Return-Path: Received: from smtp3.osuosl.org (smtp3.osuosl.org [IPv6:2605:bc80:3010::136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 78C99C002A for ; Mon, 1 May 2023 04:24:00 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp3.osuosl.org (Postfix) with ESMTP id 4621060E6A for ; Mon, 1 May 2023 04:24:00 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org 4621060E6A Authentication-Results: smtp3.osuosl.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.a=rsa-sha256 header.s=20221208 header.b=ZjGLHnFW X-Virus-Scanned: amavisd-new at osuosl.org X-Spam-Flag: NO X-Spam-Score: -2.098 X-Spam-Level: X-Spam-Status: No, score=-2.098 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no Received: from smtp3.osuosl.org ([127.0.0.1]) by localhost (smtp3.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p_hcpMAxn9jx for ; Mon, 1 May 2023 04:23:59 +0000 (UTC) X-Greylist: whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp3.osuosl.org D3E7060B45 Received: from mail-yw1-x1133.google.com (mail-yw1-x1133.google.com [IPv6:2607:f8b0:4864:20::1133]) by smtp3.osuosl.org (Postfix) with ESMTPS id D3E7060B45 for ; Mon, 1 May 2023 04:23:58 +0000 (UTC) Received: by mail-yw1-x1133.google.com with SMTP id 00721157ae682-55a6efe95c9so1258347b3.1 for ; Sun, 30 Apr 2023 21:23:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20221208; t=1682915037; x=1685507037; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :from:to:cc:subject:date:message-id:reply-to; bh=R99ZCiBFme102O+6QIjVzqwajf7zaNdDRua0avdGTBs=; b=ZjGLHnFW4f7L5d0Pg3EzQCBhaTdBGJZpM+iy2a8bWeRpXUB4JPghbOX0jsN7lvfxZT BEWYW+doon6/42IHicOOCcAlUs4jM4LxCL1V5udMcqNMIm3F24ZEENG7lgwmcr9ueE5Q RNoOvGYJcncDFXncjq2M4zMTkRke9+W75sr137y//XOTEqaIAN85tT+4u62Tc1XhxteO nxEFkig+SL2BrqCQKn7w0dp68NCKRqrUgMXsRVrlwYdyrectTV9SE6biPrmdOZU0eYuB Q+VW9SGtjvzJucuv4fovFl7tPd1B349MV1743EaL5jgZzhXiHztHoNjk4PaWU5kkZaEr 4pTg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1682915037; x=1685507037; h=to:subject:message-id:date:from:in-reply-to:references:mime-version :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=R99ZCiBFme102O+6QIjVzqwajf7zaNdDRua0avdGTBs=; b=IaVx6SYMpekVc/O61PCxZN52TXe33lIn3F+vJIByns1se3/xE0/ny3+z6zamc8I11Z xPnqA6yFBnCLqwi2Z3hldIYU+8hCLSXi0fDF2nn2BtfwuMAnNnrJA4QM8W1nodBYUeOr l7Kmm+y19YVTgIvjVQ+YADYv66aYRtrPMbpmZfLZwfvyCaN6GebUFjaq2Po1uTzYjiu7 dD44wEYxXDahtiJ7cJvWnVLq+Owh/PFINTiYxRwsUrLQSaSFYFq4yf5hOaJsTGhunIiY y7YbtMN0QLqfzDX77wmHwkmx2AcKJKjYfPTxOQsfy5QmS30j37Sfz7Q5aPU6KF2fp8gW ieQA== X-Gm-Message-State: AC+VfDy6gd3geRJ8zoF/bSt6yvOyhTN2rRhzDkpw6LywondQGdYe7hRw koY6spOm2M04CqwQtxm3SxK4YvUWZg6tJew1yRn1qvLrPHs= X-Google-Smtp-Source: ACHHUZ50LFJPSsP1d9wMkXaBSZtpq9Rs/hGkIR3WGPtRoulIJcIvs2NfS+PfUXTeOX0ZwFU1XwZSzHwm5mY4FHSAhpk= X-Received: by 2002:a81:8341:0:b0:559:ed1e:fc96 with SMTP id t62-20020a818341000000b00559ed1efc96mr5498576ywf.17.1682915037472; Sun, 30 Apr 2023 21:23:57 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Lloyd Fournier Date: Mon, 1 May 2023 12:23:30 +0800 Message-ID: To: AdamISZ , Bitcoin Protocol Discussion Content-Type: multipart/alternative; boundary="000000000000feeb2005fa9a3072" X-Mailman-Approved-At: Mon, 01 May 2023 08:26:46 +0000 Subject: Re: [bitcoin-dev] On adaptor security (in protocols) X-BeenThere: bitcoin-dev@lists.linuxfoundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Bitcoin Protocol Discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 01 May 2023 04:24:00 -0000 --000000000000feeb2005fa9a3072 Content-Type: text/plain; charset="UTF-8" Hi waxwing, I think your view of the uselessness of single signer adaptors is too pessimistic. The claim you make is that they "don't provide a way to create enforcement that the publication of signature on a pre-defined message will reveal a secret'' and so are useless. I think this is wrong. If I hold a secret key for X and create a signature adaptor with some encryption key Y with message m and do not create any further signatures (adaptor or otherwise) on m, then any signature on m that is published necessarily reveals the secret on Y to me. This is very useful and has already been used for years by DLCs in production. I haven't read the proofs in detail but I am optimistic about your approach. One thing I was considering while reading is that you could make a general proof against all secure Schnorr signing scheme in the ROM by simply extending the ROM forwarding approach from Aumayer et al to all "tweak" operations on the elements that go into the Schnorr challenge hash i.e. the public key and the nonce. After all whether it's MuSig2, MuSig, FROST they all must call some RO. I think we can prove that if we apply any bijective map to the (X,R) tuple before they go into the challenge hash function then any Schnorr-like scheme that was secure before will be secure when bip32/TR tweaking (i.e. tweaking X) and adaptor tweaking (tweaking R) is applied to it. This would be cool because then we could prove all these variants secure for all schemes past and present in one go. I haven't got a concrete approach but the proofs I've looked at all seem to share this structure. Cheers, LL On Sun, 30 Apr 2023 at 00:20, AdamISZ via bitcoin-dev < bitcoin-dev@lists.linuxfoundation.org> wrote: > Hi list, > I was motivated to look more carefully at the question of the security of > using signature adaptors after recently getting quite enthused about the > idea of using adaptors across N signing sessions to do a kind of multiparty > swap. But of course security analysis is also much more important for the > base case of 2 party swapping, which is of .. some considerable practical > importance :) > > There is work (referenced in Section 3 here) that's pretty substantial on > "how secure are adaptors" (think in terms of security reductions) already > from I guess the 2019-2021 period. But I wanted to get into scenarios of > multiple adaptors at once or multiple signing sessions at once with the > *same* adaptor (as mentioned above, probably this is the most important > scenario). > > To be clear this is the work of an amateur and is currently unreviewed - > hence (a) me posting it here and (b) putting the paper on github so people > can easily add specific corrections or comments if they like: > > https://github.com/AdamISZ/AdaptorSecurityDoc/blob/main/adaptorsecurity.pdf > > I'll note that I did the analysis only around MuSig, not MuSig2. > > The penultimate ("third case"), that as mentioned, of "multiple signing > sessions, same adaptor" proved to be the most interesting: in trying to > reduce this to ECDLP I found an issue around sequencing. It may just be > irrelevant but I'd be curious to hear what others think about that. > > If nothing else, I'd be very interested to hear what experts in the field > have to say about security reductions for this primitive in the case of > multiple concurrent signing sessions (which of course has been analyzed > very carefully already for base MuSig(2)). > > Cheers, > AdamISZ/waxwing > > > > > Sent with Proton Mail secure email. > _______________________________________________ > bitcoin-dev mailing list > bitcoin-dev@lists.linuxfoundation.org > https://lists.linuxfoundation.org/mailman/listinfo/bitcoin-dev > --000000000000feeb2005fa9a3072 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Hi waxwing,

I think your vie= w of the uselessness of single signer adaptors is too pessimistic. The clai= m you make is that they "don't provide a way to create=C2=A0 enfor= cement that the publication of signature on a pre-defined message will reve= al a secret'' and so are useless. I think this is wrong. If I hold = a secret key for X and create a signature adaptor with some encryption key = Y with message m and do not create any further signatures (adaptor or other= wise) on m, then any signature on m that is published necessarily reveals t= he secret on Y to me. This is very useful and has already been used for yea= rs by DLCs in production.

I haven't read the p= roofs in detail but I am optimistic about your approach. One thing I was co= nsidering while reading is that you could make a general proof against all = secure Schnorr signing scheme in the ROM by simply extending the ROM forwar= ding approach from Aumayer et al to all "tweak" operations on the= elements that go into the Schnorr challenge hash i.e. the public key and t= he nonce. After all whether it's MuSig2, MuSig, FROST they all must cal= l some RO. I think we can prove that if we apply any bijective map to the (= X,R) tuple before they go into the challenge hash function then any Schnorr= -like scheme that was secure before will be secure when bip32/TR tweaking (= i.e. tweaking X) and adaptor tweaking (tweaking R) is applied to it. This w= ould be cool because then we could prove all these variants secure for all = schemes past and present in one go. I haven't got a concrete approach b= ut the proofs I've looked at all seem to share this structure.

Cheers,

LL

On Sun, 30 Ap= r 2023 at 00:20, AdamISZ via bitcoin-dev <bitcoin-dev@lists.linuxfoundat= ion.org> wrote:
Hi list,
I was motivated to look more carefully at the question of the security of u= sing signature adaptors after recently getting quite enthused about the ide= a of using adaptors across N signing sessions to do a kind of multiparty sw= ap. But of course security analysis is also much more important for the bas= e case of 2 party swapping, which is of .. some considerable practical impo= rtance :)

There is work (referenced in Section 3 here) that's pretty substantial = on "how secure are adaptors" (think in terms of security reductio= ns) already from I guess the 2019-2021 period. But I wanted to get into sce= narios of multiple adaptors at once or multiple signing sessions at once wi= th the *same* adaptor (as mentioned above, probably this is the most import= ant scenario).

To be clear this is the work of an amateur and is currently unreviewed - he= nce (a) me posting it here and (b) putting the paper on github so people ca= n easily add specific corrections or comments if they like:

https://github.com/AdamIS= Z/AdaptorSecurityDoc/blob/main/adaptorsecurity.pdf

I'll note that I did the analysis only around MuSig, not MuSig2.

The penultimate ("third case"), that as mentioned, of "multi= ple signing sessions, same adaptor" proved to be the most interesting:= in trying to reduce this to ECDLP I found an issue around sequencing. It m= ay just be irrelevant but I'd be curious to hear what others think abou= t that.

If nothing else, I'd be very interested to hear what experts in the fie= ld have to say about security reductions for this primitive in the case of = multiple concurrent signing sessions (which of course has been analyzed ver= y carefully already for base MuSig(2)).

Cheers,
AdamISZ/waxwing




Sent with Proton Mail secure email.
_______________________________________________
bitcoin-dev mailing list
= bitcoin-dev@lists.linuxfoundation.org
https://lists.linuxfoundation.org/mail= man/listinfo/bitcoin-dev
--000000000000feeb2005fa9a3072--