If I sign two messages with the same private key and nonce, it compromises security, making it possible to calculate the private key.
I'm implementing a system (outside of bitcoin) where a message, with a unique property, must be signed only once.
In order to enforce this, I'm making it mandatory to use a hash of the unique property as the nonce.
This means that signing a two messages, having the same unique property, will give away the signer's private key. (Which is not something they want to do, in this system.)
How do I use the secp256k1 functions to obtain a private key from two signed messages which use the same nonce? (This is alluded to in this question.)