You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
dependabot[bot] e7e224c537 Bump codecov/codecov-action from 3.1.1 to 3.1.3 5 months ago
.github Bump codecov/codecov-action from 3.1.1 to 3.1.3 5 months ago
benches Fix benches 3 years ago
rfcs add missing checks 2 years ago
src fix batch equation (#167) 5 months ago
tests refactor to use reddsa crate (#152) 8 months ago
.gitignore Optimized batch verification (#36) 3 years ago Release 0.7.0. (#162) 6 months ago
Cargo.toml Release 0.7.0. (#162) 6 months ago
Dockerfile Add Dockerfile for gcloud build 4 years ago
LICENCE Frost keygen with dealer (#47) 3 years ago
LICENCE.MIT Frost keygen with dealer (#47) 3 years ago
LICENSE.Apache-2.0 Frost keygen with dealer (#47) 3 years ago use rust in code sample of the README (#96) 2 years ago
cloudbuild.yaml Add GitHub Actions workflow which runs Google Cloudbuild jobs 4 years ago
codecov.yml Add CodeCov config file (#51) 3 years ago
zcash-frost-audit-report-20210323.pdf Add FROST audit pdf to root of repo 3 years ago

A minimal RedJubjub implementation for use in Zebra.

Two parameterizations of RedJubjub are used in Zcash, one for BindingSig and one for SpendAuthSig. This library distinguishes these in the type system, using the sealed SigType trait as a type-level enum.

In addition to the Signature, SigningKey, VerificationKey types, the library also provides VerificationKeyBytes, a refinement of a [u8; 32] indicating that bytes represent an encoding of a RedJubjub verification key. This allows the VerificationKey type to cache verification checks related to the verification key encoding.


Creating a BindingSig, serializing and deserializing it, and verifying the signature:

# use std::convert::TryFrom;
use rand::thread_rng;
use redjubjub::*;

let msg = b"Hello!";

// Generate a secret key and sign the message
let sk = SigningKey::<Binding>::new(thread_rng());
let sig = sk.sign(thread_rng(), msg);

// Types can be converted to raw byte arrays using From/Into
let sig_bytes: [u8; 64] = sig.into();
let pk_bytes: [u8; 32] = VerificationKey::from(&sk).into();

// Deserialize and verify the signature.
let sig: Signature<Binding> = sig_bytes.into();
        .and_then(|pk| pk.verify(msg, &sig))


cargo doc --features "nightly" --open