File tree 1 file changed +5
-2
lines changed
substrate/primitives/core/src
1 file changed +5
-2
lines changed Original file line number Diff line number Diff line change @@ -32,11 +32,14 @@ where
32
32
/// produce a "signature" with unique hash context that should
33
33
/// never be used in other signatures. This proves that
34
34
/// that the secret key is known to the prover. While prevent
35
- /// malicious actors to trick an honest party to sign their
36
- /// public key to mount a rogue key attack (See: Section 4.3 of
35
+ /// malicious actors to trick an honest party to sign an
36
+ /// unpossessed public key resulting in a rogue key attack (See: Section 4.3 of
37
37
/// - Ristenpart, T., & Yilek, S. (2007). The power of proofs-of-possession: Securing multiparty
38
38
/// signatures against rogue-key attacks. In , Annual {{International Conference}} on the
39
39
/// {{Theory}} and {{Applications}} of {{Cryptographic Techniques} (pp. 228–245). : Springer.
40
+ /// While we enforce hash context separation at the library level in aggregatable schemes, it
41
+ /// remains as an advisory for the default implementation using signature API used for
42
+ /// non-aggregatable schemes
40
43
#[ cfg( feature = "full_crypto" ) ]
41
44
fn generate_proof_of_possession ( & mut self ) -> Self :: Signature {
42
45
let pub_key_as_bytes = self . public ( ) . to_raw_vec ( ) ;
You can’t perform that action at this time.
0 commit comments