Post
Topic
Board Development & Technical Discussion
Merits 2 from 1 user
Re: Vulnerability: The curious case of the half-half Bitcoin ECDSA nonces
by
gmaxwell
on 18/06/2023, 20:02:37 UTC
⭐ Merited by pooya87 (2)
You can't validate the range of a private key using the public key without help of someone who knows the key or doing something stupid like constructing the keys as easily guessed offsets.  In the case of the offsets there is only one real secret.

If you could determine a meaningful range from the pubkey alone you could use that to solve for the private key.

With the help of someone knowing the secret they could prove it was in a range using a confidential-transactions like zero knowledge range proof. (which is exactly what CT does... proves the values are in  a range like [0,2^32) that couldn't overflow.)