Skip to content

Commit

Permalink
remove redundant discussion of SK requirements
Browse files Browse the repository at this point in the history
  • Loading branch information
kwantam committed Sep 7, 2020
1 parent 1f4a49b commit 36da837
Showing 1 changed file with 0 additions and 4 deletions.
4 changes: 0 additions & 4 deletions draft-irtf-cfrg-bls-signature.md
Original file line number Diff line number Diff line change
Expand Up @@ -1281,10 +1281,6 @@ One possibility is to generate IKM from a trusted source of randomness.
Guidelines on constructing such a source are outside the scope of this
document.

Secret keys MAY be generated using other methods; in this case they MUST
be infeasible to guess and MUST be indistinguishable from uniformly random
modulo r.

## Implementing hash\_to\_point and hash\_pubkey\_to\_point

The security analysis models hash\_to\_point and hash\_pubkey\_to\_point
Expand Down

0 comments on commit 36da837

Please sign in to comment.