Thanks.
1. The senders of the G*xi shares should sign the messages using xi private key. Recipients can verify these and this should be sufficient to prevent a rogue key attacker from controlling x
2. The sender of the G*ki nonces should sign the messages using an "xi*ki" private key. Recipients can verify these and this should be sufficient to prevent a rogue key attacker from controlling k
I updated this with the signing requirements:
https://medium.com/@simulx/an-m-of-n-bitcoin-multisig-scheme-e7860ab34e7f