Schnorr Signatures


Schnorr signatures have been proposed for Bitcoin. They have also been used extensively in other cryptocurrencies, such as Nxt and CryptoNote coins. In the simplest case, a Schnorr signature ECDSA cryptosystem can be described as follows:

  1. where is the public key point on the curve, is the private scalar, is the curve generator.
  2. where is the point on the curve resulting from the multiplication of , the nonce scalar, by the generator.
  3. where is a secure hash function, is the message (usually a 32 byte hash), and is the encoded point previously described. denotes concatenation.
  4. where is the scalar denoted from .
  5. The signature is , and verification is simply .

In the above, multiplications by a capital letter (e.g., ) are point multiplications by a scalar, and so always result in a point on the curve. Addition of these points results in another point. Additions and multiplications of scalars amongst themselves is the same as regular multiplication you would do with any integer. It’s important to note that multiplying a point by a scalar is considered an irreversible step, because the calculation of the scalar from the new point defaults to the discrete logarithm problem.

From the above it is clear that is a point on the curve, while is a scalar. Consider the group of signers represented by with nonces . The public key for the private scalar sum would be: . The signature for these sums (from all group participants) would be: . To generate this signature all participants would have to share their private key and nonces beforehand. We want to obviously avoid this, so instead let us have each participant create a partial signature. (the sum of the public nonce points, which the participants may freely individually publish) . Substituting this into the general formulas for signatures and using point or scalar addition: (the same as above) (simple scalar addition; it must be true that . Doing an m-of-n signature is non-trivial. It has been suggested that a merkle tree containing all possible public key sums for participants be used for these cases, generating a sized signature [28].


References