Let us know how we are doing
Ursa is moving forward, slowly but surely. We have released two versions-v0.1 and v0.1.1–since the last update.
Projects: Ursa is currently the only crypto library in use for Indy-SDK (i.e., the Indy crypto library is no longer used in this case) and Indy maintainers and contributors are working towards using Ursa for all of their cryptography. We have also been recently notified that an intern has completed work on integrating Ursa into Iroha, which is more good news (this was done by the Iroha team, so they deserve the credit here–not us) (https://github.com/hyperledger/iroha/commit/b3adc310e9c797c9dd5c99e4a7b518f2c5cf50f0).
Questions/Issues for the TSC
While this is more for project maintainers than the TSC (although the overlap is heavy), we'd like to use this time to ask maintainers of projects that aren't currently using Ursa what kind of features would convince them to use Ursa. The more feedback we get, the better we can do as a project.
The issue of the lack of dunking booth funding is also deeply concerning to us, although we recognize that this is a governing board issue rather than a TSC issue.
We made two releases since the last update:
v0.1.0 : March 21
v0.1.1: April 24
These releases are early releases that are targeted at replacing the Indy crypto libraries while still preserving interfaces needed for eventual Sawtooth use.
Overall Activity in the Past Quarter
- Anonymous Credentials: we have been formulating an implementation for anonymous credentials, which has gone through multiple iterations.
- Threshold issuance credentials: we plan to add these once we standardize an API.
- Encryption API: we have built an API for modular (symmetric) encryption. This will allow us to "plug and play" symmetric key encryption protocols and block ciphers once implemented.
- Delegatable credentials and z-mix are in the pipeline.
- Camenisch-Schoup Verifiable Encryption:
- Pointcheval-Sanders (PS) signatures:
- Much more "in the pipeline."
We have a lot of work in progress, both in our base crypto library and in our zero knowledge-focused zmix library. Some things include:
- Continue work on our modular interfaces. This is necessary so that we can make a better case for Sawtooth and Fabric to use Ursa. Example interfaces that still need work are our encryption/block cipher interface and our "zk-signature" interface for PS and BBS+ signatures.
Current active maintainers
- Mike Lodder (Sovrin Foundation)
- Lovesh Harchandani (Evernym Inc.)
- Dave Huseby (Linux Foundation)
- Hart Montgomery (Fujitsu)
- Shawn Amundson (Bitwise)
- Dan Middleton (Intel)
- Cam Parra (Kiva)
- Dan Anderson (Intel)
- Jon Geater (Jitsuin)
Our contributor list has been relatively static, although we are optimistic of adding new contributors in the near future (e.g., for hardware support).
- Sovrin Foundation
- Evernym, Inc
- Anonyome Labs, Inc.
- Angelo De Caro
- Arnaud J Le Hors
- Christopher Ferris
- Dan Middleton
- Gari Singh
- Hart Montgomery
- Mark Wagner
- Nathan George
- Swetha Repakula
- Tracy Kuhrt
- Troy Ronda