Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 14 Next »

Attendees:

  • Vipin Bharathan
  • Hart Montgomery
  • Dave Huseby
  • Michael Lodder
  • Dan Middleton
  • Cam Parra
  • Jon Geater
  • Manu Drijvers
  • Brent Zundel
  • Maryam Hezaveh
  • Lovesh

Updates

  • Looking for speakers for 
    • ICMC '19
    • Consensys Construct
  • Ursa update–want to talk about active/incubation status

Discussion

  • Language bindings RFC.
    • ML- no global variables in RUST that he knows of- possible in executables but not with libraries- using a map for lookup is not possible- gets wiped out when call to lib ends
    • DH- Investigate more, we will go forward for now and alter if there are better methods
  • Proposal: All maintainers to green check mark on RFCs
    • Dan- idea is good but in practice may be delayed due to 5 more reviewers need.
    • Approved with the caveat that if the delay is too great we will revisit this in a later meeting.
  • Encryption API RFC
    • Dave- I have issues with an interface where we are passing byte arrays and pointers across the FFI boundary, purely on security issues.
    • Mike- Tried to figure out a way to get around it but don't know how to make globally allocated objects work in a Rust library that doesn't require manual ref counting in calling languages. Even languages that have garbage collection.
    • Another idea would be to follow Mozilla's idea of Using protobufs to serialize + deserialize across the FFI boundary
      • only concern is PrKs leakage.
      • could instead pass filenames or key ids across the boundary and have Ursa load the PrK instead of the calling code loading the PrK and passing it across the FFI.
    • We want to use Rust traits to make composable primitives to build up specific combinations of primitives (e.g. AES-GCM).
  • National crypto standards discussion
    • Dan- have some concerns of including crypto implementations that people don't think are safe.
    • Dave- the point is not to 
  • ZMix RFC
    • one is to be commented on MD two weeks rediscuss

Crypto- Rust traits will help us compose-

Encryption API–Dan M comments on national crypto.

Modularisation - internal architectural boundaries for mix and match for sovereign vs. non sovereign crypto- can be a mess in OpenSSL. Jon Geater- may cause a rethink on this with DH 

AnonCreds- Section 3.0.2 credential life cycle- Group owner vs. multiple issuers, Holder can send a different secret value - link secret binds them all

Credential Index- a number, set memberships, merkle trees, cryptographic accumulators.

What is the link between this doc(Sovrin specific) and Ursa, needs to be updated to be generalized. (BBS signatures are Sovrin )

Punts the algorithms to Bulletproofs paper. only in one algorithm is that made explicit.

CI/CD will have committee, K8 cluster is best way.



  • No labels