phase2-bn254/phase2
2020-05-12 02:58:29 +03:00
..
src NCC-CSWZ001-004 update rust-crypto and solidity version 2020-04-29 18:10:07 +03:00
tools remove obsolete patch_vk script 2020-01-18 21:06:39 +07:00
verify_tornado_ceremony contribution verification scripts 2020-05-12 02:58:29 +03:00
.gitignore update dependencies for phase2 WIP 2020-04-28 11:02:05 +03:00
batch.sh contribution verification scripts 2020-05-11 11:14:33 +03:00
Cargo.lock NCC-CSWZ001-004 update rust-crypto and solidity version 2020-04-29 18:10:07 +03:00
Cargo.toml NCC-CSWZ001-004 update rust-crypto and solidity version 2020-04-29 18:10:07 +03:00
circuit.circom adds check_ratio tests and modifies tests to accomodate it 2020-04-28 11:08:10 +03:00
COPYRIGHT Add 'phase2/' from commit '58ebd37d9d25b6779320b0ca99b3c484b679b538' 2019-08-29 13:12:42 +03:00
Dockerfile docker files 2020-04-30 09:54:02 +03:00
download.sh contribution verification scripts 2020-05-11 11:14:33 +03:00
input.json fixes for test script 2020-01-23 00:35:54 +08:00
LICENSE-APACHE Add 'phase2/' from commit '58ebd37d9d25b6779320b0ca99b3c484b679b538' 2019-08-29 13:12:42 +03:00
LICENSE-MIT Add 'phase2/' from commit '58ebd37d9d25b6779320b0ca99b3c484b679b538' 2019-08-29 13:12:42 +03:00
README.md comments about secret data safety 2020-04-28 11:08:13 +03:00
test.sh export circom-compatible verifying key 2020-01-31 15:24:08 +08:00
verify.sh contribution verification scripts 2020-05-11 11:14:33 +03:00

phase2 Crates.io

This library is still under development.

WebAssembly how-to

Build wasm package using wasm-pack build --release -- --no-default-features --features wasm

this will generate ./pkg directory with wasm file and js bindings. After that you can use this package in your browser application like so:

async function main() {
    const phase2 = await import("./pkg/phase2.js")
    let data = await fetch('params')
    data = await data.arrayBuffer()
    data = new Uint8Array(data)
    console.log('Source params', data)
    const result = phase2.contribute(data)
    console.log('Updated params', result)
    // upload updated params
}

main().catch(console.error)

Documentation

Security Warnings

This library does not make any guarantees about constant-time operations, memory access patterns, or resistance to side-channel attacks. To see possible measures to protect the secret data generated during the ceremony, see the [Powers of Tau readme][../powersoftau/README.md].

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.