There is the well known attack on ecdsa, where you can calculate the signing secret from two signatures for the same key for two different messages with the same signing secret.
Another less known, but similar attack, is where you have a chain of signatures and public keys linked in a circle. Given these signatures:
r1*x1 -s1*k1 = -m1 r2*x1 -s2*k2 = -m2 r2*x2 -s3*k2 = -m3 r3*x2 -s4*k3 = -m4 r3*x3 -s5*k3 = -m5 r1*x3 -s6*k1 = -m6converted to a matrix equation
(r1 0 0 -s1 0 0 ) (x1)= (-m1) (r2 0 0 0 -s2 0 ) (x2)= (-m2) ( 0 r2 0 0 -s3 0 ) (x3)= (-m3) ( 0 r3 0 0 0 -s4 ) (k1)= (-m4) ( 0 0 r3 0 0 -s5 ) (k2)= (-m5) ( 0 0 r1 -s6 0 0 ) (k3)= (-m6)This can by solved by triangulation. Note that due to the amibguity in the signature, you have to try all 26 possible combination of signs for the 's' values.
r*x = s*k-m
for the six transactions mentioned below:
0x0389638bfce93ab40097435f21d380c0b3371e4d2f2e15113d7759299014e02f * 0x919a42e754e5fcbd74cabdab7b8243dd0b1ab1f8db07a3382717253c3f2ac1ad == 0x5e44b6d4a11b8b62155393cb84b0ac4935d23cc4e8b2b6bf381c4192fb07d9a7 * 0x02ebdb803f48d249a21ae25436b2dfdd5bb308262ae6f5446142d9f094027ae7 - 0x55a8fe91ff401192205e31f4b06f90adc3c5369bf399eb4429cb2751a1ce2cc8 0x647345f1b4d51d22e41d4555e63c58362bab3fe9d58de1df8340d0a9ba921af5 * 0x919a42e754e5fcbd74cabdab7b8243dd0b1ab1f8db07a3382717253c3f2ac1ad == 0x7681e4d5dfbabc9f65a03cc8370b5bf9bc4e1b19aae7d652eb4dd5aa12253aa9 * -0x02ebdb803f48d249a21ae25436b2dfdd5bb308262ae6f5446142d9f094027ae7 - 0x8af76ff2ab7f5b20ccc0eec5f34077a6532f5f7f2e84befbeb2c7a96a5a87dc8 0x647345f1b4d51d22e41d4555e63c58362bab3fe9d58de1df8340d0a9ba921af5 * 0xe9865bfa35a9b3cb6fed461c4a39284f04511b4b8f6972a9ebfc7c1f52687083 == 0x6546cc8fd23acd5e2c64bf6b09f9990a7a42be1b7a3b1dc9786ac77802b6cf73 * 0x5511473f7db5dd5435f02b1a1ef45ab046ad970ef91ed7c6039f588e201c038f - 0x4de4c6c9b0528a460f3d70b84e5fae9109bbb905f07c9fc8f09219a379032e1a 0x25c5c21ff897eeece140ddf4cd7a0a474ca5d2d35e02048b1fd79303aee7fe33 * 0xe9865bfa35a9b3cb6fed461c4a39284f04511b4b8f6972a9ebfc7c1f52687083 == 0x3ffe8060b405489f51b59444efdce73206b36eb09b1381c2ce5c3223e8a51c68 * 0x5511473f7db5dd5435f02b1a1ef45ab046ad970ef91ed7c6039f588e201c038f - 0x2beed53a6a08594c44f7bd47774f49f7081f43fe409aa3be178fcac0a71e589d 0x25c5c21ff897eeece140ddf4cd7a0a474ca5d2d35e02048b1fd79303aee7fe33 * 0xdcb5b2839d1844adb363f3849d53f081af12fa667c701ff08c5cd5b8cbe71d17 == 0x45ca407b097c00c1239b173b11a098d1230259c23c2485d8509e5291f7863d7d * -0x2c6a989a806bbac597ee2d932429d702352d8772dd0c4ae6efae5ac0db87d882 - 0x1cedb93f250fca21974fc111b4774d84a9a01ce5c3c13cfe9588d8a4c81d4327 0x0389638bfce93ab40097435f21d380c0b3371e4d2f2e15113d7759299014e02f * 0xdcb5b2839d1844adb363f3849d53f081af12fa667c701ff08c5cd5b8cbe71d17 == 0x2b356ecf926cc37f5331222ea71cd5c13d729e4f19fd867bf24db46eb87dd99d * -0x2c6a989a806bbac597ee2d932429d702352d8772dd0c4ae6efae5ac0db87d882 - 0xe8b810b5cb497a42e0c7fcea4541e11291dc61d90d767c76d9ba820a7ab7c6cfThese are the corresponding transactions: