Schnorr’s overall signature can be embedded in other schnorr aggregate signatures?
Schnorr signatures are a kind of digital signature used in various blockchain and cryptocurrency applications. The credibility and integrity of messages without exploring their content. One of the most important features of Schnorr signatures is that they can combine the signatures of several parties with a single shared signature, the so -ced aggragate signature. Signatures using Schnorr protocols.
Understanding Schnorr Signatures
Schnorr signatures are based on the “Blind Signature” concept that allows the parties to sign messages without exploring others. It consists of three components: one private key (p), a public value (p) and a hash (h). The p is derived from a private key p, with the function of H (p) = r + p^k schnorr hash, where k is a whole parameter.
Aggregate Signatures
Schnorr’s overall signatures are used to combine the signatures of several parties for a single shared signature. The overall signature consists of the Signature (S_I) List and the Schnorr hash function of each signature is combined using a hash function (S_I).
Overall signatures can be embedded in other aggregate signatures?
Theoretically, cumulative signatures can be nested within other aggregated signatures using schnorr protocols. However, there are some restrictions and possible questions that need to be taken into account.
The combination of the schnorr hash function and a new hash function a combination of haggregate2 (S_I). The idea is to create a new P2, combining two P1 and P2 private keys using the schnorr hash function: P2 = Haggregate2 (P1, P2). You can then use the same schnorr hash function to derive the S2 overall S2 signature.
However, there are potential issues that need to be taken into account:
Safety : cumulative signatures can introduce new security reacgings such as increased complexity and vulnerability to attacks. The Embedded aggregate signature can be more difficult to check or extract information.
* Power
: Creating and checking embedded cumulative signatures can be expensive from a calculation point of view, especially at large inputs. This can make them less practical for real applications.
Example Use The Case
To illustrate this concept, consider a case of examples where there are two sides (Alice and Bob) We make an embedded aggregate signature within another aggregate signature.
Suppose Alice has a private key P1 = E1^P2^K1, where E1 is the value of signature. A aggregate signature of S_Nested (S1, S2), where S1 and S2 are unique schnorr signatures.
We
Then, using the Schnorr hash function, using s_nested = Haggregate (S1, S2).
The Embedded aggregate signature is p3 = e1^p2.
Conclusion
In summary, the cumulative signatures can be nested within other cumulative signatures using Schnorr protocols. However, there are potential safety and power problems that need to be taken into account when creating such embedded signatures. It is essential that we thoroughly evaluate comromises and limitations of this approach before application it in a real scenario.
Recommendations
.