OPRF To Derive Keys From Low-Entropy Data

You will make a standard request to the relay node with the state (see Making Requests) using the Secp256k1 method.

Here is an example request using the OPRFSecp256k1 method:

{
  "method": "OPRFSecp256k1",
  "point": [2,58,211,253,26,34,132,83,157,111,80,144,179,1,88,82,243,119,99,104,156,248,158,115,87,30,114,39,90,142,78,236,28],
  "epoch": 123,
  "request_per_user": 69,
  "signature": {
    "r": "0xe3fbde1404800f5ac238b30f2118b69a1cdb604d0b4227056f18f87beb83abf2",
    "s": "0x9132d353ef806f526ef5e48cbee6872a11fcf688c2d92023a384d0f02082466",
    "v": 28
  },
  "extra_data": null
}

However, you will need to get the point to send for the OPRF:

Getting the point

With mishtiwasm

Install:

Import:

Use:

encoded_masked_point can be the value for point in the RequestToNetwork

Unmasking the point

After querying the network and receiving the point response_from_network, unmask the response via

This is the output of the OPRF!

Last updated