-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Perform a security audit to this library #5
Comments
After studying the source code it seems to me that you do not deal with this problem: https://en.wikipedia.org/wiki/Shamir's_Secret_Sharing#Problem Maybe there's something I didn't understand. Are you treating this problem? And if so how? |
Hi @librelois, thanks for you input. We deal with this problem by using finite field arithmetic, like the solution proposed in the link you shared. More concretely, we use the Galois Field of characteristic 2 and dimension 8. This a good tradeoff because it makes it difficult to gain information for the reasons stated in the link and at the same time is computationally efficient because it allows to implement the algorithm using binary operations. |
Indeed I had focused only on the math module and I thought that the additions and multiplications were done like on a classical u8. |
Howdy, an organization I'm affiliated with has paid for a security audit of a project that uses |
I would like help from the community to run a serious security audit around this library and write issues about possible vulnerabilities
The text was updated successfully, but these errors were encountered: