diff options
author | h908714124 <kraftdurchblumen@gmx.de> | 2018-03-05 09:21:44 +0100 |
---|---|---|
committer | h908714124 <kraftdurchblumen@gmx.de> | 2018-03-05 09:21:44 +0100 |
commit | c95dddd2d23871b4880181705abf1822e32aa102 (patch) | |
tree | a47d4c742131b2c0c68f5cb4d0c2006c0ab7e9c7 /src/ringct/rctSigs.cpp | |
parent | Merge pull request #3303 (diff) | |
download | monero-c95dddd2d23871b4880181705abf1822e32aa102.tar.xz |
remove unused function keyImageV
Diffstat (limited to 'src/ringct/rctSigs.cpp')
-rw-r--r-- | src/ringct/rctSigs.cpp | 18 |
1 files changed, 0 insertions, 18 deletions
diff --git a/src/ringct/rctSigs.cpp b/src/ringct/rctSigs.cpp index d3437eb36..f6d862b4d 100644 --- a/src/ringct/rctSigs.cpp +++ b/src/ringct/rctSigs.cpp @@ -130,29 +130,12 @@ namespace rct { return equalKeys(eeComputed, bb.ee); } - //Multilayered Spontaneous Anonymous Group Signatures (MLSAG signatures) - //These are aka MG signatutes in earlier drafts of the ring ct paper - // c.f. http://eprint.iacr.org/2015/1098 section 2. - // keyImageV just does I[i] = xx[i] * Hash(xx[i] * G) for each i - // Gen creates a signature which proves that for some column in the keymatrix "pk" - // the signer knows a secret key for each row in that column - // Ver verifies that the MG sig was created correctly - keyV keyImageV(const keyV &xx) { - keyV II(xx.size()); - size_t i = 0; - for (i = 0; i < xx.size(); i++) { - II[i] = scalarmultKey(hashToPoint(scalarmultBase(xx[i])), xx[i]); - } - return II; - } - //Multilayered Spontaneous Anonymous Group Signatures (MLSAG signatures) //This is a just slghtly more efficient version than the ones described below //(will be explained in more detail in Ring Multisig paper //These are aka MG signatutes in earlier drafts of the ring ct paper // c.f. http://eprint.iacr.org/2015/1098 section 2. - // keyImageV just does I[i] = xx[i] * Hash(xx[i] * G) for each i // Gen creates a signature which proves that for some column in the keymatrix "pk" // the signer knows a secret key for each row in that column // Ver verifies that the MG sig was created correctly @@ -250,7 +233,6 @@ namespace rct { //(will be explained in more detail in Ring Multisig paper //These are aka MG signatutes in earlier drafts of the ring ct paper // c.f. http://eprint.iacr.org/2015/1098 section 2. - // keyImageV just does I[i] = xx[i] * Hash(xx[i] * G) for each i // Gen creates a signature which proves that for some column in the keymatrix "pk" // the signer knows a secret key for each row in that column // Ver verifies that the MG sig was created correctly |