Skip to content

Conversation

@malingzhao
Copy link

No description provided.

@vietddude
Copy link

Hi, quick security question on this PR.

This looks like you're implementing additive non-hardened derivation for EdDSA (Child_Share = Parent_Share + delta).

Isn't this vulnerable to the classic BIP32 parent key leakage attack? If a single Child_SK ever leaks (via t+1 collusion, etc.), an attacker can find the Parent_SK.

SLIP-0010 specifically forbids this on ed25519 for this exact reason. How do you mitigate this risk?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants