicd-deprecated#64
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Provide hooks in laconicd to facilitate the threshold signing code's communication with peer nodes.
@vibs29
As I understand it, we will need an API / design pattern for the Go code to pass around separately
Wanted to clarify this: does this mean that the signature protocol itself doesn't have a way to verify the originator (hence absent this transport layer verification, an attacker could inject a fake message that the protocol will process as legitimate)? Or is it more about wanting to reject noise from attackers before it is considered by the signing protocol code?
NB: if I get my orders of magnitude right, it takes ~50-200 μs to verify a signature over 32 bytes of data using asymmetric cryptography, vs 20-900 ns to decrypt the same 32 bytes using symmetric cryptography (faster number if you use Intel hardware acceleration for AES). That's 2 to 3 orders of magnitude of difference. See e.g. this (slightly dated) page from one particular performance-caring implementation https://www.bearssl.org/speed.html
In other words, if we care about performance, we want to minimize the number of operations using asymmetric cryptography.
Signing code information: