Browser
The proof of concept implementation of Okamoto-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret, as of (doi:10.1145/3055259.3055267). The implementation uses WASM builds of the excellent MCL (https://github.com/herumi/mcl) pairing library.
Protocol Steps
Generator P of G1
Generator Q1 of G2
Generator Q2 of G2
P:
Q1:
Q2: