-
Notifications
You must be signed in to change notification settings - Fork 25
proof transcript trace #821
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Draft
allanbrondum
wants to merge
23
commits into
ar/cor-1939-verifiable-presentations-from-id-credentials-feature
Choose a base branch
from
ar/cor-2022-implement-transcript-trace
base: ar/cor-1939-verifiable-presentations-from-id-credentials-feature
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Draft
proof transcript trace #821
allanbrondum
wants to merge
23
commits into
ar/cor-1939-verifiable-presentations-from-id-credentials-feature
from
ar/cor-2022-implement-transcript-trace
Conversation
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Base automatically changed from
ar/cor-2022-implement-transcript-pres
to
ar/cor-1939-verifiable-presentations-from-id-credentials-feature
November 26, 2025 20:30
allanbrondum
commented
Nov 27, 2025
|
|
||
| /// Test prove and verify presentation for identity credentials. | ||
| #[test] | ||
| fn test_transcript_trace_identity() { |
Contributor
Author
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Trace:
ConcordiumContextInformationV1
given, 33 bytes
requested, 33 bytes
GlobalContext, 24684 bytes
ProofVersion, 1 bytes
CreationTime, 8 bytes
ConcordiumIdBasedCredential
Issuer, 4 bytes
Statements, 105 bytes
Network, 1 bytes
IdentityAttributesCredentials
IdentityAttributeValues, 730 bytes
GlobalContext, 24684 bytes
PsSigKnown
blinded_sig, 96 bytes
messages, 388 bytes
ps_pub_key, 3128 bytes
comm_key, 96 bytes
, 5 messages
cipher, 96 bytes
commitment, 48 bytes
pub_key, 96 bytes
cmm_key, 96 bytes
cipher, 96 bytes
commitment, 48 bytes
pub_key, 96 bytes
cmm_key, 96 bytes
cipher, 96 bytes
commitment, 48 bytes
pub_key, 96 bytes
cmm_key, 96 bytes
cipher, 96 bytes
commitment, 48 bytes
pub_key, 96 bytes
cmm_key, 96 bytes
cipher, 96 bytes
commitment, 48 bytes
pub_key, 96 bytes
cmm_key, 96 bytes
point, 1548 bytes
<extract raw challenge>
response, final prover message, 948 bytes
ValidFrom, 3 bytes
ValidTo, 3 bytes
EncryptedIdentityCredentialId, 511 bytes
SetMembershipProof
G, 200 bytes
H, 200 bytes
v_keys, 96 bytes
V, 48 bytes
theSet, 136 bytes
A, 48 bytes
S, 48 bytes
y, extract scalar challenge
z, extract scalar challenge
T1, 48 bytes
T2, 48 bytes
x, extract scalar challenge
tx, 32 bytes
tx_tilde, 32 bytes
e_tilde, 32 bytes
w, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
a, final prover message, 32 bytes
b, final prover message, 32 bytes
SetNonMembershipProof
G, 200 bytes
H, 200 bytes
v_keys, 96 bytes
V, 48 bytes
theSet, 136 bytes
A, 48 bytes
S, 48 bytes
y, extract scalar challenge
z, extract scalar challenge
T1, 48 bytes
T2, 48 bytes
x, extract scalar challenge
tx, 32 bytes
tx_tilde, 32 bytes
e_tilde, 32 bytes
w, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
a, final prover message, 32 bytes
b, final prover message, 32 bytes
AttributeRangeProof
a, 32 bytes
b, 32 bytes
G, 6152 bytes
H, 6152 bytes
v_keys, 96 bytes
n, 1 bytes
Vj, 48 bytes
Vj, 48 bytes
A, 48 bytes
S, 48 bytes
y, extract scalar challenge
z, extract scalar challenge
T1, 48 bytes
T2, 48 bytes
x, extract scalar challenge
tx, 32 bytes
tx_tilde, 32 bytes
e_tilde, 32 bytes
w, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
a, final prover message, 32 bytes
b, final prover message, 32 bytes
AttributeRangeProof
a, 32 bytes
b, 32 bytes
G, 6152 bytes
H, 6152 bytes
v_keys, 96 bytes
n, 1 bytes
Vj, 48 bytes
Vj, 48 bytes
A, 48 bytes
S, 48 bytes
y, extract scalar challenge
z, extract scalar challenge
T1, 48 bytes
T2, 48 bytes
x, extract scalar challenge
tx, 32 bytes
tx_tilde, 32 bytes
e_tilde, 32 bytes
w, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
Lj, 48 bytes
Rj, 48 bytes
uj, extract scalar challenge
a, final prover message, 32 bytes
b, final prover message, 32 bytes
RevealedAttribute, 11 bytes
Contributor
Author
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Updated by @tschudid :
-l-> ConcordiumContextInformationV1
-m-> given 33 bytes
-m-> requested 33 bytes
-m-> GlobalContext 24684 bytes
-m-> ProofVersion 1 bytes
-m-> CreationTime 8 bytes
-l-> ConcordiumIdBasedCredential
-m-> Issuer 4 bytes
-m-> Statements 105 bytes
-m-> Network 1 bytes
-l-> IdentityAttributesCredentials
-m-> IdentityAttributeValues 730 bytes
-m-> GlobalContext 24684 bytes
-l-> PsSigKnown
-m-> blinded_sig 96 bytes
-m-> messages 388 bytes
-m-> ps_pub_key 3128 bytes
-m-> comm_key 96 bytes
--- start append each message ---
-m-> 5 items
- start message -
-m-> cipher 96 bytes
-m-> commitment 48 bytes
-m-> pub_key 96 bytes
-m-> cmm_key 96 bytes
- end message -
- start message -
-m-> cipher 96 bytes
-m-> commitment 48 bytes
-m-> pub_key 96 bytes
-m-> cmm_key 96 bytes
- end message -
- start message -
-m-> cipher 96 bytes
-m-> commitment 48 bytes
-m-> pub_key 96 bytes
-m-> cmm_key 96 bytes
- end message -
- start message -
-m-> cipher 96 bytes
-m-> commitment 48 bytes
-m-> pub_key 96 bytes
-m-> cmm_key 96 bytes
- end message -
- start message -
-m-> cipher 96 bytes
-m-> commitment 48 bytes
-m-> pub_key 96 bytes
-m-> cmm_key 96 bytes
- end message -
--- end append each message ---
-m-> point 1548 bytes
<-c- (extract raw challenge)
-m-> response 948 bytes (final prover message)
-m-> ValidFrom 3 bytes
-m-> ValidTo 3 bytes
-m-> EncryptedIdentityCredentialId 511 bytes
-l-> SetMembershipProof
-m-> G 200 bytes
-m-> H 200 bytes
-m-> v_keys 96 bytes
-m-> V 48 bytes
-m-> theSet 136 bytes
-m-> A 48 bytes
-m-> S 48 bytes
<-c- y (extract scalar challenge)
<-c- z (extract scalar challenge)
-m-> T1 48 bytes
-m-> T2 48 bytes
<-c- x (extract scalar challenge)
-m-> tx 32 bytes
-m-> tx_tilde 32 bytes
-m-> e_tilde 32 bytes
<-c- w (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> a 32 bytes (final prover message)
-m-> b 32 bytes (final prover message)
-l-> SetNonMembershipProof
-m-> G 200 bytes
-m-> H 200 bytes
-m-> v_keys 96 bytes
-m-> V 48 bytes
-m-> theSet 136 bytes
-m-> A 48 bytes
-m-> S 48 bytes
<-c- y (extract scalar challenge)
<-c- z (extract scalar challenge)
-m-> T1 48 bytes
-m-> T2 48 bytes
<-c- x (extract scalar challenge)
-m-> tx 32 bytes
-m-> tx_tilde 32 bytes
-m-> e_tilde 32 bytes
<-c- w (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> a 32 bytes (final prover message)
-m-> b 32 bytes (final prover message)
-l-> AttributeRangeProof
-m-> a 32 bytes
-m-> b 32 bytes
-m-> G 6152 bytes
-m-> H 6152 bytes
-m-> v_keys 96 bytes
-m-> n 1 bytes
-m-> Vj 48 bytes
-m-> Vj 48 bytes
-m-> A 48 bytes
-m-> S 48 bytes
<-c- y (extract scalar challenge)
<-c- z (extract scalar challenge)
-m-> T1 48 bytes
-m-> T2 48 bytes
<-c- x (extract scalar challenge)
-m-> tx 32 bytes
-m-> tx_tilde 32 bytes
-m-> e_tilde 32 bytes
<-c- w (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> a 32 bytes (final prover message)
-m-> b 32 bytes (final prover message)
-l-> AttributeRangeProof
-m-> a 32 bytes
-m-> b 32 bytes
-m-> G 6152 bytes
-m-> H 6152 bytes
-m-> v_keys 96 bytes
-m-> n 1 bytes
-m-> Vj 48 bytes
-m-> Vj 48 bytes
-m-> A 48 bytes
-m-> S 48 bytes
<-c- y (extract scalar challenge)
<-c- z (extract scalar challenge)
-m-> T1 48 bytes
-m-> T2 48 bytes
<-c- x (extract scalar challenge)
-m-> tx 32 bytes
-m-> tx_tilde 32 bytes
-m-> e_tilde 32 bytes
<-c- w (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> Lj 48 bytes
-m-> Rj 48 bytes
<-c- uj (extract scalar challenge)
-m-> a 32 bytes (final prover message)
-m-> b 32 bytes (final prover message)
-m-> RevealedAttribute 11 bytes
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Purpose
_Describe the purpose of the pull request, link to issue describing the problem, etc.
Changes
_Describe the changes that were needed.
Checklist
hard-to-understand areas.