Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consume IBE hash function from the suite #34

Merged
merged 5 commits into from
Aug 3, 2022
Merged

Conversation

CluEleSsUK
Copy link

Consume IBE hash function from the suite rather than manually using blake2s XOF

Consume IBE hash function from the suite rather than manually using blake2s XOF
@CluEleSsUK
Copy link
Author

I noticed the default hash function is sha256 and some of the tests now fail - are these still relevant if not using blake?

@nikkolasg
Copy link

Now you must restrict input msg and ciphertext to be of max size "hash.Size()"

encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
@AnomalRoil AnomalRoil merged commit bf27c7a into master Aug 3, 2022
@AnomalRoil AnomalRoil deleted the feature/extract-hash branch August 3, 2022 19:40
@CluEleSsUK CluEleSsUK linked an issue Aug 16, 2022 that may be closed by this pull request
Robingoumaz pushed a commit to Robingoumaz/kyber-drand that referenced this pull request Apr 4, 2024
* Consume IBE hash function from the suite rather than manually using blake2s XOF
* Updated from PR comments
* removed mentions of xof in text
* patching newly discovered race condition with a mutex in StatusMatrix
* adding xorSigma length test

Co-authored-by: Yolan Romailler <anomalroil@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Extract hashing function in Kyber IBE to interface
3 participants