Schnorr sigs rely so heavily on the masking provided by a random
nonce.   There are so many easy ways to introduce bias (hash + modulo,
for example).

Even 2 bits of bias can result in serious attacks:

https://ecc2017.cs.ru.nl/slides/ecc2017-tibouchi.pdf

Maybe pairing based sigs  - which are slower - might be both more
flexible, and better suited to secure implemetnations?
_______________________________________________
bitcoin-dev mailing list
bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev

Reply via email to