-
We need to determine if our onchain proof and/or signature verification is reasonably gas efficient.
The simplest path at the moment is to use G2 for encryption and DLEQ proof verification, which a…
-
It would be useful to have certain cryptographic constants as built-in constants:
### Example:
- The order of the `secp256k1` curve : `0xfffffffffffffffffffffffffffffffebaaedce6af48a03bbfd25e8cd…
-
Research support for running BLS curve cryptography methods on-chain, either on the Ethereum EVM (check state of [EIP-2537](https://eips.ethereum.org/EIPS/eip-2537)), or other EVM-compatible rollups. …
-
there is a well-known attack on the BLS signature scheme called a "rogue public key" attack
you can read more about it here: https://hackmd.io/@benjaminion/bls12-381#Rogue-key-attacks
the mitiga…
-
# 1.0 Abstract of PoS
In traditional PoS System, block production participation is dependent on token holdings as opposed to computational power.
Most project end up proposing some level of centrali…
-
### Describe the issue
Currently bibxml URLs contain "/rfc/" for entries that are not RFCs. For instance:
https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-cfrg-bls-signature.xml
https://b…
-
...covering verification of BLS signatures on the BLS12-381 elliptic curve.
As discussed, we'll prioritise satisfying the e2e testing requirement for this feature with [plutus-e2e-tests](https://gi…
-
In addition to the BLS public keys used in HotShot, the light client will rely on Schnorr public keys in order to verify a QC. Specify how the stake table establishes the relationship between those k…
-
**Github username:** @0xfuje
**Twitter username:** 0xfuje
**Submission hash (on-chain):** 0xff7675bdcb5c7defa3cd4c84b284ca0ac7420af7bad74a92558bd90119397a42
**Severity:** high
**Description:**
## Im…
-
Right now, nodes "sometimes" (as an implementation detail) gossip GrandPa commit messages to each other.
Light clients rely on these commit messages in order to know which block has been finalized.…