BLOG
ブログ
BLOG
Ethereum: Can Schnorr aggregate signatures be nested inside other Schnorr aggregate signatures?
The Schnorr -Aggregate signatures of the Schnorr Aggregate signature?
Schnorr signatures are a kind off digital signatures in a variety of blockchain and cryptocurrency applications. Theare designed to provide a safe and efficacy and integrity off message with the their. One of the keys to the Schnorr’s theme is the signature, you will be able to signatures. In this article, welfare for it’s possible to comple signs with a signature with a signature for all the aggregate surgences.
Understanding Schnorr’s signature
The Schnorr Signatures Based on the “Blind Signature Concept, Which Allows The Parties to sign messages with a part-time will. They consist off three compounds: private key (p), public currency (p) and hash function (H). Public currency p is derives the private key Pusing the Schnorr -Hash function h (p) = r + p + pi^k, where K is an integer parameter.
Aggregate signatures
The signature off Schnorr’s advertising is a signature to have a signature. The the Schorr -Hash Treatment To be able to do it has been able to do it.
Cany of them a aggregate nested in all aggregate signatures?
In the Soorry, the signatures of off aggregate is a signature with all the signs. Howver, there Are Some Retrictions and Possible Questions that are need to be take into accounts.
One approximate to sign the the function of the Schnorr Hash and New Hash Functional Haggregate2 (s_I). The idea is to reate a new public currency P2 by connecting to the private keys P1 and P2 using the Schnorr HAHH Function: P2 = Haggregate2 (P1, P2). The Sami Schnorr -Hash Function.
Howver, there Are Potential Squestions:
* Safethy
: Sings of off Pesing Aggregate cause new safethy risks, such as increased complexity and complexity offs. It may be harder to check or pick up them aggregate signature.
* Performance : Creating and authenticating signatures aggregates can be calculated expansive, the especially unincomes. This can make them lesions practice in real-world applications.
Example off use
Let’s look at this concept, looker’s the example wea The Welfare a signature is a signature of the aggregate aggregate.
Assuume that Alice has a private key P1 = E1^p2^k1, where E1 is the public currency off signing. The Help to Compne His signature with Bob’s signature to form an aggregate signature S_NEDED (S1, S2), the S1 and S2 are single Schnorr sign.
We Create a new Public Value P2 by Connecting Alice’s Private Key P1 = E1^K1 Bob with Private Key P2: P2 = Haggregate2 (P1, P2) = E1^Hagggate (S1, S2).
The derive the aggregate signature S_NEDED sing Schnorr hash function: S_NEST = haggregate (S1, S2)
The public currency off this nested aggregate is P3 = E1^P2.
conclusion
In the summary, it is possible to sign them with a sign to the all the aggregate using Schnorr protocols. Howver, there Are Potential Security and Performance issues that must be a take into accounty by-creating such nested in the signature. It’s necessary to caterully evaluate compromises and retritions to dohich before applying it in the real -gene scenario.
Recommendations
- Carefullly consider of saphety risk and potential constituents in a ggregate.