Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Consume IBE hash function from the suite #34

Merged
merged 5 commits into from
Aug 3, 2022
Merged

Conversation

CluEleSsUK
Copy link

Consume IBE hash function from the suite rather than manually using blake2s XOF

Consume IBE hash function from the suite rather than manually using blake2s XOF
@CluEleSsUK CluEleSsUK force-pushed the feature/extract-hash branch from 1a6963b to 7f74eab Compare August 3, 2022 15:23
@CluEleSsUK
Copy link
Author

I noticed the default hash function is sha256 and some of the tests now fail - are these still relevant if not using blake?

@nikkolasg
Copy link

Now you must restrict input msg and ciphertext to be of max size "hash.Size()"

encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
encrypt/ibe/ibe.go Outdated Show resolved Hide resolved
@AnomalRoil AnomalRoil merged commit bf27c7a into master Aug 3, 2022
@AnomalRoil AnomalRoil deleted the feature/extract-hash branch August 3, 2022 19:40
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Extract hashing function in Kyber IBE to interface
3 participants