Table of Contents
- Introduction
- Background
-
Mimblewimble
Multiparty Bulletproof UTXO -
Mimblewimble
Multiparty Bulletproof UTXO - Comparison to Bitcoin
- Conclusions, Observations and Recommendations
- References
- Appendices
- Contributors
Introduction
In Mimblewimble, the concept of a Bitcoin-type multi-signature (multisig) applied to an Unspent Transaction Output (UTXO) does not really exist.
In Bitcoin, multisig payments are usually combined with Pay to Script Hash (P2SH) functionality as a means to send funds to a P2SH payment address, and then to manage its expenditure from there. The redeem script itself sets the conditions that must be fulfilled for the UTXOs linked to the P2SH payment address to be spent ([1], [2]).
Unlike Bitcoin, Mimblewimble transactions do not involve payment addresses, as all transactions are confidential. The only requirement for a Mimblewimble UTXO to be spent is the ability to open (or unlock) the Pedersen Commitment that contains the tokens; it does not require an “owner” signature. A typical Mimblewimble UTXO looks like this [9]:
Another fundamental difference is that for any Mimblewimble transaction, all parties, i.e. all senders and all receivers, must interact to conclude the transaction.
Background
Bitcoin Multisig in a Nutshell
Multiple use cases of
redeemScript = <OP_2> <A pubkey> <B pubkey> <C pubkey> <OP_3> OP_CHECKMULTISIG
The P2SH payment address is the result of the redeem script double hashed with SHA-256 and RIPEMD-160 and then
Base58Check encoded with a prefix of 0x05
:
redeemScriptHash = RIPEMD160(SHA256(redeemScript))
P2SHAddress = base58check.Encode("05", redeemScriptHash)
Multiple payments can now be sent to the P2SH payment address. A generic funding transaction’s output script for the P2SH payment address has the following form, irrespective of the redeem script’s contents:
scriptPubKey = OP_HASH160 <redeemScriptHash> OP_EQUAL
with OP_HASH160
being the combination of SHA-256 and RIPEMD-160. The
scriptSig = OP_0 <A sig> <C sig> <redeemScript>
and the combined spending and funding transaction script (validation script) would be
validationScript = OP_0 <A sig> <C sig> <redeemScript> OP_HASH160 <redeemScriptHash> OP_EQUAL
When validationScript
is executed, all values are added to the execution stack in sequence. When opcode OP_HASH160
is encountered, the preceding value <redeemScript>
is hashed and added to the stack; and when opcode OP_EQUAL
is
encountered, the previous two values, hash of the <redeemScript>
and <redeemScriptHash>
, are compared and removed
from the stack if equal. The top of the stack then contains <redeemScript>
, which is evaluated with the two entries on
top of that, <A sig>
and <C sig>
. The last value in the stack, OP_0
, is needed for a glitch in the OP_CHECKMULTISIG
opcode implementation, which makes it pop one more item than those that are available on the stack ([1], [[5]]).
What is signed?
Partial signatures are created in the same sequence in which the public keys are defined in redeemScript
. A simplified
serialized hexadecimal version of the transaction - consisting of the input transaction ID and UTXO index, amount to be
paid, scriptPubKey
and transaction locktime - is signed. Each consecutive partial signature includes a serialization
of the previous partial signature with the simplified transaction data to be signed, creating multiple cross-references
in the signed data. This, combined with the public keys, proves the transaction was created by the real owners of the
bitcoins in question ([4], [[5]], [6]).
How is change redirected to the multisig P2SH?
Bitcoin transactions can have multiple recipients, and one of the recipients of the funds from a P2SH multisig
transaction can be the original P2SHAddress
, thus sending change back to itself. Circular payments to the same
addresses are allowed, but they will suffer from a lack of confidentiality. Another way to do this would be to create a
new redeemScript
with a new set of public keys every time a P2SH multisig transaction is done to collect the change,
but this would be more complex to manage [4].
Security of the Mimblewimble Blockchain
A Mimblewimble blockchain relies on two complementary aspects to provide security:
Pedersen Commitments
and range proofs (in the form of Bulletproof range proofs).
Pedersen Commitments, e.g.
In Mimblewimble, this means that an adversary, with infinite computing power, can determine alternate pairs
In addition to range proofs assuring that all values are positive and not too large, strictly in the range
The importance of Range Proofs
The role that Bulletproof range proofs play in securing the blockchain can be demonstrated as follows. Let
$ Ca(v_1 , k_1)
A valid Mimblewimble transaction would have the following form:
where the unspent-hiding-blinding commitment from Alice is
If Bob can convince Alice that she must create a fund over which both of them have signing powers (
Secure Sharing Protocol
Multiple parties working together to create a single transaction that involves multiple steps, need to share information in such a way that what they shared cannot work against them. Each step requires a proof, and it should not be possible to replay an individual step’s proof in a different context. Merlin transcripts [7] is an excellent example of a protocol implementation that achieves this. For the purposes of this report, a simple information sharing protocol is proposed that can be implemented with Merlin transcripts [7].
Mimblewimble Multiparty Bulletproof UTXO
Simple Sharing Protocol
Alice, Bob and Carol agree to set up a multiparty
This ensures that public values for each step are not exposed until all commitments have been received. They will apply
this simple sharing protocol to all information they need to share with each other. This will be denoted by
Setting up the Multiparty Funding Transaction
In the transaction Alice, Bob and Carol want to set up,
In order for this scheme to work, they must be able to jointly sign the transaction with a Schnorr signature, while
keeping their portion of the shared blinding factor secret. Each of them creates their own private blinding factor
They proceed to calculate their own total excess blinding factors as
$ x{sn} = \sum k{n(change)} - \sum k_{n(inputs)} - \phi_n
The offset $ \phin
They now have enough information to calculate the aggregated public key for the signature:
Each party also selects a private nonce
and calculates the aggregated public nonce for the signature:
The signature challenge
Each party now uses their private nonce $ rn
These partial signatures are then shared with the group to be aggregated:
The aggregated Schnorr signature for the transaction is then simply calculated as
The resulting signature for the transaction is the tuple $ (s{agg},R{agg})
To validate that no funds are created, the total offset must also be stored in the transaction kernel, so the parties also share their offset and calculate the total:
The transaction balance can then be validated to be equal to a commitment to the value
Creating the Multiparty Bulletproof Range Proof
One crucial aspect in validating the transaction is still missing, i.e. each new UTXO must also include a Bulletproof
range proof. Up to now, Alice, Bob and Carol could each keep their portion of the shared blinding factor
Utilizing Bulletproofs MPC Protocol
This scheme involves coloring the UTXO to enable attachment of additional proof data, a flag to let the miners know that they must employ a different set of validation rules and a hash of the UTXO and all metadata. The Bulletproofs Multiparty Computation (MPC) protocol can be used in a special way to construct a range proof that can be validated by the miners. Aggregating the range proofs using this protocol provides a huge space saving; a single Bulletproof range proof consists of 672 bytes, whereas aggregating 16 only consists of 928 bytes [11]. For this scheme, the simple information sharing protocol will not be adequate; an efficient, robust and secure implementation of the Bulletproof MPC range proof such as that done by Dalek Cryptography [[10]] is suggested.
This scheme works as follows. Alice, Bob and Carol proceed to calculate an aggregated MPC Bulletproof range proof for the combined multiparty funds, but with each using their own secret blinding factor in the commitment. They therefore construct fake commitments that will be used to calculate fake range proofs as follows:
Notice that
and that rounding implementation of
Running the Bulletproof MPC range proof will result in a proof share for each party for their fake commitments, which
will be aggregated by the dealer according to the MPC protocol. Any one of the party members can be the dealer, as the
objective here is just to create the aggregated range proof. Let the aggregated range proof for the set
$ \lbrace C1, C_2, C_3 \rbrace
Range proof validation by miners will involve
instead of
Utilizing Grin’s Shared Bulletproof Computation
Grin extended the
Inner-product Range Proof
implementation to allow for multiple parties to jointly construct a single Bulletproof range proof
In order to construct the shared Bulletproof range proof
With this implementation, Alice needs to act as the dealer. When they get to steps (53) to (61) in Figure 5 of the inner-product range proof protocol, they introduce the following changes:
- Each party shares
and with all other parties. - Each party calculates
and . - Each party calculates
based on and . - Each party shares
with the dealer. - The dealer calculates
. - The dealer completes the protocol, using their own private
, where a further blinding factor is required, and calculates .
Using this approach, the resulting shared commitment for Alice, Bob and Carol is
with the UTXO tuple being
Comparison of the Two Bulletproof Methods
Consideration | Using Dalek’s Bulletproofs MPC Protocol | Using Grin’s Multiparty Bulletproof |
---|---|---|
Rounds of communication | Three | Two |
Information sharing security | Use of Merlin transcripts, combined with the MPC protocol, makes this method more secure against replay attacks. | No specific sharing protocol suggested, but potentially easy to implement, as described here. |
Guarantee of honest dealer | With the standard MPC protocol implementation, there is no guarantee that the dealer behaves honestly according to the protocol and generates challenges honestly, but this aspect could be improved as suggested in that report. | Although each party independently computes challenges themselves, it isn’t clear what the implications of a dishonest dealer would be in practice. |
Size of the Bulletproof | Logarithmic Bulletproof range proof size, i.e. 672 bytes up to 928 bytes for 16 range proofs. | Single Bulletproof range proof size of 672 bytes. |
Colored coin | Coins are colored, i.e. distinguishable from normal commitments in the blockchain due to additional metadata. | Coins do not need to be colored, i.e. it may look exactly like any other commitment. |
Wallet reconstructability | Each individual range proof’s data is accessible within the aggregated range proof. It is possible to identify the colored coin and then to reconstruct the wallet if the initial blinding factor seed is remembered in conjunction with Bulletproof range proof rewinding. | The wallet cannot be reconstructed, as a single party’s blinding factor cannot be distinguished from the combined range proof. Even if these coins were colored with a flag to make them identifiable, it would not help. |
Hiding and binding commitment | The main commitment and additional commitments in the UTXO’s metadata retain all hiding and binding security aspects of the Pederson Commitment. | The commitment retains all hiding and binding security aspects of the Pederson Commitment. |
Spending the Multiparty UTXO
Alice, Bob and Carol had a private bet going that Carol won, and they agree to spend the multiparty UTXO to pay Carol her winnings, with the change being used to set up a consecutive multiparty UTXO. This transaction looks as follows:
Similar to the initial transaction, they each create their own private blinding factor
As before, they calculate their own total excess blinding factors as
They share the public value of the excess
The aggregated public key for the signature can then be calculated as:
Each party again selects a private nonce
and calculates the aggregated public nonce for the signature:
The new signature challenge
Each party now calculates their partial Schnorr signature
These partial signatures are then shared with the group
to enable calculation of the aggregated Schnorr signature as
The resulting signature for the transaction is the tuple
Again the parties also share their own personal offset so that the total offset can be calculated:
Lastly, the transaction balance can be validated to be equal to a commitment to the value
Mimblewimble Multiparty Bulletproof UTXO
As mentioned in the Introduction, Mimblewimble transactions cannot utilize a smart/redeem script in the
form of a P2SH, but similar functionality can be implemented in the users’ wallets. For the
The shards will be distributed according to [Pedersen’s Verifiable Secret Sharing][pvss~] (VSS) scheme, which extends
the SSSS, where the dealer commits to the secret
Secret Sharing
Our friends Alice, Bob and Carol decide to set up a
Multiple Rounds’ Data
The parties will each pre-calculate
Round | Blinding Factor |
Vectors of Commitments |
Alice’s Shards |
Bob’s Shards |
Carol’s Shards |
---|---|---|---|---|---|
1 | Alice: $ (k{1\text{-}1}, b{1\text{-}1}) |
$ \mathbf{C{2}}( k{2\text{-}1}) |
$ (k{1\text{-}a1}, b{1\text{-}a1}) |
$ (k{1\text{-}b1}, b{1\text{-}b1}) |
$ (k{1\text{-}c1}, b{1\text{-}c1}) |
2 | Alice: $ (k{1\text{-}2}, b{1\text{-}2}) |
$ \mathbf{C{2}}( k{1\text{-}2}) |
$ (k{1\text{-}a2}, b{1\text{-}a2}) |
$ (k{1\text{-}b2}, b{1\text{-}b2}) |
$ (k{1\text{-}c2}, b{1\text{-}c2}) |
3 | Alice: $ (k{1\text{-}3}, b{1\text{-}3}) |
$ \mathbf{C{2}}( k{1\text{-}3}) |
$ (k{1\text{-}a3}, b{1\text{-}a3}) |
$ (k{1\text{-}b3}, b{1\text{-}b3}) |
$ (k{1\text{-}c3}, b{1\text{-}c3}) |
How it Works
The three parties set up the initial multiparty funding transaction
and Bulletproof range proof exactly the same as they did for the
Bob and Carol decide to spend funds, exactly like before, and for this they need to reconstruct Alice’s private blinding factor for round 1 and round 2. Because Alice did not win anything, she does not need to be present to set up a private blinding factor for an output UTXO the way Carol needs to do. Bob and Carol consequently share the shards Alice gave them:
They are now able to reconstruct the blinding factors and verify the commitments to it. If the verification fails, they stop the protocol and schedule a meeting with Alice to have a word with her. With all three together, they will be able to identify the source of the misinformation.
For this round they choose Bob to play Alice’s part when they set up and conclude the transaction. Bob is able to do
this, because he now has Alice’s private blinding factors $ k{1\text{-}1}
The next time two of our friends want to spend some or all of the remainder of their multiparty UTXO, they will just repeat these steps, starting at round 2. The only thing that will be different will be the person nominated to play the part of the party that is absent; they have to take turns at this.
Spending Protocol
Alice, Bob and Carol are now seasoned at setting up their
-
All parties must always know who shared shards and who played the missing party’s role for each round. Therefore, all parties must always be included in all sharing communication, even if they are offline. They can then receive those messages when they become available again.
-
The spend is aborted if any verification step does not complete successfully. To recommence, the parties have to cancel all unused shards, calculate new shards for the remainder and start again. For this, all parties need to be present.
-
No party may play the role of an absent party twice in a row. If Alice is absent, which usually happens, Bob and Carol must take turns.
Conclusions, Observations and Recommendations
Comparison to Bitcoin
Given the basic differences between Bitcoin and Mimblewimble as mentioned in the Introduction, and the multiparty payment scheme introduced here, the following observations can be made:
-
Miner Validation
In Bitcoin, the P2SH multisig redeem script is validated by miners whenever a multisig payment is invoked. In addition, they also validate the public keys used in the transaction.
With Mimblewimble multiparty transactions, miners cannot validate who may be part of a multiparty transaction, only that the transaction itself complies with basic Mimblewimble rules and that all Bulletproof range proofs are valid. The onus is on the parties themselves to enforce basic spending protocol validation rules.
-
In both Bitcoin and Mimblewimble,
transactions are possible. The difference is in where and how validation rules are applied. -
Security
Bitcoin multiparty transactions are more secure due to the validation rules being enforced by the miners.
-
Complexity
Implementing
multiparty transactions in Mimblewimble will involve wallets to store more data and implement more functionality than when compared to Bitcoin, e.g. Pedersen’s VSS scheme.
General
-
Bulletproof Range Proof
The choice between using Dalek’s Bulletproofs MPC Protocol or Grin’s multiparty Bulletproof to construct a multiparty range proof is important. Although using Dalek’s method involves more rounds of communication, with a slightly larger proof size and the requirement to have the coins colored, it has definite advantages. It trumps on wallet reconstructability and information sharing security while executing the protocol, although the latter could easily be enhanced for the Grin implementation.
-
Practicality
The Mimblewimble multiparty Bulletproof UTXO as proposed can be practically implemented for both the
and cases. -
Information Sharing Protocol
The Simple Sharing Protocol as suggested here may need some more work to make it optimal.
-
Generalization
Although all examples presented here were for three parties, this could easily be generalized.
References
[1] “The Best Step-by-Step Bitcoin Script Guide Part 2” [online]. Available: https://blockgeeks.com/guides/bitcoin-script-guide-part-2. Date accessed: 2019‑05‑02.
[2] “Script” [online]. Available: https://en.bitcoin.it/wiki/Script. Date accessed: 2019‑05‑06.
[3] “Multisignature” [online]. Available: https://en.bitcoin.it/wiki/Multisignature. Date accessed: 2019‑05‑06.
[4] “Transaction” [online]. Available: https://en.bitcoin.it/wiki/Transaction. Date accessed: 2019‑05‑06.
[[5]] S. Pour, “Bitcoin Multisig the Hard Way: Understanding Raw P2SH Multisig Transactions” [online]. Available: https://www.soroushjp.com/2014/12/20/bitcoin-multisig-the-hard-way-understanding-raw-multisignature-bitcoin-transactions. Date accessed: 2019‑05‑06.
[5]: https://www.soroushjp.com/2014/12/20/bitcoin-multisig-the-hard-way-understanding-raw-multisignature-bitcoin-transactions ‘Bitcoin Multisig the Hard Way: Understanding Raw P2SH Multisig Transactions’
[6] GitHub: “gavinandresen/TwoOfThree.sh” [online]. Available: https://gist.github.com/gavinandresen/3966071. Date accessed: 2019‑05‑06.
[7] H.de Valence, I. Lovecruft and O. Andreev, “Merlin Transcripts” [online]. Available: https://merlin.cool/index.html and https://doc-internal.dalek.rs/merlin/index.html. Date accessed: 2019‑05‑10.
[[8]] T. Pedersen, “Non-interactive and Information-theoretic Secure Verifiable Secret Sharing” [online]. Available: https://www.cs.cornell.edu/courses/cs754/2001fa/129.pdf. Date accessed: 2019‑05‑10.
[8]: https://www.cs.cornell.edu/courses/cs754/2001fa/129.pdf ‘Non-interactive and Information-theoretic Secure Verifiable Secret Sharing’
[9] “GrinExplorer, Block 164,690” [online]. Available: https://grinexplorer.net/block/0000016c1ceb1cf588a45d0c167dbfb15d153c4d1d33a0fbfe0c55dbf7635410. Date accessed: 2019‑05‑10.
[[10]] “Dalek Cryptography - Crate Bulletproofs - Module bulletproofs::range_proof_mpc” [online]. Available: https://doc-internal.dalek.rs/bulletproofs/range_proof_mpc/index.html. Date accessed: 2019‑05‑10.
[10]: https://doc-internal.dalek.rs/bulletproofs/range_proof_mpc/index.html ‘Dalek Cryptography - Crate Bulletproofs Module bulletproofs::range_proof_mpc’
[11] B. Bünz, J. Bootle, D. Boneh, A. Poelstra, P. Wuille and G. Maxwell, “Bulletproofs: Short Proofs for Confidential Transactions and More” (Slides) [online]. Available: https://cyber.stanford.edu/sites/default/files/bpase18.pptx. Date accessed: 2019‑05‑11.
[12] “Grin Multiparty Bulletproof - jaspervdm” [online]. Available: https://i.imgur.com/s7exNSf.png. Date accessed: 2019‑05‑10.
[13] GitHub: “Multi-party bulletproof PR#24” [online]. Available: https://github.com/mimblewimble/secp256k1-zkp/pull/24. Date accessed: 2019‑05‑10.
[[14]] GitHub: “secp256k1-zkp/src/modules/bulletproofs/tests_impl.h, test_multi_party_bulletproof” [online]. Available: https://github.com/mimblewimble/secp256k1-zkp/blob/master/src/modules/bulletproofs/tests_impl.h. Date accessed: 2019‑05‑10.
[14]: https://github.com/mimblewimble/secp256k1-zkp/blob/master/src/modules/bulletproofs/tests_impl.h ‘GitHub: secp256k1-zkp/src/modules/bulletproofs/tests_impl.h, test_multi_party_bulletproof’
[[15]] “MATH3024 Elementary Cryptography and Protocols: Lecture 11, Secret Sharing”, University of Sydney, School of Mathematics and Statistics [online]. Available: http://iml.univ-mrs.fr/~kohel/tch/MATH3024/Lectures/lectures_11.pdf. Date accessed: 2018‑09‑18.
[15]: http://iml.univ-mrs.fr/~kohel/tch/MATH3024/Lectures/lectures_11.pdf ‘MATH3024 Elementary Cryptography and Protocols: Lecture 11, Secret Sharing’
[16] I. Coleman, “Online Tool: Shamir Secret Sharing Scheme” [online]. Available: https://iancoleman.io/shamir. Date accessed: 2019‑05‑27.
[17] P. Laud, “Cryptographic Protocols (MTAT.07.005): Secret Sharing”, Cybernetica [online]. Available: https://research.cyber.ee/~peeter/teaching/krprot07s/ss.pdf. Date accessed: 2019‑05‑29.
[[18]] T. Pedersen, “Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem”, DPB, vol. 21, no. 388, Mar. 1992 [online]. Available: https://doi.org/10.7146/dpb.v21i388.6621. Date accessed: 2019‑06‑03.
[18]: https://doi.org/10.7146/dpb.v21i388.6621 ‘Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem’
[19] Wikipedia: “Shamir’s Secret Sharing” [online]. Available: https://en.wikipedia.org/wiki/Shamir%27s_Secret_Sharing. Date accessed: 2019‑05‑06.
Appendices
Appendix A: Notation Used
This section gives the general notation of mathematical expressions used. It provides important pre-knowledge for the remainder of the report.
-
All Pedersen Commitments will be of the elliptic derivative depicted by
with being the value committed to and being the blinding factor. -
Scalar multiplication will be depicted by “
”, e.g. . -
A Pedersen Commitment to the value of
will be depicted by . -
Let
be a collision-resistant hash function used in an information sharing protocol where is the value being committed to. -
Let
be Bulletproof range proof data for commitment . -
Let
be aggregated Bulletproof range proof data for a set of commitments . -
Let $ \mathbf {C{m}}(v)
(C_0 , \ldots , C{m-1}) v $.
Appendix B: Definition of Terms
Definitions of terms presented here are high level and general in nature. Full mathematical definitions are available in the cited references.
-
Shamir’s Secret Sharing Scheme: A
threshold secret sharing scheme is a method for parties to carry shards/shares of a secret message such that any of them can reconstruct the message. The threshold scheme is perfect if knowledge of or fewer shards provides no information regarding . Shamir’s Secret Sharing Scheme provides a perfect threshold scheme using Lagrange interpolation ([[15]], [17, [19]).- Given
distinct points of the form , where is a polynomial of degree less than , then according to the Lagrange interpolation formula and is determined by
- Shamir’s scheme is defined for a secret message
with prime , by setting $ a0 = f(0) = s f(x) a_1, \ldots , a{m−1} \mathbb{Z}/p\mathbb{Z} f(i) 1 \leq i \leq n $, where
- The shards
are distributed to the distinct parties. Since the secret is the constant term , it is recovered from any shards for by
- Given
[ssss~]: #ssss “Appendix B: Shamir’s Secret Sharing Scheme is an (m, n) threshold scheme for n parties to carry shares of a secret message such that any m of them can reconstruct the message.”
-
Pedersen Verifiable Secret Sharing: The Pedersen Verifiable Secret Sharing scheme is a non-interactive
threshold VSS scheme that combines Pedersen Commitments and [Shamir’s Secret Sharing Scheme][ssss~] ([[8]], [17], [[18]). This is to ensure the dealer gives consistent shares to all parties and that any party can know that the recovered secret is correct.-
The dealer creates a commitment to the secret
for a randomly chosen blinding factor as . -
The dealer constructs the SSSS sharing polynomial
as before by setting $ a0 = s a_1, \ldots , a{m−1} $. -
The dealer also constructs a blinding factor polynomial
, similar to the SSSS polynomial, by setting $ b0 = r b_1, \ldots , b{m−1} $. -
The dealer constructs commitments to the secret coefficients of
as for . -
The dealer broadcasts the vector of commitments $ \mathbf {C{m}} = (C_0 , \ldots , C{m-1}) $ to all parties.
-
The dealer calculates
from polynomials for and distributes the individual shards to the distinct parties. -
Upon receipt of their shard
, each party calculates their own commitment and verifies that:
-
The secret
is recovered as before as per the SSSS from any shards. -
In addition to reconstructing the secret
, the following can be done:- Since the blinding factor is the constant term
, the blinding factor is recovered from any shards for by
- Since $ C0
\mathbf {C{m}} s $ that was committed to in the first place when the shards have been shared among the parties as:
- Since the blinding factor is the constant term
-
[pvss~]: #pvss “Appendix B: The Pedersen Verifiable Secret Sharing scheme is a non-interactive (m, n) threshold scheme that combines Pedersen commitments and Shamir’s Secret Sharing Scheme.”
Appendix C: Shamir’s Secret Sharing Example
One of the private blinding factors Alice calculated and wants to share with Bob and Carol is
Alice’s shard:
Bob’s shard:
Carol’s shard:
Using any two of these shards with the tool provided in [16], Alice’s original private blinding factor can be recreated. Try it out!
Note: This example shows blinding factor shards created with the SSSS tool developed by Coleman [16]. It was merely developed for demonstration purposes and does not make any claims to meet cryptographic security rules other than using secure randomness.