-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
What cryptography methods do you think we should support in syscalls? #1614
Comments
Some privacy project need us to add ecc pairing methods. |
MODPow? |
I made a summary of EOS and ETH related algorithms:
EOS
|
I remember @vncoelho talking about possibly allowing users to select which curve to use. If this is possible, I'd like to see Curve25519 (Ed25519) support, as there is justified suspicion around the curve parameters used in secp256r1 that I would want to avoid. The seed (which is supposed to be generated randomly) was not generated verifiably, and has no justification for it. See safecurves for reference. There's also a post from Vitalik on this topic and how Bitcoin may have evaded the problem by using k1. |
I think we can add it. |
@EdgeDLT I think it's good for us add Curve25519. Here is a statistical graph that describes the curves used by the other chains, provided by @wanglongfei88 As you can see, speck256k1 and Curve25519 are widely used. |
In fact you can use now
|
Some zkp projects, like Origo, Loopring, hope to access neo. But at present, we do not have complete support for zkp, mainly lacking support for ECC curve operations, including the following aspects: 1) add new opcode and syscalls
2) need to increase vm/compiler performance 3) need to reduce cost |
Congratulations for pushing this discussion forward, @Tommo-L. Count with our support. |
@Tommo-L nice initiative! there's a fundamental thing to mention here, regarding SHA3... |
I think NIST-SHA3 is enough, which is more widely used. And Keccak is not a standard version and is rarely used, including eth2, which will be deprecated. |
@Tommo-L Is there a timeline when we expect this list to be frozen? I'd like to start looking at available libraries that cover (hopefully) all needs. |
@ixje I think it is enough now, mainly from the needs of some project parties. |
Currently, we already have support:
Verify
andCheckMultiSig
Verify
andCheckMultiSig
There are some usage scenarios that we need to support
Case 1: Cross-chain
TODO
---------------------------- Updated at 9 June ------------------------------
Privacy crypto algorithm:
What other cryptography methods do you think we should add?
The text was updated successfully, but these errors were encountered: