Go to file
Marek 46f8e2cb29 Fix integration tests
Some test were failing because they were not using the new identifiers, but were
trying to identify the participants by simple indices such as 1, 2, 3.
2021-08-01 20:21:15 +01:00
.github Bump codecov/codecov-action from 1.5.0 to 1.5.2 2021-06-21 17:07:49 -04:00
benches
rfcs add missing checks 2021-06-15 17:10:38 -04:00
src Fix integration tests 2021-08-01 20:21:15 +01:00
tests Bind identifiers to the secret chosen by the dealer 2021-07-28 08:30:15 +01:00
.gitignore
CHANGELOG.md
Cargo.toml jubjub 0.7 2021-06-18 14:05:08 -04:00
Dockerfile
LICENCE
LICENCE.MIT
LICENSE.Apache-2.0
README.md
cloudbuild.yaml
codecov.yml
zcash-frost-audit-report-20210323.pdf

README.md

A minimal RedJubjub implementation for use in Zebra.

Two parameterizations of RedJubjub are used in Zcash, one for BindingSig and one for SpendAuthSig. This library distinguishes these in the type system, using the sealed SigType trait as a type-level enum.

In addition to the Signature, SigningKey, VerificationKey types, the library also provides VerificationKeyBytes, a refinement of a [u8; 32] indicating that bytes represent an encoding of a RedJubjub verification key. This allows the VerificationKey type to cache verification checks related to the verification key encoding.

Examples

Creating a BindingSig, serializing and deserializing it, and verifying the signature:

# use std::convert::TryFrom;
use rand::thread_rng;
use redjubjub::*;

let msg = b"Hello!";

// Generate a secret key and sign the message
let sk = SigningKey::<Binding>::new(thread_rng());
let sig = sk.sign(thread_rng(), msg);

// Types can be converted to raw byte arrays using From/Into
let sig_bytes: [u8; 64] = sig.into();
let pk_bytes: [u8; 32] = VerificationKey::from(&sk).into();

// Deserialize and verify the signature.
let sig: Signature<Binding> = sig_bytes.into();
assert!(
    VerificationKey::try_from(pk_bytes)
        .and_then(|pk| pk.verify(msg, &sig))
        .is_ok()
);

docs

cargo doc --features "nightly" --open