Go to file
dependabot[bot] baced47f62
Bump actions/checkout from 4.1.4 to 4.1.6 (#191)
Bumps [actions/checkout](https://github.com/actions/checkout) from 4.1.4 to 4.1.6.
- [Release notes](https://github.com/actions/checkout/releases)
- [Changelog](https://github.com/actions/checkout/blob/main/CHANGELOG.md)
- [Commits](https://github.com/actions/checkout/compare/v4.1.4...v4.1.6)

---
updated-dependencies:
- dependency-name: actions/checkout
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-05-22 10:35:40 -03:00
.github Bump actions/checkout from 4.1.4 to 4.1.6 (#191) 2024-05-22 10:35:40 -03:00
benches
rfcs add missing checks 2021-06-15 17:10:38 -04:00
src fix batch equation (#167) 2023-04-21 22:04:55 +02:00
tests refactor to use reddsa crate (#152) 2023-02-01 18:22:37 -05:00
.gitignore
CHANGELOG.md Release 0.7.0. (#162) 2023-03-30 21:49:29 +01:00
Cargo.toml Update criterion requirement from 0.4 to 0.5 (#171) 2023-11-15 13:47:24 -03:00
Dockerfile
LICENCE
LICENCE.MIT
LICENSE.Apache-2.0
README.md
cloudbuild.yaml
codecov.yml
zcash-frost-audit-report-20210323.pdf

README.md

A minimal RedJubjub implementation for use in Zebra.

Two parameterizations of RedJubjub are used in Zcash, one for BindingSig and one for SpendAuthSig. This library distinguishes these in the type system, using the sealed SigType trait as a type-level enum.

In addition to the Signature, SigningKey, VerificationKey types, the library also provides VerificationKeyBytes, a refinement of a [u8; 32] indicating that bytes represent an encoding of a RedJubjub verification key. This allows the VerificationKey type to cache verification checks related to the verification key encoding.

Examples

Creating a BindingSig, serializing and deserializing it, and verifying the signature:

# use std::convert::TryFrom;
use rand::thread_rng;
use redjubjub::*;

let msg = b"Hello!";

// Generate a secret key and sign the message
let sk = SigningKey::<Binding>::new(thread_rng());
let sig = sk.sign(thread_rng(), msg);

// Types can be converted to raw byte arrays using From/Into
let sig_bytes: [u8; 64] = sig.into();
let pk_bytes: [u8; 32] = VerificationKey::from(&sk).into();

// Deserialize and verify the signature.
let sig: Signature<Binding> = sig_bytes.into();
assert!(
    VerificationKey::try_from(pk_bytes)
        .and_then(|pk| pk.verify(msg, &sig))
        .is_ok()
);

docs

cargo doc --features "nightly" --open