2019 Q3 Hyperledger Ursa
Project Health
Ursa is moving forward, slowly but surely. We have released two versions-v0.1 and v0.1.1–since the last update.Â
Projects:  Ursa is currently the only crypto library in use for Indy-SDK (i.e., the Indy crypto library is no longer used in this case) and Indy maintainers and contributors are working towards using Ursa for all of their cryptography. We have also been recently notified that an intern has completed work on integrating Ursa into Iroha, which is more good news (this was done by the Iroha team, so they deserve the credit here–not us) (https://github.com/hyperledger/iroha/commit/b3adc310e9c797c9dd5c99e4a7b518f2c5cf50f0).
Questions/Issues for the TSC
While this is more for project maintainers than the TSC (although the overlap is heavy), we'd like to use this time to ask maintainers of projects that aren't currently using Ursa what kind of features would convince them to use Ursa. The more feedback we get, the better we can do as a project.
The issue of the lack of dunking booth funding is also deeply concerning to us, although we recognize that this is a governing board issue rather than a TSC issue.Â
Releases
We made two releases since the last update:
v0.1.0 :Â March 21
v0.1.1:Â April 24
These releases are early releases that are targeted at replacing the Indy crypto libraries while still preserving interfaces needed for eventual Sawtooth use.
Overall Activity in the Past Quarter
New Documents:
- Anonymous Credentials:Â we have been formulating an implementation for anonymous credentials, which has gone through multiple iterations.
- Threshold issuance credentials:Â we plan to add these once we standardize an API.
New RFCs:
- Encryption API: we have built an API for modular (symmetric) encryption. This will allow us to "plug and play" symmetric key encryption protocols and block ciphers once implemented.
- Delegatable credentials and z-mix are in the pipeline.
New Code:
- Camenisch-Schoup Verifiable Encryption:
- Pointcheval-Sanders (PS) signatures:
- Much more "in the pipeline."
Current Plans
We have a lot of work in progress, both in our base crypto library and in our zero knowledge-focused zmix library. Some things include:
- Continue work on our modular interfaces. This is necessary so that we can make a better case for Sawtooth and Fabric to use Ursa. Example interfaces that still need work are our encryption/block cipher interface and our "zk-signature" interface for PS and BBS+ signatures.
Maintainer Diversity
Current active maintainers
- Mike Lodder (Sovrin Foundation)
- Lovesh Harchandani (Evernym Inc.)
- Dave Huseby (Linux Foundation)
- Hart Montgomery (Fujitsu)
- Shawn Amundson (Bitwise)
- Dan Middleton (Intel)
- Cam Parra (Kiva)
New maintainers
- Dan Anderson (Intel)
- Jon Geater (Jitsuin)
Contributor Diversity
Our contributor list has been relatively static, although we are optimistic of adding new contributors in the near future (e.g., for hardware support).
Current Contributors
- Sovrin Foundation
- Evernym, Inc
- Intel
- Bitwise
- Anonyome Labs, Inc.
- IdentOS
- Jitsuin
- Fujitsu
Additional Information
Reviewed by
- Angelo De Caro
- Arnaud J Le Hors
- Christopher Ferris
- Dan Middleton
- Gari Singh
- Hart Montgomery
- Mark Wagner
- Nathan George
- Swetha Repakula
- Tracy Kuhrt
- Troy Ronda