Since this specification defines a protocol, the API uses byte strings along the abstraction boundary. This means the implementation of core functions, like Blind, Evaluate, etc, all deal with de/serialization. It might be cleaner if we isolated the core cryptographic algorithms from the spec, i.e., those whose inputs are implementation specific, from the rest.
Since this specification defines a protocol, the API uses byte strings along the abstraction boundary. This means the implementation of core functions, like Blind, Evaluate, etc, all deal with de/serialization. It might be cleaner if we isolated the core cryptographic algorithms from the spec, i.e., those whose inputs are implementation specific, from the rest.