-
Notifications
You must be signed in to change notification settings - Fork 344
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support ed25519 signature verification (e.g. Tendermint block headers) #755
Comments
As mentioned in #751 (comment) let us add a batch verify here as well. It should be something like pubkeys and signatures are both N elements long (must be the same). If the return value is |
Request was to use https://crates.io/crates/ed25519-zebra that implements this |
Ed25519 supports arbitrary input lengths because the algorithm itself has an internal hashing step. In secp256k1 the input must not exceed 32 bytes. This is why you use an external hashing step. As a consequence, the |
Part of #751
Follow same steps as #752
Add a function
verify_ed25519()
toMockApi
to verify ed25519 signatures. This should take the raw pubkey and signature bytes as used in tendermint core to sign blocks.There seems to be much more standardization in ed25519, so we hopefully only need this one variant, not 3 different encodings as with secp256k1 (cosmos, ethereum, bitcoin).
The text was updated successfully, but these errors were encountered: