Go to file
Conrado Gouvea 2de0f3c5df add bound to ConstantTimeEq in Scalar 2022-12-07 11:47:05 -03:00
.github Bump reviewdog/action-actionlint from 1.34.1 to 1.34.2 (#186) 2022-11-29 19:04:04 +00:00
frost-core add bound to ConstantTimeEq in Scalar 2022-12-07 11:47:05 -03:00
frost-ed448 add bound to ConstantTimeEq in Scalar 2022-12-07 11:47:05 -03:00
frost-ed25519 release: prepping Cargo.toml's for crates.io release (#188) 2022-12-06 15:30:37 +00:00
frost-p256 add bound to ConstantTimeEq in Scalar 2022-12-07 11:47:05 -03:00
frost-redjubjub Update digest requirement from 0.9 to 0.10 2022-07-26 20:27:06 -04:00
frost-ristretto255 add bound to ConstantTimeEq in Scalar 2022-12-07 11:47:05 -03:00
frost-secp256k1 add bound to ConstantTimeEq in Scalar 2022-12-07 11:47:05 -03:00
gendoc add Ed448 support (#187) 2022-12-02 19:47:20 +00:00
rfcs add missing checks 2021-06-15 17:10:38 -04:00
.gitignore Ignore .DS_Store 2022-03-08 14:11:41 -05:00
.mergify.yml ci(Mergify): configuration update 2022-06-15 20:13:45 -04:00
CHANGELOG.md Don't reject small-order verification keys (#137) 2021-11-18 15:53:35 -03:00
Cargo.toml add Ed448 support (#187) 2022-12-02 19:47:20 +00:00
LICENCE Frost keygen with dealer (#47) 2021-02-25 09:06:54 -07:00
LICENCE.MIT Frost keygen with dealer (#47) 2021-02-25 09:06:54 -07:00
LICENSE.Apache-2.0 Frost keygen with dealer (#47) 2021-02-25 09:06:54 -07:00
README.md Improve examples (#160) 2022-11-01 15:54:04 +00:00
codecov.yml Port frost-ristretto255 to frost-core (#57) 2022-06-17 14:54:54 -04:00

README.md

FROST (Flexible Round-Optimised Schnorr Threshold signatures)

Rust implementations of 'Two-Round Threshold Schnorr Signatures with FROST'.

Unlike signatures in a single-party setting, threshold signatures require cooperation among a threshold number of signers, each holding a share of a common private key. The security of threshold schemes in general assume that an adversary can corrupt strictly fewer than a threshold number of participants.

'Two-Round Threshold Schnorr Signatures with FROST' presents a variant of a Flexible Round-Optimized Schnorr Threshold (FROST) signature scheme originally defined in FROST20. FROST reduces network overhead during threshold signing operations while employing a novel technique to protect against forgery attacks applicable to prior Schnorr-based threshold signature constructions. This variant of FROST requires two rounds to compute a signature, and implements signing efficiency improvements described by Schnorr21. Single-round signing with FROST is not implemented here.

Status ⚠

The FROST specification is not yet finalized, and this codebase has not yet been audited or released. The APIs and types in frost-core are subject to change.

Usage

frost-core implements the base traits and types in a generic manner, to enable top-level implementations for different ciphersuites / curves without having to implement all of FROST from scratch. End-users should not use frost-core if they want to sign and verify signatures, they should use the crate specific to their ciphersuite/curve parameters that uses frost-core as a dependency.