<oembed><type>rich</type><version>1.0</version><author_name>Bugtus (npub1se…mnhp3)</author_name><author_url>https://nostr.ae/npub1sezgmhk40mk5znnqse5jz4mjx40vszz45zwqnf7wyxqvdz0t8wnq9mnhp3</author_url><provider_name>njump</provider_name><provider_url>https://nostr.ae</provider_url><html>nostr:nprofile1qqsqa6p85dhghvx0cjpu7xrj0qgc939pd3v2ew36uttmz40qxu8f8wq8vdeta Why does Bob send hash(r1, r2, a, c&#39;) to Alice in the first place? Afterall, can&#39;t Bob just send r1 and r2 to Alice, Alice challenges him by sending back a random number e and Bob sends back s = r + e*a. Wouldn&#39;t that also prove that he used the same private key for the signature and his pubkey? &#xA;&#xA;</html></oembed>