Expand description

Author-blinded RSASSA-PSS RSAE signatures.

This is an implementation of the RSA Blind Signatures proposal, based on the Zig implementation.

use blind_rsa_signatures::{KeyPair, Options};

let options = Options::default();

// [SERVER]: Generate a RSA-2048 key pair
let kp = KeyPair::generate(2048)?;
let (pk, sk) = (kp.pk, kp.sk);

// [CLIENT]: create a random message and blind it for the server whose public key is `pk`.
// The client must store the message and the secret.
let msg = b"test";
let blinding_result = pk.blind(msg, &options)?;

// [SERVER]: compute a signature for a blind message, to be sent to the client.
// The client secret should not be sent to the server.
let blind_sig = sk.blind_sign(&blinding_result.blind_msg, &options)?;

// [CLIENT]: later, when the client wants to redeem a signed blind message,
// using the blinding secret, it can locally compute the signature of the
// original message.
// The client then owns a new valid (message, signature) pair, and the
// server cannot link it to a previous(blinded message, blind signature) pair.
// Note that the finalization function also verifies that the new signature
// is correct for the server public key.
let sig = pk.finalize(&blind_sig, &blinding_result.secret, &msg, &options)?;

// [SERVER]: a non-blind signature can be verified using the server's public key.
sig.verify(&pk, msg, &options)?;



A blind signature

A blinded message

Result of a blinding operation

An RSA key pair


An RSA public key

A blinding secret factor

An RSA secret key

A (non-blind) signature


Hash function for padding and message hashing