By the way, it's great that you brought up these issues of alignment with the EdDSA standards.
Another one that occurs to me is the question of how the commits are chosen. In EdDSA the signer chooses its commit deterministically using a hash based on the secret key and the message. For individual signatures this has a big upside (robustness against broken RNGs) and basically no downside I know of.
In CoSi, signers could use this approach too to generate their individual commits, but they currently do not. And in the case of CoSi the tradeoffs are less clear: the upside of EdDSA's deterministic approach is "attenuated", but there's more of a real downside. By "attenuated" I simply mean the resulting collective signatures remain secure unless *all* of the signers have compromised keys or bad RNGs.
The downside of the EdDSA approach in the CoSi context is that the message to be signed must be made available in the Announcement phase, since all the deterministically-generated Schnorr commits must depend on that message. This means it takes a full two round trips through the tree to produce a collective signature. With randomly-generated commits, in contrast, the Announce and Commit phases can be kept independent of the message to be signed, and hence can be performed ahead of time as a preprocessing step, or pipelined as ByzCoin does, so that from "message available" to "collective signature produced" there's only one full round-trip through the collective signing tree.
The CoSi protocol is already designed to support and permit both of these modes of operation (either include or don't include the message in the round announcement) - but the choice represents an interesting question and set of tradeoffs to consider.
Again thanks for bringing up these issues.
Cheers
Bryan