Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 10 Next »

Project

This report covers Hyperledger Ursa.

Project Health

Ursa has been in a relatively stable state recently.  Contributions have been down a little bit, some of which we attribute to the "summer of COVID" and others due to the fact that some users of Ursa are happy with the existing primitives and want to work on things that are more immediate to their business needs.  We have recently seen a surge in Ursa usage by groups outside of Hyperledger, although unfortunately we have not been able to use this to increase our contributor base.

Questions/Issues for the TSC

We say something like this in pretty much every report, but we want to reiterate that we are always interested in getting in touch with others who want to use cryptography, and particularly so for people that want to use non-standardized crypto like threshold signatures or zero knowledge proofs.  If this describes you, please feel free to get in touch with us.

Releases

We haven't made a new release this quarter (last one was v0.4.0, on May 18).  Internally, we are on v0.4.2 (we didn't release a v0.4.1) but will probably cut a new release in the not too distant future.

Overall Activity in the Past Quarter

We implemented a number of exciting new features in the past quarter, although these are not reflected yet in our current releases>

  • We added WASM support for BBS+ signatures as we indicated in our plans in the last report.  The BBS+ signature code is probably our most popular feature, as a number of people outside Hyperledger seem to be using this.
  • Upgraded all of our external dependencies on crypto primitives to the latest versions and ensured compatibility.
  • Implemented our own version of Shamir secret sharing.  Exsiting versions don't have the flexibility that we need in Ursa.  For those unaware, Shamir secret sharing (and some other tricks) are widely used across group-based threshold cryptography.  We have demand for threshold crypto implementations, so this is something that we are currently working towards.
  • Perhaps most importantly, we agreed to an RFC that details the project structure for the zero knowledge proofs.  This will guide Ursa going forward.
  • We did not make much progress on trusted hardware this quarter, unfortunately.

Current Plans

We have a number of things that we want to build and/or design:

  • Threshold cryptography:  we would like to have threshold signatures and other threshold crypto primitives.  We are planning on working towards building these.
  • Post-quantum cryptography:  now that the NIST competition is in the final round, we feel like it is time to start providing options for post-quantum crypto primitives in Ursa.  Luckily, many of the teams behind these new key exchange protocols and signature schemes have written their code in Rust, so hopefully integration should be straightforward.  This will probably necessitate some work on our configuration options for the "base" Ursa primitives.
  • Hyperledger Cactus is potentially interested in using Ursa.  This will require effort from both sides, but we may aim to work on our node.js wrappers to help them.

Maintainer Diversity

Current Active Maintainers:

  • Mike Lodder (Independent)
  • Brent Zundel (Evernym Inc.)
  • Dave Huseby (Linux Foundation)
  • Hart Montgomery (Fujitsu)
  • Dan Middleton (Intel)
  • Cam Parra (Kiva)
  • Dan Anderson (Intel)
  • Jon Geater (Jitsuin)

Some of these maintainers are obviously more active than others.

Contributor Diversity

Current Contributor Affiliations:

  • Independent (thanks Mike!)
  • Evernym, Inc
  • Intel
  • BCGov
  • Iqlusion
  • Fujitsu
  • Innopolis University (thanks Iroha team!)
  • MediConCen Limited


This list is inexact and may be missing some people, but should be representative (lots of people don't have company information listed, and some are mostly working as contractors).  If you should be represented here and are not, please add yourself!  We would also like to thank Ry and others that made collecting all of this information easy with Community Bridge!

Additional Information

We have received more academic interest in Ursa recently, which has been a very positive development.  In particular, we had a meeting with Prof. Anna Lysyanskaya, an IACR fellow and famous cryptographer, to discuss our CL signatures and open problems regarding anonymous credentials.  We can hopefully get more academic interest in Ursa and use this to stay on the cutting edge of safe cryptography. 

Reviewed by


  • No labels