Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libTMCG18 | Distribution: SUSE Linux Enterprise 15 SP3 |
Version: 1.3.18 | Vendor: openSUSE |
Release: bp153.1.16 | Build date: Sat Mar 6 02:23:38 2021 |
Group: System/Libraries | Build host: s390zp21 |
Size: 1872300 | Source RPM: libTMCG-1.3.18-bp153.1.16.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://www.nongnu.org/libtmcg/ | |
Summary: C++ library for creating secure and fair online card games |
LibTMCG is a C++ library for creating secure and fair online card games. The library contains classes, algorithms, and high-level protocols to support an application programmer in writing such software. Neither a trusted third party (TTP), i.e. a central game server, nor trusted hardware components are necessary. With the library, there is no need for an independent referee, because the applied protocols provide a basic level of confidentiality and fairness by itself. The library is suited for peer-to-peer (P2P) environments where no TTP is available. It cannot be avoided that malicious players share information about their private cards, but the protocols ensure that the shuffle of the deck is performed randomly (presumed that at least one player is honest) and thus the cards will be distributed uniformly among the players. Further, no coalition can learn the private cards of a player against his will (except for trivial conclusions). The corresponding cryptographic problemis called Mental Poker, and LibTMCG provides an implementation of such protocols. The implementation relies on cryptographic techniques---the so-called zero-knowledge proofs. Using these building blocks, the high-level protocols minimize the effect of coalitions and preserve the confidentiality of the players' strategy, i.e. the players are not required to reveal their cards at the end of the game to show that they did not cheat.
GPL-2.0-or-later
* Sun Jun 02 2019 Karol Babioch <kbabioch@suse.de> - Update to version 1.3.18 * This release is two-fold: first, it fixes some bugs (e.g. iterated S2K) of the OpenPGP interface, and second, it adds functionality for handling v5 keys and signatures (see RFC 4880bis-07). - Re-freshed keyring file with current version from upstream * Wed Jan 23 2019 Karol Babioch <kbabioch@suse.de> - Update to version 1.3.17 * VTMF,ASTC,DKG,VRHE,EOTP,COM,VSS: make CheckGroup() more robust * VSSHE: security bugfix for Verify_[non]interactive_[_publiccoin] * mpz_spowm: added check for correct base in fast exponentiation * mpz_sqrtm: remove unused parameter in tmcg_mpz_qrmn_p() * configure.ac: added compiler option "-Wextra" * mpz_sprime: added tmcg_mpz_smprime() with increased B = 80000 * RFC4880: changed type of tmcg_openpgp_mem_alloc to unsigned long * Mon Dec 03 2018 Karol Babioch <kbabioch@suse.de> - Update to version 1.3.16 * changed constant TMCG_MAX_CARDS (decreased by factor 2) * changed formulas for TMCG_MAX_VALUE_CHARS and TMCG_MAX_KEY_CHARS * RFC4880: added support of Preferred AEAD Algorithms [RFC 4880bis] * RFC4880: added output for key usage "timestamping" [RFC 4880bis] * RFC4880: changed tmcg_openpgp_byte_t: unsigned char -> uint8_t * RFC4880: added PacketAeadEncode() [RFC 4880bis] * RFC4880: added SymmetricDecryptAEAD() and SymmetricEncryptAEAD() * changed formula for TMCG_MAX_KEYBITS (increased by factor 2) * mpz_srandom: bugfix in Botan code branch of mpz_grandomb() * Mon Nov 12 2018 Karol Babioch <kbabioch@suse.com> - Update to version 1.3.15 This is a maintenance release that fixes some bugs, e.g. in the Botan support of functions from module mpz_srandom. Moreover, some interfaces of the OpenPGP implemenation have been added and removed. For some modules of LibTMCG a basic exception handling has been introduced. * Mon Sep 10 2018 Karol Babioch <kbabioch@suse.com> - Update to version 1.3.14 With this release three additional parameters for the control of secure memory allocation have been added to init_libTMCG(). They are explained in the reference manual. Moreover, the OpenPGP interface has been enhanced in several way, e.g., ECDH, ECDSA and EdDSA are supported now. - Applied spec-cleaner * Tue Jun 26 2018 antoine.belvire@opensuse.org - Fix install-info usage. * Mon Jun 25 2018 kbabioch@suse.com - Update to 1.3.13 - Lots of major improvements for undocumented OpenPGP interface - PRNG from Botan is used as additional source of randomness - SHA3 is emulated if runtime version of libgcrypt is too old - Applied spec-cleaner * Wed Mar 21 2018 kbabioch@suse.com - Update to 1.3.12: * Added function mpz_lprime_prefix() for k-prefix tweak * Improved strength of oracle hash function g() by second algo * Raised the requirement of libgcrypt version to >= 1.7.0 * Improved on RFC4880 handling * mpz_shash: bugfix changes the output of hash function g() * Thu Feb 08 2018 kbabioch@suse.com - Update to 1.3.11: * Improved libTMCG initialization (init_libTMCG()) * Better handling of RFC4880 functionality - Switched sources to https instead of http * Sun Jan 21 2018 jengelh@inai.de - Compact description for size. Outright trim SRPM description. - Do not ship static libraries. * Mon Jan 15 2018 kbabioch@suse.com - update to 1.3.10: * Introduced RSA signature generation/verification for OpenPGP * Add function for preparing certification signatures * Sun Jan 14 2018 astieger@suse.com - update to 1.3.9: * fix two minor bugs in the OpenPGP implementation - includes changes from 1.3.8: * The S2K count for OpenPGP private key encryption has been increased to a reasonable value - includes changes from 1.3.7, 1.3.6, 1.3.5: * minor bug fixes - includes changes from 1.3.4: * DKG tools removed, deparate project DKGPG - includes changes from 1.3.3: * Small enhancements for DKG tools - includes changes from 1.3.2: * Major improvements for distributed key generation (DKG) and threshold cryptography * Fri May 26 2017 astieger@suse.com - update to 1.3.1: * VSSHE: added a simple variant of SetupGenerators_publiccoin() * DKG: use very strong randomness from libgcrypt (long term keys) * RFC4880: added implementation of Partial Body Lengths * Wed May 17 2017 astieger@suse.com - update to 1.3.0: * remove some issues found by coverity scan * add undocumented protocols and experimental support for distributed key generation * Verifiable setup of VTMF group generator * For some advanced protocols (e.g. Groth's shuffle) with more than two parties the distributed coin flipping protocol (EDCF) should be used. - includes changes from 1.2.0: * The default security parameters have been updated to current state of the art * The complexity of hash function g() was improved * Non-interactive versions of the verifiable shuffle resp. rotation protocol provide more efficient instantiations with soundness based on the well-known Fiat-Shamir heuristic * stengthen interactive versions of the protocols against malicious verifiers by coin flipping between prover and verifier * include protocol for reliable broadcast * improved documentation - includes changes from 1.1.3: * VRHE scheme provides an efficient HVZK argument for cyclic shuffle - includes changes from 1.1.2: * Small bugfixes have been applied in order to compile with gcc 4.3.x * Sun Jan 25 2015 andreas.stieger@gmx.de - verify source signature
/usr/lib64/libTMCG.so.18 /usr/lib64/libTMCG.so.18.0.0 /usr/share/doc/packages/libTMCG18 /usr/share/doc/packages/libTMCG18/AUTHORS /usr/share/doc/packages/libTMCG18/BUGS /usr/share/doc/packages/libTMCG18/ChangeLog /usr/share/doc/packages/libTMCG18/NEWS /usr/share/doc/packages/libTMCG18/PATENTS /usr/share/doc/packages/libTMCG18/README /usr/share/doc/packages/libTMCG18/THANKS /usr/share/doc/packages/libTMCG18/TODO /usr/share/licenses/libTMCG18 /usr/share/licenses/libTMCG18/COPYING
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 14:06:45 2024