func NewRandOrPanic() *amcl.RAND
NewRandOrPanic return a new amcl PRG or panic
Big encapsulate an amcl big integer
type Big struct { E *FP256BN.BIG }
func (b *Big) Bytes() ([]byte, error)
CredRequest encapsulates the idemix algorithms to produce (sign) a credential request and verify it. Recall that a credential request is produced by a user, and it is verified by the issuer at credential creation time.
type CredRequest struct { NewRand func() *amcl.RAND }
func (cr *CredRequest) Sign(sk handlers.Big, ipk handlers.IssuerPublicKey, nonce []byte) (res []byte, err error)
Sign produces an idemix credential request. It takes in input a user secret key and an issuer public key.
func (*CredRequest) Verify(credentialRequest []byte, ipk handlers.IssuerPublicKey, nonce []byte) (err error)
Verify checks that the passed credential request is valid with the respect to the passed issuer public key.
Credential encapsulates the idemix algorithms to produce (sign) a credential and verify it. Recall that a credential is produced by the Issuer upon a credential request, and it is verified by the requester.
type Credential struct { NewRand func() *amcl.RAND }
func (c *Credential) Sign(key handlers.IssuerSecretKey, credentialRequest []byte, attributes []bccsp.IdemixAttribute) (res []byte, err error)
Sign produces an idemix credential. It takes in input the issuer secret key, a serialised credential request, and a list of attribute values. Notice that attributes should not contain attributes whose type is IdemixHiddenAttribute cause the credential needs to carry all the attribute values.
func (*Credential) Verify(sk handlers.Big, ipk handlers.IssuerPublicKey, credential []byte, attributes []bccsp.IdemixAttribute) (err error)
Verify checks that an idemix credential is cryptographically correct. It takes in input the user secret key (sk), the issuer public key (ipk), the serialised credential (credential), and a list of attributes. The list of attributes is optional, in case it is specified, Verify checks that the credential carries the specified attributes.
Ecp encapsulate an amcl elliptic curve point
type Ecp struct { E *FP256BN.ECP }
func (o *Ecp) Bytes() ([]byte, error)
Issuer encapsulates the idemix algorithms to generate issuer key-pairs
type Issuer struct { NewRand func() *amcl.RAND }
func (i *Issuer) NewKey(attributeNames []string) (res handlers.IssuerSecretKey, err error)
NewKey generates a new issuer key-pair
func (*Issuer) NewPublicKeyFromBytes(raw []byte, attributes []string) (res handlers.IssuerPublicKey, err error)
IssuerPublicKey encapsulate an idemix issuer public key.
type IssuerPublicKey struct { PK *cryptolib.IssuerPublicKey }
func (o *IssuerPublicKey) Bytes() ([]byte, error)
func (o *IssuerPublicKey) Hash() []byte
IssuerPublicKey encapsulate an idemix issuer secret key.
type IssuerSecretKey struct { SK *cryptolib.IssuerKey }
func (o *IssuerSecretKey) Bytes() ([]byte, error)
func (o *IssuerSecretKey) Public() handlers.IssuerPublicKey
NymSignatureScheme encapsulates the idemix algorithms to sign and verify using an idemix pseudonym.
type NymSignatureScheme struct { NewRand func() *amcl.RAND }
func (n *NymSignatureScheme) Sign(sk handlers.Big, Nym handlers.Ecp, RNym handlers.Big, ipk handlers.IssuerPublicKey, digest []byte) (res []byte, err error)
Sign produces a signature over the passed digest. It takes in input, the user secret key (sk), the pseudonym public key (Nym) and secret key (RNym), and the issuer public key (ipk).
func (*NymSignatureScheme) Verify(ipk handlers.IssuerPublicKey, Nym handlers.Ecp, signature, digest []byte) (err error)
Verify checks that the passed signatures is valid with the respect to the passed digest, issuer public key, and pseudonym public key.
Revocation encapsulates the idemix algorithms for revocation
type Revocation struct { }
func (*Revocation) NewKey() (*ecdsa.PrivateKey, error)
NewKey generate a new revocation key-pair.
func (*Revocation) Sign(key *ecdsa.PrivateKey, unrevokedHandles [][]byte, epoch int, alg bccsp.RevocationAlgorithm) (res []byte, err error)
Sign generates a new CRI with the respect to the passed unrevoked handles, epoch, and revocation algorithm.
func (*Revocation) Verify(pk *ecdsa.PublicKey, criRaw []byte, epoch int, alg bccsp.RevocationAlgorithm) (err error)
Verify checks that the passed serialised CRI (criRaw) is valid with the respect to the passed revocation public key, epoch, and revocation algorithm.
SignatureScheme encapsulates the idemix algorithms to sign and verify using an idemix credential.
type SignatureScheme struct { NewRand func() *amcl.RAND }
func (s *SignatureScheme) Sign(cred []byte, sk handlers.Big, Nym handlers.Ecp, RNym handlers.Big, ipk handlers.IssuerPublicKey, attributes []bccsp.IdemixAttribute, msg []byte, rhIndex int, criRaw []byte) (res []byte, err error)
Sign produces an idemix-signature with the respect to the passed serialised credential (cred), user secret key (sk), pseudonym public key (Nym) and secret key (RNym), issuer public key (ipk), and attributes to be disclosed.
func (*SignatureScheme) Verify(ipk handlers.IssuerPublicKey, signature, digest []byte, attributes []bccsp.IdemixAttribute, rhIndex int, revocationPublicKey *ecdsa.PublicKey, epoch int) (err error)
Verify checks that an idemix signature is valid with the respect to the passed issuer public key, digest, attributes, revocation index (rhIndex), revocation public key, and epoch.
User encapsulates the idemix algorithms to generate user secret keys and pseudonym.
type User struct { NewRand func() *amcl.RAND }
func (u *User) MakeNym(sk handlers.Big, ipk handlers.IssuerPublicKey) (r1 handlers.Ecp, r2 handlers.Big, err error)
MakeNym generates a new pseudonym key-pair derived from the passed user secret key (sk) and issuer public key (ipk)
func (u *User) NewKey() (res handlers.Big, err error)
NewKey generates an idemix user secret key
func (*User) NewKeyFromBytes(raw []byte) (res handlers.Big, err error)
func (*User) NewPublicNymFromBytes(raw []byte) (r handlers.Ecp, err error)