"However, this means we need the full R coordinates. There can be up to 4 different points with a given "X coordinate modulo n". (2 because each X coordinate has two possible Y coordinates, and 2 because r+n may still be a valid X coordinate)"
waxwing
but in short, i just started wondering why "and 2 because r+n may still be a valid X coordinate" in Pieter Wuille's answer, is true.
proslogion
hmmm
haha
:)
waxwing
yeah, i mean it *is* true, clearly, but .. i wondered about why.
proslogion
well, i mean, r+n could like, wrap you around from the infinity point i think?
waxwing
infinity is only for curve points; it's nG or identity element
proslogion
my confusion
waxwing
i think visually it's easier, it's a tangent to the curve when you do point addition.
like, take two points, you get the sum by the third intersection with the curve
but add a point to itself and you're dealing with a tangent
or, subtract, sorry
proslogion
nah, i just confused it a bit, don't worry
waxwing
btw if you're interested in such stuff the pubkey recovery algo can be found in sec1-v1.pdf .. you can see the same logic as what sipa described ^ there.
belcher joined the channel
proslogion
waxwing: note in the wikipedia article, the requirement of n x Q_A=O
waxwing
yes but that '0' is point at infinity
proslogion
since when doing verification you will need to multiply rw mod n to Q_A
i guess r cannot be larger than n
waxwing
proslogion: are you looking at ECDSA on wiki?
proslogion
yes
waxwing
ah yes. i *think* you're right, it has to be mod n.
well. 'think' not *think*. guess it must be.
but already we have w = s^-1 mod n so that's in mod n.
proslogion
Errr...........
waxwing: in RFC6979, the k value appears to be created directly out of hash function? not limited by n-1?