Hi sashabeton,
> Honestly, this idea might have had better timing a few years ago.
No I don't think so; it was discussed at the time (specifically, pubkey recovery). I remember bringing it up in the taproot review sessions on IRC. I'm sure others, including the taproot designers, discussed this issue well before I thought about it :)
Perhaps this clarifies it for other mailing list readers:
BIP340 Schnorr signatures are the form of Schnorr signature which has what is commonly termed "pubkey prefixing"; the challenge hash is e = H(R, P, m) with P the public key. This makes a pubkey recovery algorithm of the type that we have in our legacy ECDSA signatures, impossible. It's a point of not-only-historical interest that the original Schnorr signature design was H(R, m) not H(R, P, m) and that even around the time when ECDSA was being designed to avoid the Schnorr patent, and later, it was a point of considerable contention amongst various system designers, whether pubkey prefixing was needed or not.
Pubkey prefixing makes all of the security reductions much more meaningful, since it can make the concept of "resistant to forgery" much more wide-ranging and powerful (in short, imagine the idea that you can make up a schnorr signature for some arbitrary key that wasn't used before .. this is sorta kinda true for non-pubkey-prefixed Schnorr). And that has big implications for perhaps the biggest application of Schnorr in Bitcoin, which is aggregation; aggregation in a bitcoin context means *aggregating arbitrary, new, ephemeral keys*, not keys previously recorded in some certificate registry or whatever. You're not going to get sensible versions of MuSig without pubkey prefixing, because you couldn't stop adversaries making up malicious keys that they don't have to commit to.
Without that kind of aggregation scheme (and see e.g. DahLIAS and CISA, if you don't actually care about multisig for whatever reason; it could end up being very important for Bitcoin scaling anyway), Schnorr is a lot less of an upgrade to our signing algorithm (though to be fair, still not nothing, it's on sounder theoretical foundations).
Cheers,
AdamISZ/waxwing