You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It's the same principle, but with cryptographic enforcement instead of code. Capabilities now become mathemtical objects, which avoids the confused deputy problem, because math doesn't lie.
24
+
It's the same principle, but with cryptographic enforcement instead of code. Capabilities now become mathematical objects, which avoids the confused deputy problem, because math doesn't lie.
25
25
26
26
Among the capabilities enforced mathematically in Gordian Clubs are:
27
27
28
-
* Read Capabilities: enforced by permits, including well-understood symmetric key and private key usage as well as SSKR shares.
28
+
* Read Capabilities: enforced by permits, including symmetric keys, private keys, and SSKR shares.
29
29
* Update Capabilities: alternatively enforced by FROST threshold, which allow group decisions.
30
-
* Delegation Capabilities: a more bleeding-edge methodology supported by adaptor signatures.
30
+
* Delegation Capabilities: a newer methodology supported by Schnorr's adaptor signatures.
31
31
32
32
## Delegation
33
33
34
-
Gordian Clubs use Schnorr signatures as a core technology, with their foundational use being as a threshold signing system that can be used to update Editions. However, Schnorr technologies are like LEGO blocks: different Schnorr options can be stacked together to create towering edifices. One of these additional technologies is the "adaptor signature", which can be combined with other Schnorr technologies to allow delegation, where access can be provided to Gordian Clubs without revealing extant private keys.
34
+
Gordian Clubs use Schnorr signatures as a core technology, with their foundational use being as a threshold signing system that can be used to update Editions. However, Schnorr technologies are like LEGO blocks: different Schnorr options can be stacked together to create towering edifices. One of these additional technologies is the "adaptor signature", which can be combined with other Schnorr technologies to allow delegation, where access can be provided to Gordian Clubs Editions without revealing extant private keys.
35
35
36
-
> :warning:These delegation protocols are "naive" in the cryptographic sense. Like naive Schnorr aggregation (which could leak keys, leading to MuSig2/MuSig-DN), these examples demonstrate the core pattern but need cryptographic proofs. Schnorr adaptor signatures are a mature cryptographic primitive already deployed in production systems, but their use for capability-based access control with single-holder keys is a novel (but reasonable) application.
36
+
> :warning:Schnorr adaptor signatures are a mature cryptographic primitive already deployed in production systems, but their use for capability-based access control with single-holder keys is a novel (but reasonable) application. As a result, these delegation protocols are "naive" in the cryptographic sense: like naive Schnorr aggregation (which could leak keys, leading to MuSig2/MuSig-DN), these examples demonstrate the core pattern but need cryptographic proofs.
37
37
38
38
### Naive Read Delegation via Adaptor Signature
39
39
40
-
**Goal:** Alice (with read access) delegates to Bob without sharing keys OR updating current edition
41
-
1.**Alice creates an incomplete signature**
42
-
- Generates random secret `t` and commits to it: `T = t·G`
0 commit comments