-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Only P256() is supported now? #43
Comments
You're welcome! I'm glad you find this work useful.
If TSS-lib supports Secp256k1 then probably it should be possible to add support for it in this library.
How can you sign before the DKG is finished? Are you signing using a previous incarnation of the DKG? |
@yacovm I'm glad to receive your reply! I have submitted PR #45 that adds default secp256k1 support for ecdsa. If you have time, please take a look! Since Keygen takes quite a long time, I want my service to be able to process signing requests using previously generated keys without waiting for the current Keygen to complete. My current approach is:
Do you think this approach is safe? I would appreciate your advice on this approach. Thank you! |
I reviewed your PR. Regarding your question - The safest thing to do is to just instantiate a new instance of |
@yacovm Thank you! I'm going to change my service so that there will be one scheme for keygen only and one scheme for signing in a party. |
Thank you for the great work on this project!
I’m currently trying to use Secp256k1, but I noticed that the curve appears to be hardcoded as P256 in the following file: mpc.go. If I understand correctly, this means the library currently only supports P256, even though tss-lib itself supports additional curves like Secp256k1. Could you confirm if this is the case? Are there plans to support other curves in the future?
And another question, is it safe to trigger a Sign operation while a KeyGen operation is in progress?
The text was updated successfully, but these errors were encountered: