Iñigo Querejeta Azurmendi

Results 19 issues of Iñigo Querejeta Azurmendi

Implementation of [RFC9381](https://datatracker.ietf.org/doc/html/rfc9381). Made a change to ed25519_ref10 for performance reasons. Mainly, I have included a variable base variable time scalar multiplication (to compute `a * U + b *...

With the progress of the Poseidon implementation #104 , it would be nice to begin a discussion on how we could implement the hash trait(s). Hopefully, this will also steer...

T-design

The current implementation is not compatible with the current definition of the standard. This PR provides a hash-to-curve implementation as defined in draft-irtf-cfrg-hash-to-curve-12. * Implementation of `hash_to_field` as defined in...

As discussed [here](https://github.com/input-output-hk/mithril/pull/159#issuecomment-1111955469), we are interested in allowing signature generation without merkle paths. To this end, we should extend the core library to allow for signature generation without merkle path,...

D-easy
T-design
P-medium
T-feature

This PR simply updates the Blake2 dependency. We use the new, more flexible design, of version 0.10.4 to use an output of 32 bytes instead of 64 bytes, making merkle...

breaking-change

This PR implements the new registration procedure and closes #301 and closes #384 . When a registration procedure is initialised, we have to give as input the cardano stake distribution,...

The initialisation should take as input the stake distribution (with the cardano keys), and the registration takes as input the Mithril key and a signature of the mithril key with...

D-medium
P-medium
T-refactor

Mithril keys will have to be certified by the node hot keys. We should mock this procedure, so that the key registration takes into account this registration validation, and Mithril...

It is of interest to understand what are the changes of producing valid certificates given a set of parameters. To this end, it would be of interest to produce a...

D-easy
P-low
T-feature

We are changing the way the KES keys are handled, to increase the guarantees that the key is not copied to disk and safely deleted by mlocking the secret data....

:handshake: consensus
:deciduous_tree: needs-grooming