You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Can horcrux be used with a trustless distributed key generator to enable multisig validators? The current migration documentation requires a trusted party to distribute the key shares.
Dev (Osmosis) co-authored a handy article that references a 'rust implementation of multiparty Ed25519 signature scheme' repository that supports trustless DKG:
Signing seems to be a blocker for DAO validators. With Interchain Accounts, Juno DAOs can create validator infrastructure on Akash. But how DAOs will securely supply cryptographic keys to the infrastructure for remote signing is not apparent.
Can horcrux nodes be geographically distributed? For example, Raspberry Pi nodes running on the edge with the multisig holder. While the sentry full nodes are hosted in the cloud.
The text was updated successfully, but these errors were encountered:
poroburu
changed the title
Multiparty Trustless DKG Multisig
Multiparty Trustless DKG Multisig Infrastructure
Jun 16, 2022
This would require some cryptography work. Here is a library in go (https://github.com/taurusgroup/frost-ed25519) that could be used to do this. Would require some changes to horcrux that we are happy to collaborate on.
Dev (Osmosis) co-authored a handy article that references a 'rust implementation of multiparty Ed25519 signature scheme' repository that supports trustless DKG:
https://medium.com/blockchain-at-berkeley/alternative-signatures-schemes-14a563d9d562
https://github.com/ZenGo-X/multi-party-eddsa
Signing seems to be a blocker for DAO validators. With Interchain Accounts, Juno DAOs can create validator infrastructure on Akash. But how DAOs will securely supply cryptographic keys to the infrastructure for remote signing is not apparent.
The text was updated successfully, but these errors were encountered: