Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Make Onet independent from Kyber #579

Open
3 tasks
Gilthoniel opened this issue Sep 26, 2019 · 3 comments
Open
3 tasks

Make Onet independent from Kyber #579

Gilthoniel opened this issue Sep 26, 2019 · 3 comments
Assignees
Labels

Comments

@Gilthoniel
Copy link
Contributor

Gilthoniel commented Sep 26, 2019

Those are the different points to change for Onet to be independent:

  • ServerToml is now tightly bound to kyber because of the public identity of a server that is a kyber point. One the same topic, suites are used to unmarshal the points.

  • TLS hack might need a rewrite or an adaptation as the server identity is used in the process.

  • ServerIdentity holds the key pair of the server and the services' key pairs which are defined by Kyber.

Overall it doesn't seem to be an impossible task.

@Gilthoniel Gilthoniel self-assigned this Sep 26, 2019
@Gilthoniel Gilthoniel added the v4 label Sep 26, 2019
@Gilthoniel
Copy link
Contributor Author

@ineiti
Copy link
Member

ineiti commented Sep 27, 2019

I only followed this from afar, so I might be completely off...

If I understand correctly, the goal is to allow for transport of lattigo structures in onet. So I don't understand why the question is make onet independent from kyber rather than add lattigo support to onet?

If instead of the kyber.Suite in the onet.serviceEntry there is a possibility of adding lattigo.Suite (which doesn't exist, but something like it) to the serviceEntry, you could use lattigo with onet, no?

Even though, if I remember correctly, there is a setup-phase in lattigo when creating the private keys. Or do I remember that wrongly?

@Gilthoniel
Copy link
Contributor Author

That is just an issue for me to keep track of what I did but I'm meeting next week with Christian to understand better what would the best for everyone.

Gilthoniel pushed a commit that referenced this issue Oct 28, 2019
This adds a cipher suite interface that will be used instead of
Kyber abstractions to allow any kind of asymmetric cryptography.

It also implements the interface by using the Ed25519 scheme
provided by the language.

Related to #579
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants