commonware-cryptography 2026.4.0

Generate keys, sign arbitrary messages, and deterministically verify signatures.
Documentation
use commonware_cryptography::bls12381::primitives::group::{Scalar, G1};
use commonware_math::{algebra::Random, poly::Poly};
use commonware_parallel::{Rayon, Sequential};
use commonware_utils::{Faults, N3f1, NZUsize};
use criterion::{criterion_group, BatchSize, Criterion};
use rand::{rngs::StdRng, SeedableRng};
use std::hint::black_box;

fn bench_evaluate_point(c: &mut Criterion) {
    for &n in &[5, 10, 20, 50, 100, 250, 500] {
        let t = N3f1::quorum(n);
        for concurrency in [1, 8] {
            let strategy = Rayon::new(NZUsize!(concurrency)).unwrap();
            c.bench_function(
                &format!("{}/n={} t={} conc={}", module_path!(), n, t, concurrency),
                |b| {
                    b.iter_batched(
                        || {
                            let mut rng = StdRng::seed_from_u64(0);
                            let polynomial: Poly<G1> = Poly::commit(Poly::new(&mut rng, t - 1));
                            let scalar = Scalar::random(&mut rng);
                            (scalar, polynomial)
                        },
                        |(scalar, polynomial)| {
                            if concurrency > 1 {
                                black_box(polynomial.eval_msm(&scalar, &strategy));
                            } else {
                                black_box(polynomial.eval_msm(&scalar, &Sequential));
                            }
                        },
                        BatchSize::SmallInput,
                    );
                },
            );
        }
    }
}

criterion_group! {
    name = benches;
    config = Criterion::default().sample_size(10);
    targets = bench_evaluate_point
}