Get desktop application:
View/edit binary Protocol Buffers messages
CredRequest specifies a credential request object that consists of nym - a pseudonym, which is a commitment to the user secret issuer_nonce - a random nonce provided by the issuer proof_c, proof_s - a zero-knowledge proof of knowledge of the user secret inside Nym
Credential specifies a credential object that consists of a, b, e, s - signature value attrs - attribute values
epoch contains the epoch (time window) in which this CRI is valid
epoch_pk is the public key that is used by the revocation authority in this epoch
epoch_pk_sig is a signature on the EpochPK valid under the revocation authority's long term key
revocation_alg denotes which revocation algorithm is used
revocation_data contains data specific to the revocation algorithm used
ECP is an elliptic curve point specified by its coordinates ECP corresponds to an element of the first group (G1)
Used in:
, , ,ECP2 is an elliptic curve point specified by its coordinates ECP2 corresponds to an element of the second group (G2)
Used in:
, ,IssuerKey specifies an issuer key pair that consists of ISk - the issuer secret key and IssuerPublicKey - the issuer public key
IssuerPublicKey specifies an issuer public key that consists of attribute_names - a list of the attribute names of a credential issued by the issuer h_sk, h_rand, h_attrs, w, bar_g1, bar_g2 - group elements corresponding to the signing key, randomness, and attributes proof_c, proof_s compose a zero-knowledge proof of knowledge of the secret key hash is a hash of the public key appended to it
Used in:
NonRevocationProof contains proof that the credential is not revoked
Used in:
NymSignature specifies a signature object that signs a message with respect to a pseudonym. It differs from the standard idemix.signature in the fact that the standard signature object also proves that the pseudonym is based on a secret certified by a CA (issuer), whereas NymSignature only proves that the the owner of the pseudonym signed the message
proof_c is the Fiat-Shamir challenge of the ZKP
proof_s_sk is the s-value proving knowledge of the user secret key
proof_s_r_nym is the s-value proving knowledge of the pseudonym secret
nonce is a fresh nonce used for the signature
Signature specifies a signature object that consists of a_prime, a_bar, b_prime, proof_* - randomized credential signature values and a zero-knowledge proof of knowledge of a credential and the corresponding user secret together with the attribute values nonce - a fresh nonce used for the signature nym - a fresh pseudonym (a commitment to to the user secret)