<oembed><type>rich</type><version>1.0</version><title>Jonas Nick [ARCHIVE] wrote</title><author_name>Jonas Nick [ARCHIVE] (npub1at…y3z5a)</author_name><author_url>https://yabu.me/npub1at3pav59gkeqz9kegzqhk2v4j4r435x42ytf23pxs8crt74tuc8s2y3z5a</author_url><provider_name>njump</provider_name><provider_url>https://yabu.me</provider_url><html>📅 Original date posted:2021-10-09&#xA;📝 Original message:&#xA;Hi,&#xA;&#xA;it seems like parts of this proposal rely on deterministic nonces in MuSig.&#xA;Generally, this is insecure unless combined with heavy machinery that proves&#xA;correctness of the nonce derivation in zero knowledge. If one signer uses&#xA;deterministic nonces and another signer uses random nonces, then two signing&#xA;sessions will have different challenge hashes which results in nonce reuse by&#xA;the first signer [0]. Is there a countermeasure against this attack in the&#xA;proposal? What are the inputs to the function that derive DA1, DA2? Is the&#xA;assumption that a signer will not sign the same message more than once?&#xA;&#xA;It may be worth pointing out that an adaptor signature scheme can not treat&#xA;MuSig2 as a black box as indicated in the &#34;Adaptor Signatures&#34; section [1]. In&#xA;particular, generally the secret X must be input to the hash function that&#xA;generates nonce coefficient k. Otherwise, an attacker can grind through&#xA;challenge hashes by varying X without affecting the aggregate nonce and produce&#xA;a forgery. For the same reason, the message m is included in hash function&#xA;inputs of k. However, taking X into account when computing k shouldn&#39;t be an&#xA;issue for protocols making use of adaptor signatures because k does not need to&#xA;be determined before signing time and X is required to be known at that point&#xA;anyway.&#xA;&#xA;[0] https://medium.com/blockstream/musig-dn-schnorr-multisignatures-with-verifiably-deterministic-nonces-27424b5df9d6&#xA;     See &#34;The attack works as follows.&#34;&#xA;[1] MuSig2 adaptor signature issue: https://github.com/ElementsProject/scriptless-scripts/issues/23,&#xA;     PR: https://github.com/ElementsProject/scriptless-scripts/pull/24</html></oembed>