Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verify implementation against security proofs #197

Closed
ch1bo opened this issue Jan 30, 2022 · 2 comments
Closed

Verify implementation against security proofs #197

ch1bo opened this issue Jan 30, 2022 · 2 comments
Labels
amber ⚠️ Medium complexity or partly unclear feature 💭 idea An idea or feature request

Comments

@ch1bo
Copy link
Member

ch1bo commented Jan 30, 2022

What & Why

As a first step on formally verifying the correctness of our Hydra Head implementation, we want to create property tests corresponding to the security proof in the paper to test various parts of the implemented protocol using the same rationale.

TBD

  • At what level in our testing strategy?
  • Which proofs exactly / scope?
@ch1bo ch1bo added the 💬 feature A feature on our roadmap label Jan 30, 2022
@ch1bo ch1bo moved this to Todo in Hydra Head Roadmap Feb 2, 2022
@ch1bo ch1bo added the amber ⚠️ Medium complexity or partly unclear feature label Feb 3, 2022
@ch1bo ch1bo added 💭 idea An idea or feature request and removed 💬 feature A feature on our roadmap labels May 3, 2022
@ch1bo
Copy link
Member Author

ch1bo commented May 3, 2022

Maybe we should start with a spike on this one to understand better what we could possibly do in this regards.

@ghost
Copy link

ghost commented Jun 1, 2022

Closing in favor of #194

@ghost ghost closed this as completed Jun 1, 2022
@ghost ghost moved this to Done in Hydra Head Roadmap Jun 1, 2022
This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
amber ⚠️ Medium complexity or partly unclear feature 💭 idea An idea or feature request
Projects
None yet
Development

No branches or pull requests

1 participant