Attendees:
- Vipin Bharathan
- Hart Montgomery
- Dave Huseby
- Michael Lodder
- Dan Middleton
- Cam Parra
- Jon Geater
- Manu Drijvers
- Brent Zundel
- Maryam Hezaveh
- Lovesh
Updates
- Looking for speakers for
- ICMC '19
- Consensys Construct
- Ursa update–want to talk about active/incubation status
Discussion
- Language bindings RFC.
- ML- no global variables in RUST that he knows of- possible in executables but not with libraries- using a map for lookup is not possible- gets wiped out when call to lib ends
- DH- Investigate more, we will go forward for now and alter if there are better methods
- Proposal: All maintainers to green check mark on RFCs
- Dan- idea is good but in practice may be delayed due to 5 more reviewers need.
- Approved with the caveat that if the delay is too great we will revisit this in a later meeting.
- Encryption API RFC
- Dave- I have issues with an interface where we are passing byte arrays and pointers across the FFI boundary, purely on security issues.
- Mike- Tried to figure out a way to get around it but don't know how to make globally allocated objects work in a Rust library that doesn't require manual ref counting in calling languages. Even languages that have garbage collection.
- Another idea would be to follow Mozilla's idea of Using protobufs to serialize + deserialize across the FFI boundary
- only concern is PrKs leakage.
- could instead pass filenames or key ids across the boundary and have Ursa load the PrK instead of the calling code loading the PrK and passing it across the FFI.
- We want to use Rust traits to make composable primitives to build up specific combinations of primitives (e.g. AES-GCM).
- National crypto standards discussion
- Dan- have some concerns of including crypto implementations that people don't think are safe.
- Dave- the point is not to
- ZMix RFC
- one is to be commented on MD two weeks rediscuss
Crypto- Rust traits will help us compose-
Encryption API–Dan M comments on national crypto.
Modularisation - internal architectural boundaries for mix and match for sovereign vs. non sovereign crypto- can be a mess in OpenSSL. Jon Geater- may cause a rethink on this with DH
AnonCreds- Section 3.0.2 credential life cycle- Group owner vs. multiple issuers, Holder can send a different secret value - link secret binds them all
Credential Index- a number, set memberships, merkle trees, cryptographic accumulators.
What is the link between this doc(Sovrin specific) and Ursa, needs to be updated to be generalized. (BBS signatures are Sovrin )
Punts the algorithms to Bulletproofs paper. only in one algorithm is that made explicit.
CI/CD will have committee, K8 cluster is best way.