You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Apparently, we have to use the original public keys directly. The best explanation I could come up with is this:
At the first round, when the verifiers are aggregating their public keys, they also commit their exact public keys as they are. If we try to use them as their x-only public key counterparts, and take their parities to be even (as it is in here) by default, then while committing to the public keys for the generation of the aggregated public key, hash operations will produce different outputs, hence the failure in the spending of the UTXO with the final signature, since the final signature would be given for a wrong aggregated public key.
Therefore, for now, we have to use public keys directly for MuSig2 operations.
A possible but IMO infeasible solution would be to enforce all the verifiers to use public keys that have even parities by default. But this is in general inconvenient and does not seem to be a good practice.
Proposal Description
The current MuSig2 functionality implementations are working; however, there are two main problems:
The text was updated successfully, but these errors were encountered: