Similar to Pseudonym above but can be additionally bound to one or more attributes from multiple credentials. This is also usable when a verifier wants to restrict a prover from having multiple pseudonyms from the same set of attributes by not allowing it to use a secret key but only its attributes. Note that such pseudonyms are vulnerable to brute force attack where all possible combinations of attribute values can be checked against the pseudonym thus potentially de-anonymizing the prover. The implementation uses Pedersen commitment

Hierarchy (view full)

Constructors

Properties

Accessors

Methods

Constructors

Properties

value: Uint8Array

Accessors

  • get bytes(): Uint8Array
  • Return the wrapped bytearray

    Returns Uint8Array

  • get hex(): string
  • Return the hex representation of the wrapped bytearray

    Returns string

  • get length(): number
  • Return the length of the wrapped bytearray

    Returns number

Methods

  • Parameters

    • basesForAttributes: Uint8Array[]

      The part of commitment key used for attributes

    • attributes: Uint8Array[]
    • OptionalbaseForSecretKey: Uint8Array

      The part of commitment key used for secret key

    • OptionalsecretKey: Uint8Array

    Returns Pseudonym