-
Notifications
You must be signed in to change notification settings - Fork 30
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
IF: CDT support for BLS public keys and signatures #215
Comments
This was referenced Aug 24, 2023
Implementation for encoding/decoding BLS public keys can be shared with AntelopeIO/leap#1532. |
arhag
changed the title
IF: CDT support for BLS public key
IF: CDT support for BLS public keys and signatures
Aug 30, 2023
2 tasks
2 tasks
heifner
added a commit
that referenced
this issue
Dec 5, 2023
heifner
added a commit
that referenced
this issue
Dec 5, 2023
heifner
added a commit
that referenced
this issue
Dec 5, 2023
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Depends on #202 and #251.
This issue doesn't necessarily depend on AntelopeIO/leap#1525, but it may be easier to generate signatures and keys to use for unit tests for this issue if AntelopeIO/leap#1525 was already completed.
Add utility to encode a BLS public key and a BLS signature from binary to a text encoding and to decode in the other direction as well. (There is no need to support encoding/decoding or BLS private keys.)
Add function to verify a proof of possession (PoP) for a public key; see https://github.com/mschoenebeck/aggsigtest/blob/1c4d326e461d5b7c3930f3936494bdbc53f4436d/aggsigtest.cpp#L209-L230. Verify this function can be used to verify the PoPs generated by the leap-util tool (see AntelopeIO/leap#1525).
Nice to have (though not required for this issue): Provide convenient method to verify a signature on some message using the public key. Ensure that the BLS signatures generated from the BLS implementation used in Leap (or the
sign
function in the bls12-381 library) are able to be verified by this signature verification function in CDT.The text was updated successfully, but these errors were encountered: