Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Proving protocol using OPRF with a password #5

Open
forty opened this issue Feb 19, 2024 · 1 comment
Open

Proving protocol using OPRF with a password #5

forty opened this issue Feb 19, 2024 · 1 comment

Comments

@forty
Copy link

forty commented Feb 19, 2024

I'm trying out verifypal to prove some PAKE protocols, and I'm struggling with OPRF using passwords for blind salt, as in OPAQUE.

  • I cannot find out how to invert a scalar (the blinding factor, as I want to compute HASH(pwd)^r^k^(1/r) )
  • the verifier is unhappy because HASH(pwd)^r reveals the password. Ideally I want H2C(HASH(pwd))^r, I'm not sure how to communicate that to verifypal, but I guess that shouldn't reveal the password if r remains secret?
@forty
Copy link
Author

forty commented Feb 19, 2024

(sorry, I don't know if this is a feature request, or just my own misunderstanding of how things work)

@forty forty changed the title Prooving protocol using OPRF with a password Proving protocol using OPRF with a password Feb 19, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant