Closed wulfraem closed 2 years ago
@wulfraem We discussed this on the Ursa call today, and would like to make it possible for this to happen. We are grateful for contributions and apologize for not responding more fully until now.
Here are the key concerns around your proposed changes:
In greater detail:
ursa::helpers::generate_safe_prime
, there should be primality checking of the input values. We anticipate this may duplicate some of the prime-checking that has already occurred for valid primes, but it would also add protection for unwary users.generate_safe_primes
currently expects a size. There would need to be a check to insure that the input values don't exceed this range.Please respond with any questions you may have. We also welcome you to join our biweekly call to discuss this PR with the group directly. You should be able to find meeting time and connection information on the hyperledger calendar
@brentzundel are there any updates to this PR? Any plans to merge it soon?
@Alexis-Falquier I have not heard a response from the OP about our concerns. Until those are addressed, I do not support merging this PR.
This PR has been dormant for over a year, with no response from @wulfraem Closing
To allow speeding up credential definition creation we wanted to create the safe prime numbers beforehand with
ursa::helpers::generate_safe_prime
and hold onto them until the actual credential definition is created.In our use case we have to create multiple credential definitions at a time and having a bunch of safe primes ready for this improves performance of this a lot. :)