-
Notifications
You must be signed in to change notification settings - Fork 262
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refactor RedJubjub to serialize the pubkey internally #179
Comments
More precisely, it's not that the security proof was made easier; it's that Strong Unforgeability under Randomised Keys does not hold generically unless the public key is included in the hash. |
The |
The current implementation serializes
R || M
because this was how RedJubjub was originally specified. Late in the Sapling development process, this was altered toR || vk || M
to make a security proof easier. The code was not altered at the time because all RedJubjub callers were already prepending pubkeys to their messages before signing, which is functionally identical.We should refactor RedJubjub to instead serialize
vk
internally, so that the callsites do not need to care, and the implementation more closely matches the spec.The text was updated successfully, but these errors were encountered: