-
Notifications
You must be signed in to change notification settings - Fork 2.6k
Conversation
requires #14036 |
Probably incredibly-stupid-random-totally-uninformed-suggestion: maybe |
Because this key type will be used by a consensus protocol, is required to implement all the traits required by session pallet. One of these is This trait offers some methods requiring access to the keystore: Was my intention to keep the required host functions to the minimum.
|
The CI pipeline was cancelled due to failure one of the required jobs. |
The CI pipeline was cancelled due to failure one of the required jobs. |
This PR introduces a new kind of VRF which uses
bandersnatch-vrfs
backend.bsnvrf
(→ Bandersnatch-Vrf)bandernatch-experimental
feature flagThe primitive is used by Sassafras (#11879).
IMO is worth splitting the sassafras PR in smaller pieces to be more easily reviewable (is already +9K)
so first I propose to introduce this VRF to trim it a bit.
Open points:
sr25519
supports both hard and soft secret key derivation (see here). Whileecdsa
anded25519
support only hard secret key derivation (e.g. see here). What about bandersnatch?When a first version
bandersnatch-vrfs
crate on crates.io?Missing Ring proof integration. Is not clear if in the end
bandersnatch-vrfs
crate will provide a singlesign
function to get both thin and ring proofs.