Go to file
dependabot[bot] 81979e9a87
Bump serde_json from 1.0.117 to 1.0.120 (#158)
Bumps [serde_json](https://github.com/serde-rs/json) from 1.0.117 to 1.0.120.
- [Release notes](https://github.com/serde-rs/json/releases)
- [Commits](https://github.com/serde-rs/json/compare/v1.0.117...v1.0.120)

---
updated-dependencies:
- dependency-name: serde_json
  dependency-type: direct:production
  update-type: version-update:semver-patch
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
2024-07-18 19:41:59 -03:00
.github Bump codecov/codecov-action from 4.4.0 to 4.5.0 (#152) 2024-06-19 16:55:20 -03:00
benches
rfcs
src update to frost-rerandomized 2.0.0-rc.0 (#153) 2024-07-04 14:17:12 +01:00
tests update to frost-rerandomized 2.0.0-rc.0 (#153) 2024-07-04 14:17:12 +01:00
.gitignore
CHANGELOG.md
Cargo.lock Bump serde_json from 1.0.117 to 1.0.120 (#158) 2024-07-18 19:41:59 -03:00
Cargo.toml update to frost-rerandomized 2.0.0-rc.0 (#153) 2024-07-04 14:17:12 +01:00
DEVELOPERS.md
Dockerfile
LICENCE
LICENCE.MIT
LICENSE.Apache-2.0
README.md
cloudbuild.yaml
codecov.yml
zcash-frost-audit-report-20210323.pdf

README.md

A minimal RedDSA implementation for use in Zcash.

Two specializations of RedDSA are used in Zcash: RedJubjub and RedPallas. For each of these, two parameterizations are used, one for BindingSig and one for SpendAuthSig. This library distinguishes these in the type system, using the sealed SigType trait as a type-level enum.

In addition to the Signature, SigningKey, VerificationKey types, the library also provides VerificationKeyBytes, a refinement of a [u8; 32] indicating that bytes represent an encoding of a RedDSA verification key. This allows the VerificationKey type to cache verification checks related to the verification key encoding. For all specializations of RedDSA used in Zcash, encodings of signing and verification keys are 32 bytes.

Examples

Creating a BindingSig, serializing and deserializing it, and verifying the signature:

# use std::convert::TryFrom;
use rand::thread_rng;
use reddsa::*;

let msg = b"Hello!";

// Generate a secret key and sign the message
let sk = SigningKey::<sapling::Binding>::new(thread_rng());
let sig = sk.sign(thread_rng(), msg);

// Types can be converted to raw byte arrays using From/Into
let sig_bytes: [u8; 64] = sig.into();
let pk_bytes: [u8; 32] = VerificationKey::from(&sk).into();

// Deserialize and verify the signature.
let sig: Signature<sapling::Binding> = sig_bytes.into();
assert!(
    VerificationKey::try_from(pk_bytes)
        .and_then(|pk| pk.verify(msg, &sig))
        .is_ok()
);

FROST

You can enable ZIP-312 re-randomized FROST support with the frost feature. This is still experimental since ZIP-312 is still a draft.

docs

cargo doc --features "nightly" --open

Developers guide

See DEVELOPERS.md.