1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206
//! ## Algorithms for optimized verification of aggregate and batched BLS signatures. //! //! //! use std::borrow::Borrow; use std::collections::HashMap; // use std::hash::Hash; // Hasher use pairing::{CurveAffine, CurveProjective}; // Engine, Field, PrimeField, SqrtField use super::*; /// Simple unoptimized BLS signature verification. Useful for testing. pub fn verify_unoptimized<S: Signed>(s: S) -> bool { let signature = s.signature().0.into_affine().prepare(); let prepared = s.messages_and_publickeys() .map(|(message,public_key)| { (public_key.borrow().0.into_affine().prepare(), message.borrow().hash_to_signature_curve::<S::E>().into_affine().prepare()) }).collect::<Vec<(_,_)>>(); S::E::verify_prepared( & signature, prepared.iter().map(|(m,pk)| (m,pk)) ) } /// Simple universal BLS signature verification /// /// We support an unstable `Signed::messages_and_publickeys()` /// securely by calling it only once and batch normalizing all /// points, as do most other verification routines here. /// We do no optimizations that reduce the number of pairings /// by combining repeated messages or signers. pub fn verify_simple<S: Signed>(s: S) -> bool { let signature = s.signature().0; // We could write this more idiomatically using iterator adaptors, // and avoiding an unecessary allocation for publickeys, but only // by calling self.messages_and_publickeys() repeatedly. let itr = s.messages_and_publickeys(); let l = { let (lower, upper) = itr.size_hint(); upper.unwrap_or(lower) }; let mut gpk = Vec::with_capacity(l); let mut gms = Vec::with_capacity(l+1); for (message,publickey) in itr { gpk.push( publickey.borrow().0.clone() ); gms.push( message.borrow().hash_to_signature_curve::<S::E>() ); } <<S as Signed>::E as EngineBLS>::PublicKeyGroup::batch_normalization(gpk.as_mut_slice()); gms.push(signature); <<S as Signed>::E as EngineBLS>::SignatureGroup::batch_normalization(gms.as_mut_slice()); let signature = gms.pop().unwrap().into_affine().prepare(); let prepared = gpk.iter().zip(gms) .map(|(pk,m)| { (pk.into_affine().prepare(), m.into_affine().prepare()) }) .collect::<Vec<(_,_)>>(); S::E::verify_prepared( &signature, prepared.iter().map(|(m,pk)| (m,pk)) ) } /// BLS signature verification optimized for all unique messages /// /// Assuming all messages are distinct, the minimum number of pairings /// is the number of unique signers, which we achieve here. /// We do not verify message uniqueness here, but leave this to the /// aggregate signature type, like `DistinctMessages`. /// /// We merge any messages with identical signers and batch normalize /// message points and the signature itself. /// We optionally batch normalize the public keys in the event that /// they are provided by algerbaic operaations, but this sounds /// unlikely given our requirement that messages be distinct. pub fn verify_with_distinct_messages<S: Signed>(signed: S, normalize_public_keys: bool) -> bool { let signature = signed.signature().0; // We first hash the messages to the signature curve and // normalize the public keys to operate on them as bytes. // TODO: Assess if we should mutate in place using interior // mutability, maybe using `BorrowMut` support in // `batch_normalization`. let itr = signed.messages_and_publickeys(); let l = { let (lower, upper) = itr.size_hint(); upper.unwrap_or(lower) }; let mut publickeys = Vec::with_capacity(l); let mut messages = Vec::with_capacity(l+1); for (m,pk) in itr { publickeys.push( pk.borrow().0.clone() ); messages.push( m.borrow().hash_to_signature_curve::<S::E>() ); } if normalize_public_keys { <<S as Signed>::E as EngineBLS>::PublicKeyGroup::batch_normalization(publickeys.as_mut_slice()); } // We next accumulate message points with the same signer. // We could avoid the allocation here if we sorted both // arrays in parallel. This might mean (a) some sort function // using `ops::IndexMut` instead of slices, and (b) wrapper types // types to make tuples of slices satisfy `ops::IndexMut`. // TODO: Impl PartialEq, Eq, Hash for pairing::EncodedPoint // to avoid struct H(E::PublicKeyGroup::Affine::Uncompressed); type AA<E> = (PublicKeyAffine<E>, SignatureProjective<E>); let mut pks_n_ms = HashMap::with_capacity(l); for (pk,m) in publickeys.drain(..) .map(|pk| pk.into_affine()) .zip(messages.drain(..)) { pks_n_ms.entry(pk.into_uncompressed()) .and_modify(|(_pk0,m0): &mut AA<S::E>| m0.add_assign(&m) ) .or_insert((pk,m)); } let mut publickeys = Vec::with_capacity(l); for (_,(pk,m)) in pks_n_ms.drain() { messages.push(m); publickeys.push(pk.prepare()); } // We finally normalize the messages and signature messages.push(signature); <<S as Signed>::E as EngineBLS>::SignatureGroup::batch_normalization(messages.as_mut_slice()); let signature = messages.pop().unwrap().into_affine().prepare(); // TODO: Assess if we could cache normalized message hashes anyplace // using interior mutability, but probably this does not work well // with our optimization of collecting messages with thesame signer. // And verify the aggregate signature. let messages = messages.iter().map(|m| m.into_affine().prepare()).collect::<Vec<_>>(); let prepared = publickeys.iter().zip(&messages); S::E::verify_prepared( &signature, prepared ) } /* /// Excessively optimized BLS signature verification /// /// We minimize the number of pairing operations by doing two /// basis change operation using Gaussian elimination, first in the /// message space and then in the signer space. As a result, we /// do only `1 + min(msg_d,pk_d)` pairings where `msg_d` and `pk_d` /// are the numbers of distinct messages and signers, respectively. /// /// We expect this to improve performance dramatically when both /// signers and messages are repeated enough, simpler strategies /// work as well or better when say messages are distinct. /// /// Explination: /// /// We consider the bipartite graph with vertex sets given by points /// on the two curves and edges given by desired pairings between them. /// We let $M$ denote the bipartite adjacency matrix for this graph, /// so that multiplying $M$ on the the right and left by the vectors /// of messages and signers respectively reproduces our original sum /// of pairings. /// /// We first use elementary "row" operations to make $M$ upper /// triangular, as in Gaussian elimination, but at the cost of also /// performing one-sided "change of basis" operations that collect /// our original "basis vectors" into sums of curve points. /// We next use elementary "column" operations to make $M$ diagonal, /// again adjusting the basis with curve point operations. /// /// In this, we regard $M$ as a matrix over the scalar field $F_p$ /// so we may do row or column swaps and row or column addition /// operations with small scalars, but not lone row or column scalar /// multiplication because these always involve divisions, which /// produces large curve points that slow us down thereafter. /// We do not require such divisions because we do not solve any /// system of equations and do not need ones on the diagonal. /// /// TODO: /// We leave implementing this optimization to near future work /// because it benifits from public keys being affine or having /// another hashable representation. /// /// /// As a curiosity, we note one interesting but suboptimal algorithm /// that avoids small scalar multiplications when doing this: /// /// If we ignore subtraction, then the minimal number of pairing /// operations required to verify aggregated BLS signatures is the /// minimal bipartite edge cover, aka bipartite dimension, of the /// bipartite graph with vertices given by points on the two curves /// and edges given by desired pairings. /// In general, this problem is NP-hard even to approximate. /// See: https://en.wikipedia.org/wiki/Bipartite_dimension /// /// There are polynomial time algorithms for bipartite edge cover in /// special cases, with domino-free graphs being among the widest /// known classes. See: /// Amilhastre, Jérôme; Janssen, Philippe; Vilarem, Marie-Catherine, /// "Computing a minimum biclique cover is polynomial for bipartite domino-free graphs" (1997) /// https://core.ac.uk/download/pdf/82546650.pdf /// /// If we now exploit subtraction, then these dominos can be /// completed into $K_{3,3}$s, like /// $(a,x)+(a,y)+(b,x)+(b,y)+(b,z)+(c,y)+(c,z) = (a+b+c,x+y+z) - (a,z) - (c,z)$ /// which looks optimal for itself, and likely permits the further /// aggregation, and maybe the subtracted terms can be aggregated later. /// /// We could not however find the optimal numbers of pairings by /// completing dominos like this because (a+b+c,x+y+z) - (b,y), /// which looks optimal for itself, but only has one subtraction. fn verify_with_gaussian_elimination<S: Signed>(s: S) -> bool { unimplemented!() } */