How to add public keys (EC points)?
See original GitHub issueI would like to add 2 public keys and found an add
function in tweetnacl. Unfortunately, there is no docs or comments on that function for people to understand how to use it. Really appreciate if anyone could guide me.
Issue Analytics
- State:
- Created 2 years ago
- Comments:6 (3 by maintainers)
Top Results From Across the Web
Elliptic Curve Cryptography (ECC)
The public keys in the ECC are EC points - pairs of integer coordinates {x, y}, laying on the curve. Due to their...
Read more >Families of public/private keys in elliptic curve cryptography
I'm looking for a related key scheme for elliptic curve cryptography. The basic idea would be that there would be a master public...
Read more >Loading Elliptic Curve (EC) Keys in .NET - Scott Brady
The public key is a point on the elliptic curve, using coordinates x & y. As a result, the public key is specific...
Read more >cryptography - Find point and elliptic curve given the public key
The EC public key is a point on a curve, like this: y^2 = x^3 + ax + b (mod p) where p...
Read more >Elliptic-curve keys - Davide De Rosa
The public key derivation needs a deeper understanding of EC math, which is not the aim of this series. Basically, we locate a...
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
haha for sure, thank you so much @CMEONE 😊🙏
Ah ok, @dchest may be able to provide further guidance on how best to use the internal functions and which ones are the right ones for your use case, although I will note that “cooking your own crypto” is generally frowned upon, so you should ensure that your novel zk solution is being designed by highly experienced cryptographers and is well tested and audited before being used in a production environment.