Implement verification by a threshold of keys
See original GitHub issueDescription of issue or feature request: A verification of signed metadata by a threshold of keys is needed both for client and repository.
Metadata
already has vanilla one-signature verify and could potentially be the right location for this implementation. See https://github.com/theupdateframework/tuf/pull/1060#issuecomment-660056376 for thoughts about that distinction.
Issue Analytics
- State:
- Created 3 years ago
- Comments:12 (11 by maintainers)
Top Results From Across the Web
Building A New Digital World: Threshold Signing and Key ...
This uses the Schnorr signature method, and where we can easily aggregate public keys together. The verification key will then be used to...
Read more >Improper uniqueness verification of signature threshold - GitHub
It allows someone with access to a valid signing key to create multiple valid signatures in order to circumvent TUF requiring a minimum ......
Read more >Verification of Threshold-Based Distributed Algorithms by ...
In this paper we develop a methodology for deductive verification of threshold-based distributed protocols using decidable logic, well- ...
Read more >Threshold Signatures Explained - Binance Academy
Threshold Signature Scheme (TSS) is a cryptographic primitive for distributed key generation and signing. The use of TSS in blockchain ...
Read more >Centralized Threshold Key Generation Protocol Based on ...
This paper proposes an efficient centralized threshold shared secret protocol based on the Shamir secret sharing technique and supporting key ...
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
(Apologies for the brevity of this drive-by comment)
I think delegator verifies the delegated is the right approach (I do not like delegated verifies itself with info from delegator, options 2 & 3 in the original breakdown).
verify_delegate_with_threshold()
in https://github.com/theupdateframework/tuf/compare/develop...jku:verify_with_threshold looks like a good starting point (at first glance it’s missing at least an optionalSigner
parameter).So the problem space is this:
Some options I see are (examples for a hypothetical client that wants to verify a timestamp file it has just downloaded):
(editing to add a fourth option)
This looks nice but does mean the function will have to check that self.signed is a Root or Targets…