Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Have set_embedded_elliptic_curve_key bind to a network #595

Open
kayabaNerve opened this issue Aug 15, 2024 · 1 comment
Open

Have set_embedded_elliptic_curve_key bind to a network #595

kayabaNerve opened this issue Aug 15, 2024 · 1 comment
Labels
improvement This could be better runtime

Comments

@kayabaNerve
Copy link
Member

The issue with having a single key per embedded elliptic curve is that the Bitcoin processor (if compromised) leaks the decryption key for the Ethereum processor (as they're one in the same).

@kayabaNerve kayabaNerve added improvement This could be better runtime labels Aug 15, 2024
@kayabaNerve
Copy link
Member Author

The issue also applies for the key used for the Subtrate DKG. The amount of keys being passed around is sufficiently annoying I'd argue we should have a single root key in the orchestrator, establish explicit derivation paths, and have the processor take its partially derived key (having it finish the derivation on its end so we only pass one key, not multiple).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
improvement This could be better runtime
Projects
None yet
Development

No branches or pull requests

1 participant