Module commonware_cryptography::bls12381::primitives::poly
source · Expand description
Polynomial operations over the BLS12-381 scalar field.
§Warning
The security of the polynomial operations is critical for the overall security of the threshold schemes. Ensure that the scalar field operations are performed over the correct field and that all elements are valid.
Structs§
- A polynomial evaluation at a specific index.
- A polynomial that is using a scalar for the variable x and a generic element for the coefficients.
Functions§
- Returns a new scalar polynomial of the given degree where each coefficients is sampled at random using kernel randomness.
- In the context of secret sharing, the threshold is the degree + 1.
- Returns the public key of the polynomial (constant term).
Type Aliases§
- Private polynomials are used to generate secret shares.
- Public polynomials represent commitments to secrets on a private polynomial.
- Signature polynomials are used in threshold signing (where a signature is interpolated using at least
thresholdevaluations).