ring_sig 0.2.0 → 0.3.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,15 +1,7 @@
1
1
  ---
2
- !binary "U0hBMQ==":
3
- metadata.gz: !binary |-
4
- YWJjNzNiMmVjMTJjMDY1YzU2M2QyY2MxM2ExZDkwYTQxNzUwMmE5MA==
5
- data.tar.gz: !binary |-
6
- MDhiZDVlZTVmYzc2YWZkYTIxY2U1NjgyOWNlMzY2YWIyM2E0MDAxMQ==
2
+ SHA1:
3
+ metadata.gz: a9a8ff4b8548f802c19f9529c15034fc4c1329ab
4
+ data.tar.gz: 56e3a1befb6c39b8c8205e49f167598fd3fc0bfa
7
5
  SHA512:
8
- metadata.gz: !binary |-
9
- YzdiMzZkNzBlNTY2M2U3NzY1NmE5NTViZTJkYWY5ZjFjMzg5MjIyYzNiM2E3
10
- MjBhN2EyNmVmOTdiMTQwYzdmODliOGIyNzJkMzdiYzIzMmVkMGZiNThiZTQ2
11
- MmFhZDcwZWZjMDY2ZDcyZDgxOWI4ZjY1ZDUzM2IzNTA4NWI2YzU=
12
- data.tar.gz: !binary |-
13
- ZWMxNjk0YzE3NzM0YmQzYjcwMDdjM2NiODBhYWFlNTA1MmQ5MmQxNWY4MDQ1
14
- Njk4M2E1ZGM4OTA3MmQ5ZTMwZThiYmY4ZTRhZTA4ZmE2MmNlZTZiMTYzMGY4
15
- ZWU1MTQ2ZmZlNDk2ZTUzMjUyMmRjMTFhOWY2OGU4ZGU1NjFlMmE=
6
+ metadata.gz: d07e37c8ea67cceb18a6eca210cb03ce3c29381a3fe627ed24994a83e3b1093107521cc2b9588f76d26c4469aad9cd9eb266f80e34edfadb80b999d986fb1434
7
+ data.tar.gz: 594217e061216f7e336827112e9ed01bb35772ba6b6547173eb673d3d79dd385bdd920a6c38231b21134a2e4333a8375440130d6e28b044aa95a3f4d32867305
data/.travis.yml CHANGED
@@ -2,6 +2,6 @@ script: "rspec"
2
2
  rvm:
3
3
  - 1.9.3
4
4
  - 2.0.0
5
- - 2.1.0
5
+ - 2.1.2
6
6
  - jruby-19mode
7
7
  - rbx
data/CHANGELOG.md CHANGED
@@ -5,6 +5,24 @@ This gem follows [Semantic Versioning 2.0.0](http://semver.org/spec/v2.0.0.html)
5
5
  All classes and public methods are part of the public API, unless explicitly
6
6
  noted otherwise in their documentation.
7
7
 
8
+ 0.3.0
9
+ ----
10
+ Released on 2014-09-15
11
+
12
+ This release breaks API compatibility with version 0.2.0.
13
+
14
+ - Change `PrivateKey`, `PublicKey`, and `Signature` constructors such that they
15
+ accept a required `Hasher` argument rather than an optional `ECDSA::Group` and
16
+ `hash_algorithm`. The `Hasher` encapsulates these properties.
17
+ - Change `Hasher` constructor so that `group` and `hash_algorithm` attributes
18
+ are passed in as explicit arguments rather than options.
19
+ - Remove `RingSig.default_group` and `RingSig.defaut_hash_algorithm` attributes.
20
+ There are now no default algorithms.
21
+ - Update gem dependency for `ecdsa` gem to 1.2.
22
+
23
+ This will hopefully be the last major API change for a while, but it still may
24
+ change until 1.0 is released.
25
+
8
26
  0.2.0
9
27
  ----
10
28
  Released on 2014-09-12
data/README.md CHANGED
@@ -46,61 +46,94 @@ at RubyGems.org. To install it, run:
46
46
 
47
47
  ## Usage
48
48
 
49
+ ### Initialization
50
+
49
51
  First, require the gem:
52
+
50
53
  ```ruby
51
54
  require 'ring_sig'
52
55
  ```
53
56
 
54
- Next, create a private key for signing. For our example, we'll just use the
57
+ Instantiate a hasher. This specifies the `ECDSA::Group`, and the hash algorithm
58
+ that will be used for signing.
59
+
60
+ ```ruby
61
+ hasher = RingSig::Hasher::Secp256k1_Sha256
62
+ ```
63
+
64
+ Create a private key for signing. For our example, we'll just use the
55
65
  private key `1`. In the wild, you'll want to utilize a securely generated key.
66
+
56
67
  ```ruby
57
- key = RingSig::PrivateKey.new(1)
68
+ key = RingSig::PrivateKey.new(1, hasher)
58
69
  ```
59
70
 
60
- Next, access a set a foreign public keys for signing. To demonstrate that any
71
+ Instantiate a set a foreign public keys for signing. To demonstrate that any
61
72
  arbitrary keys can be used, we'll use the public keys from the coinbase
62
- transactions of the first three blocks on the bitcoin blockchain.
73
+ transactions of the first three blocks on the bitcoin blockchain (we can do this
74
+ since our hasher uses Secp256k1 as its `ECDSA::Group`).
63
75
 
64
76
  ```ruby
65
77
  foreign_keys = %w{
66
78
  04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38c4f35504e51ec112de5c384df7ba0b8d578a4c702b6bf11d5f
67
79
  0496b538e853519c726a2c91e61ec11600ae1390813a627c66fb8be7947be63c52da7589379515d4e0a604f8141781e62294721166bf621e73a82cbf2342c858ee
68
80
  047211a824f55b505228e4c3d5194c1fcfaa15a456abdf37f9b9d97a4040afc073dee6c89064984f03385237d92167c13e236446b417ab79a0fcae412ae3316b77
69
- }.map {|s| RingSig::PublicKey.from_hex(s) }
81
+ }.map {|s| RingSig::PublicKey.from_hex(s, hasher) }
70
82
  ```
71
83
 
84
+ ### Signing
85
+
72
86
  Next, we sign the message. This will assign a `RingSig::Signature` to the `sig`
73
87
  variable, and a deterministically shuffled Array of `RingSig::PublicKey`s to the
74
88
  `public_keys` variable.
89
+
75
90
  ```ruby
76
91
  sig, public_keys = key.sign("Hello World!", foreign_keys)
77
92
  ```
78
93
 
79
- You can see the signature contents by using the `to_hex` method:
94
+ You can encode the contents of the signature using the `to_hex` method:
95
+
96
+ ```ruby
97
+ sig_hex = sig.to_hex
98
+ ```
99
+
100
+ ### Verifying
101
+ In order to verify the signature, the verifier will need the signature, and the
102
+ ordered set of public keys.
103
+
104
+ In order to instantiate a signature object from a hex string, you can use the
105
+ `from_hex` method:
106
+
80
107
  ```ruby
81
- puts sig.to_hex
108
+ sig2 = RingSig::Signature.from_hex(sig_hex, hasher)
82
109
  ```
83
110
 
84
111
  Finally, verify the signature:
112
+
85
113
  ```ruby
86
- sig.verify("Hello World!", public_keys)
114
+ sig2.verify("Hello World!", public_keys)
87
115
  ```
88
116
 
89
- By default, this gem uses SHA256 for its hash algorithm, and Secp256k1 for its
90
- ECDSA group. You can specify alternates if you'd like:
117
+ ### Algorithms
118
+
119
+ The above example signature used Secp256k1 for the ECDSA group, and SHA256 for
120
+ the hash algorithm. You can specify alternates if you'd like, by using a
121
+ different hasher:
122
+
91
123
  ```ruby
92
- key = RingSig::PrivateKey.new(1, group: ECDSA::Group::Secp256r1, hash_algorithm: OpenSSL::Digest::RIPEMD160)
124
+ key = RingSig::PrivateKey.new(1, RingSig::Hasher::Secp384r1_Sha384)
93
125
  ```
94
126
 
95
- You can also specify module-wide alternate defaults:
127
+ You can also instantiate your own hasher directly, rather than using the
128
+ pre-defined constants:
129
+
96
130
  ```ruby
97
- RingSig.default_group = ECDSA::Group::Secp256r1
98
- RingSig.default_hash_algorithm = OpenSSL::Digest::RIPEMD160
99
- key = RingSig::PrivateKey.new(1)
100
- puts key.group # ECDSA::Group::Secp256r1
101
- puts key.hash_algorithm # OpenSSL::Digest::RIPEMD160
131
+ hasher = RingSig::Hasher.new(ECDSA::Group::Secp384r1, OpenSSL::Digest::SHA384)
102
132
  ```
103
133
 
134
+ Note that the byte-length of the group's order and the digest method must match,
135
+ or else the signatures generated will leak the position of the true signer.
136
+
104
137
  ## Standards
105
138
 
106
139
  There currently aren't any standards around Ring Signatures that I know of. This
@@ -136,7 +169,7 @@ for this gem.
136
169
 
137
170
  ## Supported platforms
138
171
 
139
- Ruby 2.0.0 and above.
172
+ Ruby 1.9.3 and above, including jruby-19mode.
140
173
 
141
174
  ## Documentation
142
175
 
@@ -5,17 +5,19 @@ module RingSig
5
5
  attr_reader :group
6
6
 
7
7
  # @return [#digest]
8
- attr_reader :hash_algorithm
8
+ attr_reader :algorithm
9
9
 
10
10
  # Creates a new instance of {Hasher}.
11
11
  #
12
- # @param opts [Hash]
13
- # @option opts :group [ECDSA::Group]
14
- # @option opts :hash_algorithm [#digest]
15
- def initialize(opts = {})
16
- @group = opts.delete(:group) { RingSig.default_group }
17
- @hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
18
- raise ArgumentError, "Unknown options #{opts.keys.join(', ')}" unless opts.empty?
12
+ # @note The byte-length of the group's order and the digest method must
13
+ # match, or else signatures generated from this hasher will leak the
14
+ # position of the true signer.
15
+ #
16
+ # @param group [ECDSA::Group]
17
+ # @param algorithm [#digest]
18
+ def initialize(group, algorithm)
19
+ @group = group
20
+ @algorithm = algorithm
19
21
  end
20
22
 
21
23
  # Continuously hashes until a value less than the group's order is found.
@@ -25,7 +27,7 @@ module RingSig
25
27
  def hash_string(s)
26
28
  n = nil
27
29
  loop do
28
- s = @hash_algorithm.digest(s)
30
+ s = algorithm.digest(s)
29
31
  n = s.unpack('H*').first.to_i(16)
30
32
  break if n < @group.order
31
33
  end
@@ -76,6 +78,11 @@ module RingSig
76
78
  array
77
79
  end
78
80
 
81
+ # @return [Boolean] true if the hashers are equal.
82
+ def ==(other)
83
+ group == other.group && algorithm == other.algorithm
84
+ end
85
+
79
86
  private
80
87
 
81
88
  # Deterministically returns a random number between 0 and n.
@@ -91,5 +98,11 @@ module RingSig
91
98
  return r % n if r < @group.order - @group.order % n
92
99
  end
93
100
  end
101
+
102
+ Secp256k1_Sha256 = new(ECDSA::Group::Secp256k1, OpenSSL::Digest::SHA256)
103
+ Secp256r1_Sha256 = new(ECDSA::Group::Secp256r1, OpenSSL::Digest::SHA256)
104
+ Secp384r1_Sha384 = new(ECDSA::Group::Secp384r1, OpenSSL::Digest::SHA384)
105
+ Secp160k1_Ripemd160 = new(ECDSA::Group::Secp160k1, OpenSSL::Digest::RIPEMD160)
106
+ Secp160r1_Ripemd160 = new(ECDSA::Group::Secp160r1, OpenSSL::Digest::RIPEMD160)
94
107
  end
95
108
  end
@@ -11,65 +11,44 @@ module RingSig
11
11
  # @return [PublicKey]
12
12
  attr_reader :public_key
13
13
 
14
- # @return [ECDSA::Group]
15
- attr_reader :group
16
-
17
- # @return [#digest]
18
- attr_reader :hash_algorithm
14
+ # @return [Hasher]
15
+ attr_reader :hasher
19
16
 
20
17
  # Creates a new instance of {PrivateKey}.
21
18
  #
22
19
  # @param value [Integer]
23
- # @param opts [Hash]
24
- # @option opts :group [ECDSA::Group]
25
- # @option opts :hash_algorithm [#digest]
26
- def initialize(value, opts = {})
27
- @group = opts.delete(:group) { RingSig.default_group }
28
- @hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
29
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
30
-
20
+ # @param hasher [Hasher]
21
+ def initialize(value, hasher)
31
22
  raise ArgumentError, "Value is not an integer" unless value.is_a?(Integer)
32
23
  raise ArgumentError, "Value is too small" if value < 1
33
- raise ArgumentError, "Value is too large" if value >= group.order
24
+ raise ArgumentError, "Value is too large" if value >= hasher.group.order
34
25
 
35
26
  @value = value
36
- @public_key = PublicKey.new(group.generator.multiply_by_scalar(value), group: group)
37
- @hasher = Hasher.new(group: group, hash_algorithm: hash_algorithm)
27
+ @hasher = hasher
28
+ @public_key = PublicKey.new(hasher.group.generator * value, hasher)
38
29
  end
39
30
 
40
31
  # Creates a new instance of {PrivateKey} from a hex string.
41
32
  #
42
33
  # @param hex_string [String]
43
- # @param opts [Hash]
44
- # @option opts :group [ECDSA::Group]
45
- # @option opts :hash_algorithm [#digest]
34
+ # @param hasher [Hasher]
46
35
  # @return [PrivateKey]
47
- def self.from_hex(hex_string, opts = {})
48
- group = opts.delete(:group) { RingSig.default_group }
49
- hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
50
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
51
-
52
- self.from_octet([hex_string].pack('H*'), group: group, hash_algorithm: hash_algorithm)
36
+ def self.from_hex(hex_string, hasher)
37
+ self.from_octet([hex_string].pack('H*'), hasher)
53
38
  end
54
39
 
55
40
  # Creates a new instance of {PrivateKey} from an octet string.
56
41
  #
57
42
  # @param octet_string [String]
58
- # @param opts [Hash]
59
- # @option opts :group [ECDSA::Group]
60
- # @option opts :hash_algorithm [#digest]
43
+ # @param hasher [Hasher]
61
44
  # @return [PrivateKey]
62
- def self.from_octet(octet_string, opts = {})
63
- group = opts.delete(:group) { RingSig.default_group }
64
- hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
65
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
66
-
67
- value = ECDSA::Format::FieldElementOctetString.decode(octet_string, group.field)
68
- PrivateKey.new(value, group: group, hash_algorithm: hash_algorithm)
45
+ def self.from_octet(octet_string, hasher)
46
+ value = ECDSA::Format::FieldElementOctetString.decode(octet_string, hasher.group.field)
47
+ PrivateKey.new(value, hasher)
69
48
  end
70
49
 
71
50
  # Encodes this private key into an octet string. The encoded data contains
72
- # only the value. It does not contain the group or hash_algorithm.
51
+ # only the value. It does not contain the hasher.
73
52
  #
74
53
  # @return [String]
75
54
  def to_hex
@@ -77,11 +56,11 @@ module RingSig
77
56
  end
78
57
 
79
58
  # Encodes this public key into a hex string. The encoded data contains
80
- # only the value. It does not contain the group or hash_algorithm.
59
+ # only the value. It does not contain the hasher.
81
60
  #
82
61
  # @return [String]
83
62
  def to_octet
84
- ECDSA::Format::FieldElementOctetString.encode(value, group.field)
63
+ ECDSA::Format::FieldElementOctetString.encode(value, hasher.group.field)
85
64
  end
86
65
 
87
66
  # Signs a message with this key's private key and a set of foreign public
@@ -95,27 +74,27 @@ module RingSig
95
74
  # @return [Array(Signature, Array<PublicKey>)] A pair containing the signature
96
75
  # and the set of public keys (in the correct order) for verifying.
97
76
  def sign(message, foreign_keys)
98
- raise ArgumentError "Foreign keys must all have the same group" unless foreign_keys.all?{ |e| e.group == group }
77
+ raise ArgumentError "Foreign keys must all have the same hasher" unless foreign_keys.all?{ |e| e.hasher == hasher }
99
78
 
100
- message_digest = @hasher.hash_string(message)
101
- seed = @hasher.hash_array([value, message_digest])
79
+ message_digest = hasher.hash_string(message)
80
+ seed = hasher.hash_array([value, message_digest])
102
81
 
103
- all_keys = @hasher.shuffle([self] + foreign_keys, seed)
82
+ all_keys = hasher.shuffle([self] + foreign_keys, seed)
104
83
 
105
84
  q_array, w_array = generate_q_w(all_keys, seed)
106
85
  ll_array, rr_array = generate_ll_rr(all_keys, q_array, w_array)
107
- challenge = @hasher.hash_array([message_digest] + ll_array + rr_array)
86
+ challenge = hasher.hash_array([message_digest] + ll_array + rr_array)
108
87
  c_array, r_array = generate_c_r(all_keys, q_array, w_array, challenge)
109
88
 
110
89
  public_keys = all_keys.map(&:public_key)
111
- signature = Signature.new(key_image, c_array, r_array, group: group, hash_algorithm: hash_algorithm)
90
+ signature = Signature.new(key_image, c_array, r_array, hasher)
112
91
 
113
92
  [signature, public_keys]
114
93
  end
115
94
 
116
95
  # @return [ECDSA::Point] the key image.
117
96
  def key_image
118
- @key_image ||= @hasher.hash_point(point) * value
97
+ @key_image ||= hasher.hash_point(point) * value
119
98
  end
120
99
 
121
100
  # @return [ECDSA::Point] the public key's point.
@@ -126,7 +105,7 @@ module RingSig
126
105
  # @return [Boolean] true if the private keys are equal.
127
106
  def ==(other)
128
107
  return false unless other.is_a?(PrivateKey)
129
- value == other.value && group == other.group && hash_algorithm == other.hash_algorithm
108
+ value == other.value && hasher == other.hasher
130
109
  end
131
110
 
132
111
  private
@@ -135,9 +114,9 @@ module RingSig
135
114
  q_array, w_array = [], []
136
115
 
137
116
  all_keys.each_with_index do |k, i|
138
- q_array[i] = @hasher.hash_array(['q', seed, i])
117
+ q_array[i] = hasher.hash_array(['q', seed, i])
139
118
  w_array[i] = 0
140
- w_array[i] = @hasher.hash_array(['w', seed, i]) if k.is_a?(PublicKey)
119
+ w_array[i] = hasher.hash_array(['w', seed, i]) if k.is_a?(PublicKey)
141
120
  end
142
121
 
143
122
  [q_array, w_array]
@@ -147,8 +126,8 @@ module RingSig
147
126
  ll_array, rr_array = [], []
148
127
 
149
128
  all_keys.each_with_index do |k, i|
150
- ll_array[i] = group.generator * q_array[i]
151
- rr_array[i] = @hasher.hash_point(k.point) * q_array[i]
129
+ ll_array[i] = hasher.group.generator * q_array[i]
130
+ rr_array[i] = hasher.hash_point(k.point) * q_array[i]
152
131
  if k.is_a?(PublicKey)
153
132
  ll_array[i] += k.point * w_array[i]
154
133
  rr_array[i] += key_image * w_array[i]
@@ -166,8 +145,8 @@ module RingSig
166
145
  c_array[i] = w_array[i]
167
146
  r_array[i] = q_array[i]
168
147
  else
169
- c_array[i] = (challenge - w_array.inject{|a, b| a + b}) % group.order
170
- r_array[i] = (q_array[i] - c_array[i] * k.value) % group.order
148
+ c_array[i] = (challenge - w_array.inject{|a, b| a + b}) % hasher.group.order
149
+ r_array[i] = (q_array[i] - c_array[i] * k.value) % hasher.group.order
171
150
  end
172
151
  end
173
152
 
@@ -7,56 +7,45 @@ module RingSig
7
7
  # @return [ECDSA::Point]
8
8
  attr_reader :point
9
9
 
10
- # @return [ECDSA::Group]
11
- attr_reader :group
10
+ # @return [Hasher]
11
+ attr_reader :hasher
12
12
 
13
13
  # Creates a new instance of {PublicKey}.
14
14
  #
15
15
  # @param point [ECDSA::Point]
16
- # @param opts [Hash]
17
- # @option opts :group [ECDSA::Group]
18
- def initialize(point, opts = {})
19
- @group = opts.delete(:group) { RingSig.default_group }
20
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
21
-
16
+ # @param hasher [Hasher]
17
+ def initialize(point, hasher)
22
18
  raise ArgumentError, "Point is not an ECDSA::Point" unless point.is_a?(ECDSA::Point)
23
- raise ArgumentError, "Point is not on the group's curve" unless group.include?(point)
19
+ raise ArgumentError, "Point is not on the group's curve" unless hasher.group.include?(point)
24
20
 
25
21
  @point = point
22
+ @hasher = hasher
26
23
  end
27
24
 
28
25
  # Creates a new instance of {PublicKey} from a hex string.
29
26
  #
30
27
  # @param hex_string [String]
31
- # @param opts [Hash]
32
- # @option opts :group [ECDSA::Group]
28
+ # @param hasher [Hasher]
33
29
  # @return [PublicKey]
34
- def self.from_hex(hex_string, opts = {})
35
- group = opts.delete(:group) { RingSig.default_group }
36
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
37
-
38
- self.from_octet([hex_string].pack('H*'), group: group)
30
+ def self.from_hex(hex_string, hasher)
31
+ self.from_octet([hex_string].pack('H*'), hasher)
39
32
  end
40
33
 
41
34
  # Creates a new instance of {PublicKey} from an octet string.
42
35
  #
43
36
  # @param octet_string [String]
44
- # @param opts [Hash]
45
- # @option opts :group [ECDSA::Group]
37
+ # @param hasher [Hasher]
46
38
  # @return [PublicKey]
47
- def self.from_octet(octet_string, opts = {})
48
- group = opts.delete(:group) { RingSig.default_group }
49
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
50
-
51
- point = ECDSA::Format::PointOctetString.decode(octet_string, group)
52
- PublicKey.new(point, group: group)
39
+ def self.from_octet(octet_string, hasher)
40
+ point = ECDSA::Format::PointOctetString.decode(octet_string, hasher.group)
41
+ PublicKey.new(point, hasher)
53
42
  end
54
43
 
55
44
  # Encodes this public key into an octet string. The encoded data contains
56
- # only the point. It does not contain the group.
45
+ # only the point. It does not contain the hasher.
57
46
  #
58
47
  # @param opts [Hash]
59
- # @option opts :compression [Boolean]
48
+ # @option opts [Boolean] :compression (true)
60
49
  # @return [String]
61
50
  def to_hex(opts = {})
62
51
  compression = opts.delete(:compression) { true }
@@ -66,10 +55,10 @@ module RingSig
66
55
  end
67
56
 
68
57
  # Encodes this public key into a hex string. The encoded data contains
69
- # only the point. It does not contain the group.
58
+ # only the point. It does not contain the hasher.
70
59
  #
71
60
  # @param opts [Hash]
72
- # @option opts :compression [Boolean]
61
+ # @option opts [Boolean] :compression (true)
73
62
  # @return [String]
74
63
  def to_octet(opts = {})
75
64
  compression = opts.delete(:compression) { true }
@@ -86,7 +75,7 @@ module RingSig
86
75
  # @return [Boolean] true if the public keys are equal.
87
76
  def ==(other)
88
77
  return false unless other.is_a?(PublicKey)
89
- point == other.point && group == other.group
78
+ point == other.point && hasher == other.hasher
90
79
  end
91
80
  end
92
81
  end
@@ -10,75 +10,53 @@ module RingSig
10
10
  # @return [Array]
11
11
  attr_reader :r_array
12
12
 
13
- # @return [ECDSA::Group]
14
- attr_reader :group
15
-
16
- # @return [#digest]
17
- attr_reader :hash_algorithm
13
+ # @return [Hasher]
14
+ attr_reader :hasher
18
15
 
19
16
  # Creates a new instance of {Signature}.
20
17
  #
21
18
  # @param key_image [ECDSA::Point]
22
19
  # @param c_array [Array<Integer>]
23
20
  # @param r_array [Array<Integer>]
24
- # @param opts [Hash]
25
- # @option opts :group [ECDSA::Group]
26
- # @option opts :hash_algorithm [#digest]
27
- def initialize(key_image, c_array, r_array, opts = {})
28
- @group = opts.delete(:group) { RingSig.default_group }
29
- @hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
30
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
31
-
21
+ # @param hasher [Hasher]
22
+ def initialize(key_image, c_array, r_array, hasher)
32
23
  @key_image, @c_array, @r_array = key_image, c_array, r_array
33
24
  key_image.is_a?(ECDSA::Point) or raise ArgumentError, 'key_image is not an ECDSA::Point.'
34
25
  c_array.is_a?(Array) or raise ArgumentError, 'c_array is not an array.'
35
26
  r_array.is_a?(Array) or raise ArgumentError, 'r_array is not an array.'
36
27
 
37
- @hasher = Hasher.new(group: group, hash_algorithm: hash_algorithm)
28
+ @hasher = hasher
38
29
  end
39
30
 
40
31
  # Creates a new instance of {Signature} from a der string.
41
32
  #
42
33
  # @param der_string [String]
43
- # @param opts [Hash]
44
- # @option opts :group [ECDSA::Group]
45
- # @option opts :hash_algorithm [#digest]
34
+ # @param hasher [Hasher]
46
35
  # @return [Signature]
47
- def self.from_der(der_string, opts = {})
48
- group = opts.delete(:group) { RingSig.default_group }
49
- hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
50
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
51
-
36
+ def self.from_der(der_string, hasher)
52
37
  asn1 = OpenSSL::ASN1.decode(der_string)
53
38
 
54
- key_image = ECDSA::Format::PointOctetString.decode(asn1.value[0].value, group)
39
+ key_image = ECDSA::Format::PointOctetString.decode(asn1.value[0].value, hasher.group)
55
40
  c_array = asn1.value[1].value.map{|i| i.value.to_i}
56
41
  r_array = asn1.value[2].value.map{|i| i.value.to_i}
57
42
 
58
- Signature.new(key_image, c_array, r_array, group: group, hash_algorithm: hash_algorithm)
43
+ Signature.new(key_image, c_array, r_array, hasher)
59
44
  end
60
45
 
61
46
  # Creates a new instance of {Signature} from a hex string.
62
47
  #
63
48
  # @param hex_string [String]
64
- # @param opts [Hash]
65
- # @option opts :group [ECDSA::Group]
66
- # @option opts :hash_algorithm [#digest]
49
+ # @param hasher [Hasher]
67
50
  # @return [Signature]
68
- def self.from_hex(hex_string, opts = {})
69
- group = opts.delete(:group) { RingSig.default_group }
70
- hash_algorithm = opts.delete(:hash_algorithm) { RingSig.default_hash_algorithm }
71
- raise ArgumentError, "Unknown opts: #{opts.keys.join(', ')}" unless opts.empty?
72
-
73
- Signature.from_der([hex_string].pack('H*'), group: group, hash_algorithm: hash_algorithm)
51
+ def self.from_hex(hex_string, hasher)
52
+ Signature.from_der([hex_string].pack('H*'), hasher)
74
53
  end
75
54
 
76
55
  # Encodes this signature into a der string. The encoded data contains
77
- # the key_image, c_array, and r_array. It does not contain the group
78
- # or hash_algorithm.
56
+ # the key_image, c_array, and r_array. It does not contain the hasher.
79
57
  #
80
58
  # @param opts [Hash]
81
- # @option opts :compression [Boolean]
59
+ # @option opts [Boolean] :compression (true)
82
60
  # @return [String]
83
61
  def to_der(opts = {})
84
62
  compression = opts.delete(:compression) { true }
@@ -92,11 +70,10 @@ module RingSig
92
70
  end
93
71
 
94
72
  # Encodes this signature into a hex string. The encoded data contains
95
- # the key_image, c_array, and r_array. It does not contain the group
96
- # or hash_algorithm.
73
+ # the key_image, c_array, and r_array. It does not contain the hasher.
97
74
  #
98
75
  # @param opts [Hash]
99
- # @option opts :compression [Boolean]
76
+ # @option opts [Boolean] :compression (true)
100
77
  # @return [String]
101
78
  def to_hex(opts = {})
102
79
  compression = opts.delete(:compression) { true }
@@ -115,14 +92,14 @@ module RingSig
115
92
  rr_array = []
116
93
 
117
94
  public_keys.each_with_index do |k, i|
118
- ll_array[i] = (group.generator * r_array[i]) + (k.point * c_array[i])
119
- rr_array[i] = (@hasher.hash_point(k.point) * (r_array[i]) + key_image * c_array[i])
95
+ ll_array[i] = (hasher.group.generator * r_array[i]) + (k.point * c_array[i])
96
+ rr_array[i] = (hasher.hash_point(k.point) * (r_array[i]) + key_image * c_array[i])
120
97
  end
121
98
 
122
- c_sum = c_array.inject{|a, b| a + b} % group.order
99
+ c_sum = c_array.inject{|a, b| a + b} % hasher.group.order
123
100
 
124
- message_digest = @hasher.hash_string(message)
125
- challenge = @hasher.hash_array([message_digest] + ll_array + rr_array)
101
+ message_digest = hasher.hash_string(message)
102
+ challenge = hasher.hash_array([message_digest] + ll_array + rr_array)
126
103
 
127
104
  c_sum == challenge
128
105
  end
@@ -1,4 +1,4 @@
1
1
  module RingSig
2
2
  # This gem's version.
3
- VERSION = '0.2.0'
3
+ VERSION = '0.3.0'
4
4
  end
data/lib/ring_sig.rb CHANGED
@@ -5,22 +5,7 @@ require 'ring_sig/private_key'
5
5
  require 'ring_sig/public_key'
6
6
  require 'ring_sig/signature'
7
7
  require 'ring_sig/version'
8
- require 'ring_sig/ecdsa/point'
9
8
 
10
9
  # The top-level module for the RingSig gem.
11
10
  module RingSig
12
- class << self
13
- # @return [ECDSA::Group] the default group. This group will be used in any
14
- # method in the RingSig library that calls for a group, if none is
15
- # specified. Starts as `ECDSA::Group::Secp256k1`.
16
- attr_accessor :default_group
17
-
18
- # @return [#digest] the default hash algorithm. This hash algorithm will be
19
- # used in any method in the RingSig library that calls for a hash
20
- # algorithm, if none is specified. Starts as `OpenSSL::Digest::SHA256`.
21
- attr_accessor :default_hash_algorithm
22
- end
23
-
24
- self.default_group = ECDSA::Group::Secp256k1
25
- self.default_hash_algorithm = OpenSSL::Digest::SHA256
26
11
  end
data/ring_sig.gemspec CHANGED
@@ -22,5 +22,5 @@ Gem::Specification.new do |s|
22
22
  s.add_development_dependency 'markdown', '~> 1'
23
23
  s.add_development_dependency 'redcarpet', '~> 3' unless RUBY_PLATFORM == 'java'
24
24
 
25
- s.add_runtime_dependency 'ecdsa', '~> 1.1'
25
+ s.add_runtime_dependency 'ecdsa', '~> 1.2'
26
26
  end
data/spec/hasher_spec.rb CHANGED
@@ -4,7 +4,7 @@ describe RingSig::Hasher do
4
4
  context 'Standard: SHA256 hash algorithm, secp256k1 group' do
5
5
  group = ECDSA::Group::Secp256k1
6
6
  hash_algorithm = OpenSSL::Digest::SHA256
7
- hasher = RingSig::Hasher.new(group: group, hash_algorithm: hash_algorithm)
7
+ hasher = RingSig::Hasher.new(group, hash_algorithm)
8
8
 
9
9
  describe '#hash_string' do
10
10
  it 'hashes "a"' do
@@ -67,7 +67,7 @@ describe RingSig::Hasher do
67
67
  SimpleHashAlgorithm
68
68
  end
69
69
 
70
- let(:hasher) { RingSig::Hasher.new(group: group, hash_algorithm: hash_algorithm) }
70
+ let(:hasher) { RingSig::Hasher.new(group, hash_algorithm) }
71
71
 
72
72
  # We test the hash_algorithm itself in this context, since we implemented our own simple hash_algorithm.
73
73
  shared_examples_for 'hash algorithm' do |input, expected_value|
@@ -1,7 +1,8 @@
1
1
  require 'spec_helper'
2
2
 
3
3
  describe RingSig::PrivateKey do
4
- key = RingSig::PrivateKey.new(1)
4
+ hasher = RingSig::Hasher::Secp256k1_Sha256
5
+ key = RingSig::PrivateKey.new(1, hasher)
5
6
  key_hex = '0000000000000000000000000000000000000000000000000000000000000001'
6
7
  group = ECDSA::Group::Secp256k1
7
8
  message = 'a'
@@ -10,14 +11,14 @@ describe RingSig::PrivateKey do
10
11
  04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38c4f35504e51ec112de5c384df7ba0b8d578a4c702b6bf11d5f
11
12
  0496b538e853519c726a2c91e61ec11600ae1390813a627c66fb8be7947be63c52da7589379515d4e0a604f8141781e62294721166bf621e73a82cbf2342c858ee
12
13
  047211a824f55b505228e4c3d5194c1fcfaa15a456abdf37f9b9d97a4040afc073dee6c89064984f03385237d92167c13e236446b417ab79a0fcae412ae3316b77
13
- }.map {|s| RingSig::PublicKey.from_hex(s) }
14
+ }.map {|s| RingSig::PublicKey.from_hex(s, hasher) }
14
15
 
15
16
  it 'raises ArgumentError if value is too small' do
16
- expect { RingSig::PrivateKey.new(0) }.to raise_error(ArgumentError)
17
+ expect { RingSig::PrivateKey.new(0, hasher) }.to raise_error(ArgumentError)
17
18
  end
18
19
 
19
20
  it 'raises ArgumentError if value is too large' do
20
- expect { RingSig::PrivateKey.new(group.order) }.to raise_error(ArgumentError)
21
+ expect { RingSig::PrivateKey.new(group.order, hasher) }.to raise_error(ArgumentError)
21
22
  end
22
23
 
23
24
  describe '#key_image' do
@@ -47,7 +48,7 @@ describe RingSig::PrivateKey do
47
48
 
48
49
  describe '#from_hex' do
49
50
  it 'converts from hex' do
50
- expect(RingSig::PrivateKey.from_hex(key_hex)).to eq key
51
+ expect(RingSig::PrivateKey.from_hex(key_hex, hasher)).to eq key
51
52
  end
52
53
  end
53
54
 
@@ -59,18 +60,18 @@ describe RingSig::PrivateKey do
59
60
 
60
61
  describe '#from_octet' do
61
62
  it 'converts from octet' do
62
- expect(RingSig::PrivateKey.from_octet([key_hex].pack('H*'))).to eq key
63
+ expect(RingSig::PrivateKey.from_octet([key_hex].pack('H*'), hasher)).to eq key
63
64
  end
64
65
  end
65
66
 
66
67
  describe '==' do
67
68
  it 'returns true when keys are the same' do
68
69
  expect(key).to eq key
69
- expect(RingSig::PrivateKey.new(key.value) == key).to eq true
70
+ expect(RingSig::PrivateKey.new(key.value, hasher) == key).to eq true
70
71
  end
71
72
 
72
73
  it 'returns false when keys are different' do
73
- expect(RingSig::PrivateKey.new(2) == key).to eq false
74
+ expect(RingSig::PrivateKey.new(2, hasher) == key).to eq false
74
75
  end
75
76
  end
76
77
 
@@ -105,33 +106,22 @@ describe RingSig::PrivateKey do
105
106
  end
106
107
  end
107
108
 
108
- context 'alternate defaults' do
109
+ context 'alternate hasher' do
109
110
  before(:all) do
110
- @old_default_group = RingSig.default_group
111
- @old_default_hash_algorithm = RingSig.default_hash_algorithm
112
- RingSig.default_group = ECDSA::Group::Secp256r1
113
- RingSig.default_hash_algorithm = OpenSSL::Digest::RIPEMD160
114
-
115
- @key = RingSig::PrivateKey.new(1)
111
+ @key = RingSig::PrivateKey.new(1, RingSig::Hasher::Secp160k1_Ripemd160)
116
112
  @foreign_keys = [
117
- RingSig::PrivateKey.new(2).public_key,
118
- RingSig::PrivateKey.new(3).public_key,
119
- RingSig::PrivateKey.new(4).public_key,
113
+ RingSig::PrivateKey.new(2, RingSig::Hasher::Secp160k1_Ripemd160).public_key,
114
+ RingSig::PrivateKey.new(3, RingSig::Hasher::Secp160k1_Ripemd160).public_key,
120
115
  ]
121
116
  end
122
117
 
123
- after(:all) do
124
- RingSig.default_group = @old_default_group
125
- RingSig.default_hash_algorithm = @old_default_hash_algorithm
126
- end
127
-
128
118
  describe '#sign' do
129
119
  it 'signs and verifies' do
130
120
  sig, public_keys = @key.sign(message, @foreign_keys)
131
121
 
132
- expect(sig.to_hex).to eq '3081e804210242ea46f23d6dc4e4515f2b1001734cf2c4a09b9ab169a588bf01a13b9e553de03067022100ffffffff00000000fffffffe714565846c5397cd4e5e24b41dfd02b75761d074021500881bf1e9c67d05c7a8a6ef93552a785246603436021500e17e885e1b5c59e80a5ed90ae26bea5067b3314a02146655e2724456f7d8d21238d797e0a809a3013337305a02150198482b6231394361df3ad5b577c70953b2572c9f02141cd9f8cc0df48519ecd6ad6e354ca634c8b604c20214361d1207afcdb5c041df20efac5496b26243403a0215008fddaf160ecfaed0c2048e6f018c933fc398e33b'
122
+ expect(sig.to_hex).to eq '3081a004150335d6eb01d7c658c2aae34e1e910e1b44c993069d30430214685baa33eacec37ff3530d710ca852731e1ac7b0021500881bf1e9c67d05c7a8a6ef93552a7852466034360214211b72b5e3a934d0e096441c5208b4322a83b7a130420214098d90e6e0a5e08186815be4a20a41480d55d7c202141cd9f8cc0df48519ecd6ad6e354ca634c8b604c2021415019f51cc2480ef6148dcd35a4be28037bf8899'
133
123
 
134
- expected_public_keys = [0, 2, 1, 3].map{|i| ([@key] + @foreign_keys)[i].public_key}
124
+ expected_public_keys = [2, 1, 0].map{|i| ([@key] + @foreign_keys)[i].public_key}
135
125
  expect(public_keys).to eq expected_public_keys
136
126
 
137
127
  expect(sig.verify(message, public_keys)).to be true
@@ -4,10 +4,11 @@ describe RingSig::PublicKey do
4
4
  compressed_hex = '03678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb6'
5
5
  uncompressed_hex = '04678afdb0fe5548271967f1a67130b7105cd6a828e03909a67962e0ea1f61deb649f6bc3f4cef38c4f35504e51ec112de5c384df7ba0b8d578a4c702b6bf11d5f'
6
6
  group = ECDSA::Group::Secp256k1
7
+ hasher = RingSig::Hasher::Secp256k1_Sha256
7
8
  key = RingSig::PublicKey.new(group.new_point([
8
9
  46833799212576611471711417854818141128240043280360231002189938627535641370294,
9
10
  33454781559405909841731692443380420218121109572881027288991311028992835919199
10
- ]))
11
+ ]), hasher)
11
12
 
12
13
  describe '#to_hex' do
13
14
  it 'converts to compressed hex' do
@@ -21,11 +22,11 @@ describe RingSig::PublicKey do
21
22
 
22
23
  describe '#from_hex' do
23
24
  it 'converts from compressed hex' do
24
- expect(RingSig::PublicKey.from_hex(compressed_hex)).to eq key
25
+ expect(RingSig::PublicKey.from_hex(compressed_hex, hasher)).to eq key
25
26
  end
26
27
 
27
28
  it 'converts from uncompressed hex' do
28
- expect(RingSig::PublicKey.from_hex(uncompressed_hex)).to eq key
29
+ expect(RingSig::PublicKey.from_hex(uncompressed_hex, hasher)).to eq key
29
30
  end
30
31
  end
31
32
 
@@ -41,22 +42,22 @@ describe RingSig::PublicKey do
41
42
 
42
43
  describe '#from_octet' do
43
44
  it 'converts from compressed octet' do
44
- expect(RingSig::PublicKey.from_octet([compressed_hex].pack('H*'))).to eq key
45
+ expect(RingSig::PublicKey.from_octet([compressed_hex].pack('H*'), hasher)).to eq key
45
46
  end
46
47
 
47
48
  it 'converts from uncompressed octet' do
48
- expect(RingSig::PublicKey.from_octet([uncompressed_hex].pack('H*'))).to eq key
49
+ expect(RingSig::PublicKey.from_octet([uncompressed_hex].pack('H*'), hasher)).to eq key
49
50
  end
50
51
  end
51
52
 
52
53
  describe '==' do
53
54
  it 'returns true when keys are the same' do
54
55
  expect(key).to eq key
55
- expect(RingSig::PublicKey.new(key.point) == key).to eq true
56
+ expect(RingSig::PublicKey.new(key.point, hasher) == key).to eq true
56
57
  end
57
58
 
58
59
  it 'returns false when keys are different' do
59
- expect(RingSig::PublicKey.new(group.generator) == key).to eq false
60
+ expect(RingSig::PublicKey.new(group.generator, hasher) == key).to eq false
60
61
  end
61
62
  end
62
63
  end
@@ -2,7 +2,8 @@ require 'spec_helper'
2
2
 
3
3
  describe RingSig::Signature do
4
4
  group = ECDSA::Group::Secp256k1
5
- signature = RingSig::Signature.new(group.generator, [10], [20])
5
+ hasher = RingSig::Hasher::Secp256k1_Sha256
6
+ signature = RingSig::Signature.new(group.generator, [10], [20], hasher)
6
7
  sig_hex = '302d04210279be667ef9dcbbac55a06295ce870b07029bfcdb2dce28d959f2815b16f81798300302010a3003020114'
7
8
  sig_der = "0-\x04!\x02y\xBEf~\xF9\xDC\xBB\xACU\xA0b\x95\xCE\x87\v\a\x02\x9B\xFC\xDB-\xCE(\xD9Y\xF2\x81[\x16\xF8\x17\x980\x03\x02\x01\n0\x03\x02\x01\x14".force_encoding('binary')
8
9
 
@@ -36,13 +37,13 @@ describe RingSig::Signature do
36
37
 
37
38
  describe '#from_hex' do
38
39
  it 'converts from hex correctly' do
39
- expect(RingSig::Signature.from_hex(sig_hex).components).to eq signature.components
40
+ expect(RingSig::Signature.from_hex(sig_hex, hasher).components).to eq signature.components
40
41
  end
41
42
  end
42
43
 
43
44
  describe '#from_der' do
44
45
  it 'converts from der correctly' do
45
- expect(RingSig::Signature.from_der(sig_der).components).to eq signature.components
46
+ expect(RingSig::Signature.from_der(sig_der, hasher).components).to eq signature.components
46
47
  end
47
48
  end
48
49
  end
metadata CHANGED
@@ -1,127 +1,127 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: ring_sig
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.2.0
4
+ version: 0.3.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Stephen McCarthy
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2014-09-13 00:00:00.000000000 Z
11
+ date: 2014-09-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: bundler
15
15
  requirement: !ruby/object:Gem::Requirement
16
16
  requirements:
17
- - - ~>
17
+ - - "~>"
18
18
  - !ruby/object:Gem::Version
19
19
  version: '1.3'
20
20
  type: :development
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
- - - ~>
24
+ - - "~>"
25
25
  - !ruby/object:Gem::Version
26
26
  version: '1.3'
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: rake
29
29
  requirement: !ruby/object:Gem::Requirement
30
30
  requirements:
31
- - - ~>
31
+ - - "~>"
32
32
  - !ruby/object:Gem::Version
33
33
  version: '10'
34
34
  type: :development
35
35
  prerelease: false
36
36
  version_requirements: !ruby/object:Gem::Requirement
37
37
  requirements:
38
- - - ~>
38
+ - - "~>"
39
39
  - !ruby/object:Gem::Version
40
40
  version: '10'
41
41
  - !ruby/object:Gem::Dependency
42
42
  name: rspec
43
43
  requirement: !ruby/object:Gem::Requirement
44
44
  requirements:
45
- - - ~>
45
+ - - "~>"
46
46
  - !ruby/object:Gem::Version
47
47
  version: '3.0'
48
48
  type: :development
49
49
  prerelease: false
50
50
  version_requirements: !ruby/object:Gem::Requirement
51
51
  requirements:
52
- - - ~>
52
+ - - "~>"
53
53
  - !ruby/object:Gem::Version
54
54
  version: '3.0'
55
55
  - !ruby/object:Gem::Dependency
56
56
  name: simplecov
57
57
  requirement: !ruby/object:Gem::Requirement
58
58
  requirements:
59
- - - ~>
59
+ - - "~>"
60
60
  - !ruby/object:Gem::Version
61
61
  version: '0'
62
62
  type: :development
63
63
  prerelease: false
64
64
  version_requirements: !ruby/object:Gem::Requirement
65
65
  requirements:
66
- - - ~>
66
+ - - "~>"
67
67
  - !ruby/object:Gem::Version
68
68
  version: '0'
69
69
  - !ruby/object:Gem::Dependency
70
70
  name: yard
71
71
  requirement: !ruby/object:Gem::Requirement
72
72
  requirements:
73
- - - ~>
73
+ - - "~>"
74
74
  - !ruby/object:Gem::Version
75
75
  version: '0'
76
76
  type: :development
77
77
  prerelease: false
78
78
  version_requirements: !ruby/object:Gem::Requirement
79
79
  requirements:
80
- - - ~>
80
+ - - "~>"
81
81
  - !ruby/object:Gem::Version
82
82
  version: '0'
83
83
  - !ruby/object:Gem::Dependency
84
84
  name: markdown
85
85
  requirement: !ruby/object:Gem::Requirement
86
86
  requirements:
87
- - - ~>
87
+ - - "~>"
88
88
  - !ruby/object:Gem::Version
89
89
  version: '1'
90
90
  type: :development
91
91
  prerelease: false
92
92
  version_requirements: !ruby/object:Gem::Requirement
93
93
  requirements:
94
- - - ~>
94
+ - - "~>"
95
95
  - !ruby/object:Gem::Version
96
96
  version: '1'
97
97
  - !ruby/object:Gem::Dependency
98
98
  name: redcarpet
99
99
  requirement: !ruby/object:Gem::Requirement
100
100
  requirements:
101
- - - ~>
101
+ - - "~>"
102
102
  - !ruby/object:Gem::Version
103
103
  version: '3'
104
104
  type: :development
105
105
  prerelease: false
106
106
  version_requirements: !ruby/object:Gem::Requirement
107
107
  requirements:
108
- - - ~>
108
+ - - "~>"
109
109
  - !ruby/object:Gem::Version
110
110
  version: '3'
111
111
  - !ruby/object:Gem::Dependency
112
112
  name: ecdsa
113
113
  requirement: !ruby/object:Gem::Requirement
114
114
  requirements:
115
- - - ~>
115
+ - - "~>"
116
116
  - !ruby/object:Gem::Version
117
- version: '1.1'
117
+ version: '1.2'
118
118
  type: :runtime
119
119
  prerelease: false
120
120
  version_requirements: !ruby/object:Gem::Requirement
121
121
  requirements:
122
- - - ~>
122
+ - - "~>"
123
123
  - !ruby/object:Gem::Version
124
- version: '1.1'
124
+ version: '1.2'
125
125
  description: Ring Signatures allow someone to non-interactively sign a message which
126
126
  can be verified against a set of chosen public keys.
127
127
  email: sjmccarthy@gmail.com
@@ -129,16 +129,15 @@ executables: []
129
129
  extensions: []
130
130
  extra_rdoc_files: []
131
131
  files:
132
- - .gitignore
133
- - .travis.yml
134
- - .yardopts
132
+ - ".gitignore"
133
+ - ".travis.yml"
134
+ - ".yardopts"
135
135
  - CHANGELOG.md
136
136
  - Gemfile
137
137
  - LICENSE
138
138
  - README.md
139
139
  - Rakefile
140
140
  - lib/ring_sig.rb
141
- - lib/ring_sig/ecdsa/point.rb
142
141
  - lib/ring_sig/hasher.rb
143
142
  - lib/ring_sig/private_key.rb
144
143
  - lib/ring_sig/public_key.rb
@@ -160,12 +159,12 @@ require_paths:
160
159
  - lib
161
160
  required_ruby_version: !ruby/object:Gem::Requirement
162
161
  requirements:
163
- - - ! '>='
162
+ - - ">="
164
163
  - !ruby/object:Gem::Version
165
164
  version: '0'
166
165
  required_rubygems_version: !ruby/object:Gem::Requirement
167
166
  requirements:
168
- - - ! '>='
167
+ - - ">="
169
168
  - !ruby/object:Gem::Version
170
169
  version: '0'
171
170
  requirements: []
@@ -1,6 +0,0 @@
1
- module ECDSA
2
- class Point
3
- alias_method :*, :multiply_by_scalar
4
- alias_method :+, :add_to_point
5
- end
6
- end