Documentation ¶
Overview ¶
Package idemix is a generated protocol buffer package.
It is generated from these files:
idemix/idemix.proto
It has these top-level messages:
ECP ECP2 IssuerPublicKey IssuerKey Credential CredRequest Signature NonRevocationProof NymSignature CredentialRevocationInformation
Index ¶
- Variables
- func BigToBytes(big *FP256BN.BIG) []byte
- func Ecp2FromProto(p *ECP2) *FP256BN.ECP2
- func EcpFromProto(p *ECP) *FP256BN.ECP
- func GenerateLongTermRevocationKey() (*sm2.PrivateKey, error)
- func GetRand() (*amcl.RAND, error)
- func HashModOrder(data []byte) *FP256BN.BIG
- func MakeNym(sk *FP256BN.BIG, IPk *IssuerPublicKey, rng *amcl.RAND) (*FP256BN.ECP, *FP256BN.BIG)
- func Modadd(a, b, m *FP256BN.BIG) *FP256BN.BIG
- func Modsub(a, b, m *FP256BN.BIG) *FP256BN.BIG
- func RandModOrder(rng *amcl.RAND) *FP256BN.BIG
- func VerifyEpochPK(pk *sm2.PublicKey, epochPK *ECP2, epochPkSig []byte, epoch int, ...) error
- func WBBKeyGen(rng *amcl.RAND) (*FP256BN.BIG, *FP256BN.ECP2)
- func WBBSign(sk *FP256BN.BIG, m *FP256BN.BIG) *FP256BN.ECP
- func WBBVerify(pk *FP256BN.ECP2, sig *FP256BN.ECP, m *FP256BN.BIG) error
- type CredRequest
- func (m *CredRequest) Check(ipk *IssuerPublicKey) error
- func (*CredRequest) Descriptor() ([]byte, []int)
- func (m *CredRequest) GetIssuerNonce() []byte
- func (m *CredRequest) GetNym() *ECP
- func (m *CredRequest) GetProofC() []byte
- func (m *CredRequest) GetProofS() []byte
- func (*CredRequest) ProtoMessage()
- func (m *CredRequest) Reset()
- func (m *CredRequest) String() string
- type Credential
- func (*Credential) Descriptor() ([]byte, []int)
- func (m *Credential) GetA() *ECP
- func (m *Credential) GetAttrs() [][]byte
- func (m *Credential) GetB() *ECP
- func (m *Credential) GetE() []byte
- func (m *Credential) GetS() []byte
- func (*Credential) ProtoMessage()
- func (m *Credential) Reset()
- func (m *Credential) String() string
- func (cred *Credential) Ver(sk *FP256BN.BIG, ipk *IssuerPublicKey) error
- type CredentialRevocationInformation
- func (*CredentialRevocationInformation) Descriptor() ([]byte, []int)
- func (m *CredentialRevocationInformation) GetEpoch() int64
- func (m *CredentialRevocationInformation) GetEpochPk() *ECP2
- func (m *CredentialRevocationInformation) GetEpochPkSig() []byte
- func (m *CredentialRevocationInformation) GetRevocationAlg() int32
- func (m *CredentialRevocationInformation) GetRevocationData() []byte
- func (*CredentialRevocationInformation) ProtoMessage()
- func (m *CredentialRevocationInformation) Reset()
- func (m *CredentialRevocationInformation) String() string
- type ECP
- type ECP2
- type IssuerKey
- type IssuerPublicKey
- func (IPk *IssuerPublicKey) Check() error
- func (*IssuerPublicKey) Descriptor() ([]byte, []int)
- func (m *IssuerPublicKey) GetAttributeNames() []string
- func (m *IssuerPublicKey) GetBarG1() *ECP
- func (m *IssuerPublicKey) GetBarG2() *ECP
- func (m *IssuerPublicKey) GetHAttrs() []*ECP
- func (m *IssuerPublicKey) GetHRand() *ECP
- func (m *IssuerPublicKey) GetHSk() *ECP
- func (m *IssuerPublicKey) GetHash() []byte
- func (m *IssuerPublicKey) GetProofC() []byte
- func (m *IssuerPublicKey) GetProofS() []byte
- func (m *IssuerPublicKey) GetW() *ECP2
- func (*IssuerPublicKey) ProtoMessage()
- func (m *IssuerPublicKey) Reset()
- func (IPk *IssuerPublicKey) SetHash() error
- func (m *IssuerPublicKey) String() string
- type NonRevocationProof
- type NymSignature
- func (*NymSignature) Descriptor() ([]byte, []int)
- func (m *NymSignature) GetNonce() []byte
- func (m *NymSignature) GetProofC() []byte
- func (m *NymSignature) GetProofSRNym() []byte
- func (m *NymSignature) GetProofSSk() []byte
- func (*NymSignature) ProtoMessage()
- func (m *NymSignature) Reset()
- func (m *NymSignature) String() string
- func (sig *NymSignature) Ver(nym *FP256BN.ECP, ipk *IssuerPublicKey, msg []byte) error
- type RevocationAlgorithm
- type Signature
- func (*Signature) Descriptor() ([]byte, []int)
- func (m *Signature) GetABar() *ECP
- func (m *Signature) GetAPrime() *ECP
- func (m *Signature) GetBPrime() *ECP
- func (m *Signature) GetEpoch() int64
- func (m *Signature) GetNonRevocationProof() *NonRevocationProof
- func (m *Signature) GetNonce() []byte
- func (m *Signature) GetNym() *ECP
- func (m *Signature) GetProofC() []byte
- func (m *Signature) GetProofSAttrs() [][]byte
- func (m *Signature) GetProofSE() []byte
- func (m *Signature) GetProofSR2() []byte
- func (m *Signature) GetProofSR3() []byte
- func (m *Signature) GetProofSRNym() []byte
- func (m *Signature) GetProofSSPrime() []byte
- func (m *Signature) GetProofSSk() []byte
- func (m *Signature) GetRevocationEpochPk() *ECP2
- func (m *Signature) GetRevocationPkSig() []byte
- func (*Signature) ProtoMessage()
- func (m *Signature) Reset()
- func (m *Signature) String() string
- func (sig *Signature) Ver(Disclosure []byte, ipk *IssuerPublicKey, msg []byte, ...) error
Constants ¶
This section is empty.
Variables ¶
var FieldBytes = int(FP256BN.MODBYTES)
FieldBytes is the bytelength of the group order
var GenG1 = FP256BN.NewECPbigs( FP256BN.NewBIGints(FP256BN.CURVE_Gx), FP256BN.NewBIGints(FP256BN.CURVE_Gy))
GenG1 is a generator of Group G1
var GenG2 = FP256BN.NewECP2fp2s( FP256BN.NewFP2bigs(FP256BN.NewBIGints(FP256BN.CURVE_Pxa), FP256BN.NewBIGints(FP256BN.CURVE_Pxb)), FP256BN.NewFP2bigs(FP256BN.NewBIGints(FP256BN.CURVE_Pya), FP256BN.NewBIGints(FP256BN.CURVE_Pyb)))
GenG2 is a generator of Group G2
GenGT is a generator of Group GT
var GroupOrder = FP256BN.NewBIGints(FP256BN.CURVE_Order)
GroupOrder is the order of the groups
var ProofBytes = map[RevocationAlgorithm]int{ ALG_NO_REVOCATION: 0, }
Functions ¶
func BigToBytes ¶
BigToBytes takes an *amcl.BIG and returns a []byte representation
func Ecp2FromProto ¶
Ecp2FromProto converts a proto struct *ECP2 into an *amcl.ECP2
func EcpFromProto ¶
EcpFromProto converts a proto struct *ECP into an *amcl.ECP
func GenerateLongTermRevocationKey ¶
func GenerateLongTermRevocationKey() (*sm2.PrivateKey, error)
GenerateLongTermRevocationKey generates a long term signing key that will be used for revocation
func HashModOrder ¶
HashModOrder hashes data into 0, ..., GroupOrder-1
func RandModOrder ¶
RandModOrder returns a random element in 0, ..., GroupOrder-1
func VerifyEpochPK ¶
func VerifyEpochPK(pk *sm2.PublicKey, epochPK *ECP2, epochPkSig []byte, epoch int, alg RevocationAlgorithm) error
VerifyEpochPK verifies that the revocation PK for a certain epoch is valid, by checking that it was signed with the long term revocation key. Note that even if we use no revocation (i.e., alg = ALG_NO_REVOCATION), we need to verify the signature to make sure the issuer indeed signed that no revocation is used in this epoch.
func WBBKeyGen ¶
WBBKeyGen creates a fresh weak-Boneh-Boyen signature key pair (http://ia.cr/2004/171)
Types ¶
type CredRequest ¶
type CredRequest struct { Nym *ECP `protobuf:"bytes,1,opt,name=nym" json:"nym,omitempty"` IssuerNonce []byte `protobuf:"bytes,2,opt,name=issuer_nonce,json=issuerNonce,proto3" json:"issuer_nonce,omitempty"` ProofC []byte `protobuf:"bytes,3,opt,name=proof_c,json=proofC,proto3" json:"proof_c,omitempty"` ProofS []byte `protobuf:"bytes,4,opt,name=proof_s,json=proofS,proto3" json:"proof_s,omitempty"` }
CredRequest specifies a credential request object that consists of nym - a pseudonym, which is a commitment to the user secret issuer_nonce - a random nonce provided by the issuer proof_c, proof_s - a zero-knowledge proof of knowledge of the user secret inside Nym
func NewCredRequest ¶
func NewCredRequest(sk *FP256BN.BIG, IssuerNonce *FP256BN.BIG, ipk *IssuerPublicKey, rng *amcl.RAND) *CredRequest
NewCredRequest creates a new Credential Request, the first message of the interactive credential issuance protocol (from user to issuer)
func (*CredRequest) Check ¶
func (m *CredRequest) Check(ipk *IssuerPublicKey) error
Check cryptographically verifies the credential request
func (*CredRequest) Descriptor ¶
func (*CredRequest) Descriptor() ([]byte, []int)
func (*CredRequest) GetIssuerNonce ¶
func (m *CredRequest) GetIssuerNonce() []byte
func (*CredRequest) GetNym ¶
func (m *CredRequest) GetNym() *ECP
func (*CredRequest) GetProofC ¶
func (m *CredRequest) GetProofC() []byte
func (*CredRequest) GetProofS ¶
func (m *CredRequest) GetProofS() []byte
func (*CredRequest) ProtoMessage ¶
func (*CredRequest) ProtoMessage()
func (*CredRequest) Reset ¶
func (m *CredRequest) Reset()
func (*CredRequest) String ¶
func (m *CredRequest) String() string
type Credential ¶
type Credential struct { A *ECP `protobuf:"bytes,1,opt,name=a" json:"a,omitempty"` B *ECP `protobuf:"bytes,2,opt,name=b" json:"b,omitempty"` E []byte `protobuf:"bytes,3,opt,name=e,proto3" json:"e,omitempty"` S []byte `protobuf:"bytes,4,opt,name=s,proto3" json:"s,omitempty"` Attrs [][]byte `protobuf:"bytes,5,rep,name=attrs,proto3" json:"attrs,omitempty"` }
Credential specifies a credential object that consists of a, b, e, s - signature value attrs - attribute values
func NewCredential ¶
func NewCredential(key *IssuerKey, m *CredRequest, attrs []*FP256BN.BIG, rng *amcl.RAND) (*Credential, error)
NewCredential issues a new credential, which is the last step of the interactive issuance protocol All attribute values are added by the issuer at this step and then signed together with a commitment to the user's secret key from a credential request
func (*Credential) Descriptor ¶
func (*Credential) Descriptor() ([]byte, []int)
func (*Credential) GetA ¶
func (m *Credential) GetA() *ECP
func (*Credential) GetAttrs ¶
func (m *Credential) GetAttrs() [][]byte
func (*Credential) GetB ¶
func (m *Credential) GetB() *ECP
func (*Credential) GetE ¶
func (m *Credential) GetE() []byte
func (*Credential) GetS ¶
func (m *Credential) GetS() []byte
func (*Credential) ProtoMessage ¶
func (*Credential) ProtoMessage()
func (*Credential) Reset ¶
func (m *Credential) Reset()
func (*Credential) String ¶
func (m *Credential) String() string
func (*Credential) Ver ¶
func (cred *Credential) Ver(sk *FP256BN.BIG, ipk *IssuerPublicKey) error
Ver cryptographically verifies the credential by verifying the signature on the attribute values and user's secret key
type CredentialRevocationInformation ¶
type CredentialRevocationInformation struct { // epoch contains the epoch (time window) in which this CRI is valid Epoch int64 `protobuf:"varint,1,opt,name=epoch" json:"epoch,omitempty"` // epoch_pk is the public key that is used by the revocation authority in this epoch EpochPk *ECP2 `protobuf:"bytes,2,opt,name=epoch_pk,json=epochPk" json:"epoch_pk,omitempty"` // epoch_pk_sig is a signature on the EpochPK valid under the revocation authority's long term key EpochPkSig []byte `protobuf:"bytes,3,opt,name=epoch_pk_sig,json=epochPkSig,proto3" json:"epoch_pk_sig,omitempty"` // revocation_alg denotes which revocation algorithm is used RevocationAlg int32 `protobuf:"varint,4,opt,name=revocation_alg,json=revocationAlg" json:"revocation_alg,omitempty"` // revocation_data contains data specific to the revocation algorithm used RevocationData []byte `protobuf:"bytes,5,opt,name=revocation_data,json=revocationData,proto3" json:"revocation_data,omitempty"` }
func CreateCRI ¶
func CreateCRI(key *sm2.PrivateKey, unrevokedHandles []*FP256BN.BIG, epoch int, alg RevocationAlgorithm, rng *amcl.RAND) (*CredentialRevocationInformation, error)
CreateCRI creates the Credential Revocation Information for a certain time period (epoch). Users can use the CRI to prove that they are not revoked. Note that when not using revocation (i.e., alg = ALG_NO_REVOCATION), the entered unrevokedHandles are not used, and the resulting CRI can be used by any signer.
func (*CredentialRevocationInformation) Descriptor ¶
func (*CredentialRevocationInformation) Descriptor() ([]byte, []int)
func (*CredentialRevocationInformation) GetEpoch ¶
func (m *CredentialRevocationInformation) GetEpoch() int64
func (*CredentialRevocationInformation) GetEpochPk ¶
func (m *CredentialRevocationInformation) GetEpochPk() *ECP2
func (*CredentialRevocationInformation) GetEpochPkSig ¶
func (m *CredentialRevocationInformation) GetEpochPkSig() []byte
func (*CredentialRevocationInformation) GetRevocationAlg ¶
func (m *CredentialRevocationInformation) GetRevocationAlg() int32
func (*CredentialRevocationInformation) GetRevocationData ¶
func (m *CredentialRevocationInformation) GetRevocationData() []byte
func (*CredentialRevocationInformation) ProtoMessage ¶
func (*CredentialRevocationInformation) ProtoMessage()
func (*CredentialRevocationInformation) Reset ¶
func (m *CredentialRevocationInformation) Reset()
func (*CredentialRevocationInformation) String ¶
func (m *CredentialRevocationInformation) String() string
type ECP ¶
type ECP struct { X []byte `protobuf:"bytes,1,opt,name=x,proto3" json:"x,omitempty"` Y []byte `protobuf:"bytes,2,opt,name=y,proto3" json:"y,omitempty"` }
ECP is an elliptic curve point specified by its coordinates ECP corresponds to an element of the first group (G1)
func EcpToProto ¶
EcpToProto converts a *amcl.ECP into the proto struct *ECP
func (*ECP) Descriptor ¶
func (*ECP) ProtoMessage ¶
func (*ECP) ProtoMessage()
type ECP2 ¶
type ECP2 struct { Xa []byte `protobuf:"bytes,1,opt,name=xa,proto3" json:"xa,omitempty"` Xb []byte `protobuf:"bytes,2,opt,name=xb,proto3" json:"xb,omitempty"` Ya []byte `protobuf:"bytes,3,opt,name=ya,proto3" json:"ya,omitempty"` Yb []byte `protobuf:"bytes,4,opt,name=yb,proto3" json:"yb,omitempty"` }
ECP2 is an elliptic curve point specified by its coordinates ECP2 corresponds to an element of the second group (G2)
func Ecp2ToProto ¶
Ecp2ToProto converts a *amcl.ECP2 into the proto struct *ECP2
func (*ECP2) Descriptor ¶
func (*ECP2) ProtoMessage ¶
func (*ECP2) ProtoMessage()
type IssuerKey ¶
type IssuerKey struct { Isk []byte `protobuf:"bytes,1,opt,name=isk,proto3" json:"isk,omitempty"` Ipk *IssuerPublicKey `protobuf:"bytes,2,opt,name=ipk" json:"ipk,omitempty"` }
IssuerKey specifies an issuer key pair that consists of ISk - the issuer secret key and IssuerPublicKey - the issuer public key
func NewIssuerKey ¶
NewIssuerKey creates a new issuer key pair taking an array of attribute names that will be contained in credentials certified by this issuer (a credential specification)
func (*IssuerKey) Descriptor ¶
func (*IssuerKey) GetIpk ¶
func (m *IssuerKey) GetIpk() *IssuerPublicKey
func (*IssuerKey) ProtoMessage ¶
func (*IssuerKey) ProtoMessage()
type IssuerPublicKey ¶
type IssuerPublicKey struct { AttributeNames []string `protobuf:"bytes,1,rep,name=attribute_names,json=attributeNames" json:"attribute_names,omitempty"` HSk *ECP `protobuf:"bytes,2,opt,name=h_sk,json=hSk" json:"h_sk,omitempty"` HRand *ECP `protobuf:"bytes,3,opt,name=h_rand,json=hRand" json:"h_rand,omitempty"` HAttrs []*ECP `protobuf:"bytes,4,rep,name=h_attrs,json=hAttrs" json:"h_attrs,omitempty"` W *ECP2 `protobuf:"bytes,5,opt,name=w" json:"w,omitempty"` BarG1 *ECP `protobuf:"bytes,6,opt,name=bar_g1,json=barG1" json:"bar_g1,omitempty"` BarG2 *ECP `protobuf:"bytes,7,opt,name=bar_g2,json=barG2" json:"bar_g2,omitempty"` ProofC []byte `protobuf:"bytes,8,opt,name=proof_c,json=proofC,proto3" json:"proof_c,omitempty"` ProofS []byte `protobuf:"bytes,9,opt,name=proof_s,json=proofS,proto3" json:"proof_s,omitempty"` Hash []byte `protobuf:"bytes,10,opt,name=hash,proto3" json:"hash,omitempty"` }
IssuerPublicKey specifies an issuer public key that consists of attribute_names - a list of the attribute names of a credential issued by the issuer h_sk, h_rand, h_attrs, w, bar_g1, bar_g2 - group elements corresponding to the signing key, randomness, and attributes proof_c, proof_s compose a zero-knowledge proof of knowledge of the secret key hash is a hash of the public key appended to it
func (*IssuerPublicKey) Check ¶
func (IPk *IssuerPublicKey) Check() error
Check checks that this issuer public key is valid, i.e. that all components are present and a ZK proofs verifies
func (*IssuerPublicKey) Descriptor ¶
func (*IssuerPublicKey) Descriptor() ([]byte, []int)
func (*IssuerPublicKey) GetAttributeNames ¶
func (m *IssuerPublicKey) GetAttributeNames() []string
func (*IssuerPublicKey) GetBarG1 ¶
func (m *IssuerPublicKey) GetBarG1() *ECP
func (*IssuerPublicKey) GetBarG2 ¶
func (m *IssuerPublicKey) GetBarG2() *ECP
func (*IssuerPublicKey) GetHAttrs ¶
func (m *IssuerPublicKey) GetHAttrs() []*ECP
func (*IssuerPublicKey) GetHRand ¶
func (m *IssuerPublicKey) GetHRand() *ECP
func (*IssuerPublicKey) GetHSk ¶
func (m *IssuerPublicKey) GetHSk() *ECP
func (*IssuerPublicKey) GetHash ¶
func (m *IssuerPublicKey) GetHash() []byte
func (*IssuerPublicKey) GetProofC ¶
func (m *IssuerPublicKey) GetProofC() []byte
func (*IssuerPublicKey) GetProofS ¶
func (m *IssuerPublicKey) GetProofS() []byte
func (*IssuerPublicKey) GetW ¶
func (m *IssuerPublicKey) GetW() *ECP2
func (*IssuerPublicKey) ProtoMessage ¶
func (*IssuerPublicKey) ProtoMessage()
func (*IssuerPublicKey) Reset ¶
func (m *IssuerPublicKey) Reset()
func (*IssuerPublicKey) SetHash ¶
func (IPk *IssuerPublicKey) SetHash() error
SetHash appends a hash of a serialized public key
func (*IssuerPublicKey) String ¶
func (m *IssuerPublicKey) String() string
type NonRevocationProof ¶
type NonRevocationProof struct { RevocationAlg int32 `protobuf:"varint,1,opt,name=revocation_alg,json=revocationAlg" json:"revocation_alg,omitempty"` NonRevocationProof []byte `protobuf:"bytes,2,opt,name=non_revocation_proof,json=nonRevocationProof,proto3" json:"non_revocation_proof,omitempty"` }
NonRevocationProof contains proof that the credential is not revoked
func (*NonRevocationProof) Descriptor ¶
func (*NonRevocationProof) Descriptor() ([]byte, []int)
func (*NonRevocationProof) GetNonRevocationProof ¶
func (m *NonRevocationProof) GetNonRevocationProof() []byte
func (*NonRevocationProof) GetRevocationAlg ¶
func (m *NonRevocationProof) GetRevocationAlg() int32
func (*NonRevocationProof) ProtoMessage ¶
func (*NonRevocationProof) ProtoMessage()
func (*NonRevocationProof) Reset ¶
func (m *NonRevocationProof) Reset()
func (*NonRevocationProof) String ¶
func (m *NonRevocationProof) String() string
type NymSignature ¶
type NymSignature struct { // proof_c is the Fiat-Shamir challenge of the ZKP ProofC []byte `protobuf:"bytes,1,opt,name=proof_c,json=proofC,proto3" json:"proof_c,omitempty"` // proof_s_sk is the s-value proving knowledge of the user secret key ProofSSk []byte `protobuf:"bytes,2,opt,name=proof_s_sk,json=proofSSk,proto3" json:"proof_s_sk,omitempty"` // proof_s_r_nym is the s-value proving knowledge of the pseudonym secret ProofSRNym []byte `protobuf:"bytes,3,opt,name=proof_s_r_nym,json=proofSRNym,proto3" json:"proof_s_r_nym,omitempty"` // nonce is a fresh nonce used for the signature Nonce []byte `protobuf:"bytes,4,opt,name=nonce,proto3" json:"nonce,omitempty"` }
NymSignature specifies a signature object that signs a message with respect to a pseudonym. It differs from the standard idemix.signature in the fact that the standard signature object also proves that the pseudonym is based on a secret certified by a CA (issuer), whereas NymSignature only proves that the the owner of the pseudonym signed the message
func NewNymSignature ¶
func NewNymSignature(sk *FP256BN.BIG, Nym *FP256BN.ECP, RNym *FP256BN.BIG, ipk *IssuerPublicKey, msg []byte, rng *amcl.RAND) (*NymSignature, error)
NewSignature creates a new idemix pseudonym signature
func (*NymSignature) Descriptor ¶
func (*NymSignature) Descriptor() ([]byte, []int)
func (*NymSignature) GetNonce ¶
func (m *NymSignature) GetNonce() []byte
func (*NymSignature) GetProofC ¶
func (m *NymSignature) GetProofC() []byte
func (*NymSignature) GetProofSRNym ¶
func (m *NymSignature) GetProofSRNym() []byte
func (*NymSignature) GetProofSSk ¶
func (m *NymSignature) GetProofSSk() []byte
func (*NymSignature) ProtoMessage ¶
func (*NymSignature) ProtoMessage()
func (*NymSignature) Reset ¶
func (m *NymSignature) Reset()
func (*NymSignature) String ¶
func (m *NymSignature) String() string
func (*NymSignature) Ver ¶
func (sig *NymSignature) Ver(nym *FP256BN.ECP, ipk *IssuerPublicKey, msg []byte) error
Ver verifies an idemix NymSignature
type RevocationAlgorithm ¶
type RevocationAlgorithm int32
const (
ALG_NO_REVOCATION RevocationAlgorithm = iota
)
type Signature ¶
type Signature struct { APrime *ECP `protobuf:"bytes,1,opt,name=a_prime,json=aPrime" json:"a_prime,omitempty"` ABar *ECP `protobuf:"bytes,2,opt,name=a_bar,json=aBar" json:"a_bar,omitempty"` BPrime *ECP `protobuf:"bytes,3,opt,name=b_prime,json=bPrime" json:"b_prime,omitempty"` ProofC []byte `protobuf:"bytes,4,opt,name=proof_c,json=proofC,proto3" json:"proof_c,omitempty"` ProofSSk []byte `protobuf:"bytes,5,opt,name=proof_s_sk,json=proofSSk,proto3" json:"proof_s_sk,omitempty"` ProofSE []byte `protobuf:"bytes,6,opt,name=proof_s_e,json=proofSE,proto3" json:"proof_s_e,omitempty"` ProofSR2 []byte `protobuf:"bytes,7,opt,name=proof_s_r2,json=proofSR2,proto3" json:"proof_s_r2,omitempty"` ProofSR3 []byte `protobuf:"bytes,8,opt,name=proof_s_r3,json=proofSR3,proto3" json:"proof_s_r3,omitempty"` ProofSSPrime []byte `protobuf:"bytes,9,opt,name=proof_s_s_prime,json=proofSSPrime,proto3" json:"proof_s_s_prime,omitempty"` ProofSAttrs [][]byte `protobuf:"bytes,10,rep,name=proof_s_attrs,json=proofSAttrs,proto3" json:"proof_s_attrs,omitempty"` Nonce []byte `protobuf:"bytes,11,opt,name=nonce,proto3" json:"nonce,omitempty"` Nym *ECP `protobuf:"bytes,12,opt,name=nym" json:"nym,omitempty"` ProofSRNym []byte `protobuf:"bytes,13,opt,name=proof_s_r_nym,json=proofSRNym,proto3" json:"proof_s_r_nym,omitempty"` RevocationEpochPk *ECP2 `protobuf:"bytes,14,opt,name=revocation_epoch_pk,json=revocationEpochPk" json:"revocation_epoch_pk,omitempty"` RevocationPkSig []byte `protobuf:"bytes,15,opt,name=revocation_pk_sig,json=revocationPkSig,proto3" json:"revocation_pk_sig,omitempty"` Epoch int64 `protobuf:"varint,16,opt,name=epoch" json:"epoch,omitempty"` NonRevocationProof *NonRevocationProof `protobuf:"bytes,17,opt,name=non_revocation_proof,json=nonRevocationProof" json:"non_revocation_proof,omitempty"` }
Signature specifies a signature object that consists of a_prime, a_bar, b_prime, proof_* - randomized credential signature values and a zero-knowledge proof of knowledge of a credential and the corresponding user secret together with the attribute values nonce - a fresh nonce used for the signature nym - a fresh pseudonym (a commitment to to the user secret)
func NewSignature ¶
func NewSignature(cred *Credential, sk *FP256BN.BIG, Nym *FP256BN.ECP, RNym *FP256BN.BIG, ipk *IssuerPublicKey, Disclosure []byte, msg []byte, rhIndex int, cri *CredentialRevocationInformation, rng *amcl.RAND) (*Signature, error)
NewSignature creates a new idemix signature (Schnorr-type signature) The []byte Disclosure steers which attributes are disclosed: if Disclosure[i] == 0 then attribute i remains hidden and otherwise it is disclosed. We require the revocation handle to remain undisclosed (i.e., Disclosure[rhIndex] == 0). We use the zero-knowledge proof by http://eprint.iacr.org/2016/663.pdf to prove knowledge of a BBS+ signature
func (*Signature) Descriptor ¶
func (*Signature) GetNonRevocationProof ¶
func (m *Signature) GetNonRevocationProof() *NonRevocationProof
func (*Signature) GetProofSAttrs ¶
func (*Signature) GetProofSE ¶
func (*Signature) GetProofSR2 ¶
func (*Signature) GetProofSR3 ¶
func (*Signature) GetProofSRNym ¶
func (*Signature) GetProofSSPrime ¶
func (*Signature) GetProofSSk ¶
func (*Signature) GetRevocationEpochPk ¶
func (*Signature) GetRevocationPkSig ¶
func (*Signature) ProtoMessage ¶
func (*Signature) ProtoMessage()
func (*Signature) Ver ¶
func (sig *Signature) Ver(Disclosure []byte, ipk *IssuerPublicKey, msg []byte, attributeValues []*FP256BN.BIG, rhIndex int, revPk *sm2.PublicKey, epoch int) error
Ver verifies an idemix signature Disclosure steers which attributes it expects to be disclosed attributeValues contains the desired attribute values. This function will check that if attribute i is disclosed, the i-th attribute equals attributeValues[i].