You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When the signing protocol happens currently at the end of the process the user and validators end up with the signature, which is fine when it is a tx but isn't if it is a message or for a login of sorts.
Proposed Solution
@fjarri had the concept of stopping at the last round and having a user build their signature theirselves
require the sig_account sig on random messages to accompany the sign in process
The text was updated successfully, but these errors were encountered:
Is this something that would be handled as part of core, server, or on the crypto side of things?
core but then also sdk, as the client would have to rebuild the signature itself which would require compiling synedrion to webassembly to run in node/browser
The last step is just summing up curve scalars, which can be done easily in JS; the problem is what to do if the resulting signature is invalid. The CGGMP protocol has a branch for this, which involves calculating a bunch of ZK proofs using the saved randomness. So the nodes will have to keep that for some time in case the user requests an investigation.
When the signing protocol happens currently at the end of the process the user and validators end up with the signature, which is fine when it is a tx but isn't if it is a message or for a login of sorts.
Proposed Solution
The text was updated successfully, but these errors were encountered: