TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Reconstructing Public Keys from Signatures

143 pointsby tatersolid11 months ago

4 comments

James_K11 months ago
&gt; A rather delightful property if you want to attack anonymity in some proposed “everybody just uses cryptographic signatures for everything” scheme.<p>I don&#x27;t follow. Surely the entire point of a public key is that it&#x27;s public, and the point of signatures is to show that something belongs to you. An anonymous signature makes no sense, because signing something is putting your name on it. If you wanted to be anonymous in the sense that your public key cannot be recovered from a message, you wouldn&#x27;t sign the message.
评论 #40762309 未加载
评论 #40761635 未加载
评论 #40761497 未加载
评论 #40766542 未加载
killerstorm11 months ago
Fun fact: Ethereum transaction does not include sender&#x27;s address or pubkey.<p>It is calculated from the signature.<p>I&#x27;m not sure if Bitcoin can use this trick, at least the classic transaction types explicitly included pubkey.
评论 #40761391 未加载
评论 #40759027 未加载
评论 #40758957 未加载
评论 #40761825 未加载
TrailMixRaisin11 months ago
I get this as a hobby but I fail to find any &quot;attack scenarios&quot; where this is relevant. Public keys are the most public thing I can think of. Without a public key you cannot check if a signature is valid. I cannot see any scenario where a person might use its private key to sign something and not wish everybody else to have the corresponding public key to verify it. I wish the author had made some examples when this gets relevant and when I have to design my protocols accordingly.
评论 #40760089 未加载
评论 #40759083 未加载
评论 #40760823 未加载
评论 #40759078 未加载
评论 #40760637 未加载
lxgr11 months ago
Is there a name for this property (i.e. a signature scheme only allowing an observer to realize that messages m1 and m2 are signed by the same public key if they know that public key)?<p>I suppose it&#x27;s an easy enough property to add to any signature protocol via a designated verifier scheme, and just defining the public key to be a combination of the public signature key and the secret verifier key.<p>I also wonder whether there is any formal proof (or at least an intuitive argument for why it would be intractable) for the variant of Schnorr signatures mentioned in the article.
评论 #40763320 未加载