fabric: github.com/hyperledger/fabric/bccsp/idemix/bridge Index | Files

package bridge

import "github.com/hyperledger/fabric/bccsp/idemix/bridge"

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Copyright IBM Corp. All Rights Reserved.

SPDX-License-Identifier: Apache-2.0

Index

Package Files

credential.go credrequest.go issuer.go math.go nymsignaturescheme.go rand.go revocation.go signaturescheme.go user.go

func NewRandOrPanic Uses

func NewRandOrPanic() *amcl.RAND

NewRandOrPanic return a new amcl PRG or panic

type Big Uses

type Big struct {
    E *FP256BN.BIG
}

Big encapsulate an amcl big integer

func (*Big) Bytes Uses

func (b *Big) Bytes() ([]byte, error)

type CredRequest Uses

type CredRequest struct {
    NewRand func() *amcl.RAND
}

CredRequest encapsulates the idemix algorithms to produce (sign) a credential request and verify it. Recall that a credential request is produced by a user, and it is verified by the issuer at credential creation time.

func (*CredRequest) Sign Uses

func (cr *CredRequest) Sign(sk handlers.Big, ipk handlers.IssuerPublicKey, nonce []byte) (res []byte, err error)

Sign produces an idemix credential request. It takes in input a user secret key and an issuer public key.

func (*CredRequest) Verify Uses

func (*CredRequest) Verify(credentialRequest []byte, ipk handlers.IssuerPublicKey, nonce []byte) (err error)

Verify checks that the passed credential request is valid with the respect to the passed issuer public key.

type Credential Uses

type Credential struct {
    NewRand func() *amcl.RAND
}

Credential encapsulates the idemix algorithms to produce (sign) a credential and verify it. Recall that a credential is produced by the Issuer upon a credential request, and it is verified by the requester.

func (*Credential) Sign Uses

func (c *Credential) Sign(key handlers.IssuerSecretKey, credentialRequest []byte, attributes []bccsp.IdemixAttribute) (res []byte, err error)

Sign produces an idemix credential. It takes in input the issuer secret key, a serialised credential request, and a list of attribute values. Notice that attributes should not contain attributes whose type is IdemixHiddenAttribute cause the credential needs to carry all the attribute values.

func (*Credential) Verify Uses

func (*Credential) Verify(sk handlers.Big, ipk handlers.IssuerPublicKey, credential []byte, attributes []bccsp.IdemixAttribute) (err error)

Verify checks that an idemix credential is cryptographically correct. It takes in input the user secret key (sk), the issuer public key (ipk), the serialised credential (credential), and a list of attributes. The list of attributes is optional, in case it is specified, Verify checks that the credential carries the specified attributes.

type Ecp Uses

type Ecp struct {
    E *FP256BN.ECP
}

Ecp encapsulate an amcl elliptic curve point

func (*Ecp) Bytes Uses

func (o *Ecp) Bytes() ([]byte, error)

type Issuer Uses

type Issuer struct {
    NewRand func() *amcl.RAND
}

Issuer encapsulates the idemix algorithms to generate issuer key-pairs

func (*Issuer) NewKey Uses

func (i *Issuer) NewKey(attributeNames []string) (res handlers.IssuerSecretKey, err error)

NewKey generates a new issuer key-pair

func (*Issuer) NewPublicKeyFromBytes Uses

func (*Issuer) NewPublicKeyFromBytes(raw []byte, attributes []string) (res handlers.IssuerPublicKey, err error)

type IssuerPublicKey Uses

type IssuerPublicKey struct {
    PK *cryptolib.IssuerPublicKey
}

IssuerPublicKey encapsulate an idemix issuer public key.

func (*IssuerPublicKey) Bytes Uses

func (o *IssuerPublicKey) Bytes() ([]byte, error)

func (*IssuerPublicKey) Hash Uses

func (o *IssuerPublicKey) Hash() []byte

type IssuerSecretKey Uses

type IssuerSecretKey struct {
    SK *cryptolib.IssuerKey
}

IssuerPublicKey encapsulate an idemix issuer secret key.

func (*IssuerSecretKey) Bytes Uses

func (o *IssuerSecretKey) Bytes() ([]byte, error)

func (*IssuerSecretKey) Public Uses

func (o *IssuerSecretKey) Public() handlers.IssuerPublicKey

type NymSignatureScheme Uses

type NymSignatureScheme struct {
    NewRand func() *amcl.RAND
}

NymSignatureScheme encapsulates the idemix algorithms to sign and verify using an idemix pseudonym.

func (*NymSignatureScheme) Sign Uses

func (n *NymSignatureScheme) Sign(sk handlers.Big, Nym handlers.Ecp, RNym handlers.Big, ipk handlers.IssuerPublicKey, digest []byte) (res []byte, err error)

Sign produces a signature over the passed digest. It takes in input, the user secret key (sk), the pseudonym public key (Nym) and secret key (RNym), and the issuer public key (ipk).

func (*NymSignatureScheme) Verify Uses

func (*NymSignatureScheme) Verify(ipk handlers.IssuerPublicKey, Nym handlers.Ecp, signature, digest []byte) (err error)

Verify checks that the passed signatures is valid with the respect to the passed digest, issuer public key, and pseudonym public key.

type Revocation Uses

type Revocation struct {
}

Revocation encapsulates the idemix algorithms for revocation

func (*Revocation) NewKey Uses

func (*Revocation) NewKey() (*ecdsa.PrivateKey, error)

NewKey generate a new revocation key-pair.

func (*Revocation) Sign Uses

func (*Revocation) Sign(key *ecdsa.PrivateKey, unrevokedHandles [][]byte, epoch int, alg bccsp.RevocationAlgorithm) (res []byte, err error)

Sign generates a new CRI with the respect to the passed unrevoked handles, epoch, and revocation algorithm.

func (*Revocation) Verify Uses

func (*Revocation) Verify(pk *ecdsa.PublicKey, criRaw []byte, epoch int, alg bccsp.RevocationAlgorithm) (err error)

Verify checks that the passed serialised CRI (criRaw) is valid with the respect to the passed revocation public key, epoch, and revocation algorithm.

type SignatureScheme Uses

type SignatureScheme struct {
    NewRand func() *amcl.RAND
}

SignatureScheme encapsulates the idemix algorithms to sign and verify using an idemix credential.

func (*SignatureScheme) Sign Uses

func (s *SignatureScheme) Sign(cred []byte, sk handlers.Big, Nym handlers.Ecp, RNym handlers.Big, ipk handlers.IssuerPublicKey, attributes []bccsp.IdemixAttribute,
    msg []byte, rhIndex int, criRaw []byte) (res []byte, err error)

Sign produces an idemix-signature with the respect to the passed serialised credential (cred), user secret key (sk), pseudonym public key (Nym) and secret key (RNym), issuer public key (ipk), and attributes to be disclosed.

func (*SignatureScheme) Verify Uses

func (*SignatureScheme) Verify(ipk handlers.IssuerPublicKey, signature, digest []byte, attributes []bccsp.IdemixAttribute, rhIndex int, revocationPublicKey *ecdsa.PublicKey, epoch int) (err error)

Verify checks that an idemix signature is valid with the respect to the passed issuer public key, digest, attributes, revocation index (rhIndex), revocation public key, and epoch.

type User Uses

type User struct {
    NewRand func() *amcl.RAND
}

User encapsulates the idemix algorithms to generate user secret keys and pseudonym.

func (*User) MakeNym Uses

func (u *User) MakeNym(sk handlers.Big, ipk handlers.IssuerPublicKey) (r1 handlers.Ecp, r2 handlers.Big, err error)

MakeNym generates a new pseudonym key-pair derived from the passed user secret key (sk) and issuer public key (ipk)

func (*User) NewKey Uses

func (u *User) NewKey() (res handlers.Big, err error)

NewKey generates an idemix user secret key

func (*User) NewKeyFromBytes Uses

func (*User) NewKeyFromBytes(raw []byte) (res handlers.Big, err error)

func (*User) NewPublicNymFromBytes Uses

func (*User) NewPublicNymFromBytes(raw []byte) (r handlers.Ecp, err error)

Package bridge imports 10 packages (graph) and is imported by 2 packages. Updated 2019-02-06. Refresh now. Tools for package owners.