#![allow(clippy::type_complexity)]
#![cfg(feature = "serialization")]
use alloc::{borrow::ToOwned, collections::BTreeMap, vec::Vec};
use rand_core::{CryptoRng, RngCore};
use crate as frost;
use crate::keys::dkg::{round1, round2};
use crate::keys::{SecretShare, SigningShare};
use crate::round1::SigningNonces;
use crate::round2::SignatureShare;
use crate::{
keys::PublicKeyPackage, Error, Field, Group, Identifier, Signature, SigningKey, SigningPackage,
VerifyingKey,
};
use crate::Ciphersuite;
pub fn check_zero_key_fails<C: Ciphersuite>() {
let zero = <<<C as Ciphersuite>::Group as Group>::Field>::zero();
let encoded_zero = <<<C as Ciphersuite>::Group as Group>::Field>::serialize(&zero);
let r = SigningKey::<C>::deserialize(encoded_zero.as_ref());
assert_eq!(r, Err(Error::MalformedSigningKey));
}
pub fn check_share_generation<C: Ciphersuite, R: RngCore + CryptoRng>(mut rng: R) {
let secret = crate::SigningKey::<C>::new(&mut rng);
let secret = SigningKey::deserialize(&secret.serialize()).unwrap();
let max_signers = 5;
let min_signers = 3;
let coefficients =
frost::keys::generate_coefficients::<C, _>(min_signers as usize - 1, &mut rng);
let secret_shares = frost::keys::generate_secret_shares(
&secret,
max_signers,
min_signers,
coefficients,
&frost::keys::default_identifiers(max_signers),
)
.unwrap();
let key_packages: Vec<frost::keys::KeyPackage<C>> = secret_shares
.iter()
.cloned()
.map(|s| s.try_into().unwrap())
.collect();
assert_eq!(
frost::keys::reconstruct::<C>(&key_packages)
.unwrap()
.serialize(),
secret.serialize()
);
assert_eq!(
frost::keys::reconstruct::<C>(&[]).unwrap_err(),
Error::IncorrectNumberOfShares
);
assert_eq!(
frost::keys::reconstruct::<C>(&key_packages[0..1]).unwrap_err(),
Error::IncorrectNumberOfShares
);
let mut key_packages = key_packages;
key_packages[0] = key_packages[1].clone();
assert_eq!(
frost::keys::reconstruct::<C>(&key_packages).unwrap_err(),
Error::DuplicatedIdentifier
);
}
pub fn check_share_generation_fails_with_invalid_signers<C: Ciphersuite, R: RngCore + CryptoRng>(
min_signers: u16,
max_signers: u16,
error: Error<C>,
mut rng: R,
) {
let secret = crate::SigningKey::<C>::new(&mut rng);
let coefficients = frost::keys::generate_coefficients::<C, _>(3, &mut rng);
let secret_shares = frost::keys::generate_secret_shares(
&secret,
max_signers,
min_signers,
coefficients,
&frost::keys::default_identifiers(max_signers),
);
assert!(secret_shares.is_err());
assert!(secret_shares == Err(error))
}
pub fn check_sign_with_dealer<C: Ciphersuite, R: RngCore + CryptoRng>(
mut rng: R,
) -> (Vec<u8>, Signature<C>, VerifyingKey<C>) {
let max_signers = 5;
let min_signers = 3;
let (shares, pub_key_package) = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Default,
&mut rng,
)
.unwrap();
let pub_key_package =
PublicKeyPackage::deserialize(&pub_key_package.serialize().unwrap()).unwrap();
let mut key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>> =
BTreeMap::new();
for (k, v) in shares {
let v = SecretShare::<C>::deserialize(&v.serialize().unwrap()).unwrap();
let key_package = frost::keys::KeyPackage::try_from(v).unwrap();
let key_package =
frost::keys::KeyPackage::deserialize(&key_package.serialize().unwrap()).unwrap();
key_packages.insert(k, key_package);
}
let mut pub_key_package_insufficient = pub_key_package.clone();
pub_key_package_insufficient.min_signers = Some(min_signers - 1);
let r = check_sign(
min_signers - 1,
key_packages
.iter()
.map(|(id, k)| {
let mut k = k.clone();
k.min_signers -= 1;
(*id, k)
})
.collect(),
&mut rng,
pub_key_package_insufficient,
);
assert_eq!(r, Err(Error::InvalidSignature));
check_sign(min_signers, key_packages, rng, pub_key_package).unwrap()
}
pub fn check_sign_with_dealer_fails_with_invalid_signers<C: Ciphersuite, R: RngCore + CryptoRng>(
min_signers: u16,
max_signers: u16,
error: Error<C>,
mut rng: R,
) {
let out = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Default::<C>,
&mut rng,
);
assert!(out.is_err());
assert!(out == Err(error))
}
pub fn check_dkg_part1_fails_with_invalid_signers<C: Ciphersuite, R: RngCore + CryptoRng>(
min_signers: u16,
max_signers: u16,
error: Error<C>,
mut rng: R,
) {
let out = frost::keys::dkg::part1(
Identifier::try_from(1).unwrap(),
max_signers,
min_signers,
&mut rng,
);
assert!(out.is_err());
assert!(out == Err(error))
}
pub fn check_sign<C: Ciphersuite + PartialEq, R: RngCore + CryptoRng>(
min_signers: u16,
key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>>,
mut rng: R,
pubkey_package: PublicKeyPackage<C>,
) -> Result<(Vec<u8>, Signature<C>, VerifyingKey<C>), Error<C>> {
let mut nonces_map: BTreeMap<frost::Identifier<C>, frost::round1::SigningNonces<C>> =
BTreeMap::new();
let mut commitments_map: BTreeMap<frost::Identifier<C>, frost::round1::SigningCommitments<C>> =
BTreeMap::new();
for participant_identifier in key_packages.keys().take(min_signers as usize) {
let participant_identifier =
Identifier::deserialize(&participant_identifier.serialize()).unwrap();
let (nonces, commitments) = frost::round1::commit(
key_packages
.get(&participant_identifier)
.unwrap()
.signing_share(),
&mut rng,
);
let nonces = SigningNonces::deserialize(&nonces.serialize().unwrap()).unwrap();
let commitments =
frost::round1::SigningCommitments::deserialize(&commitments.serialize().unwrap())
.unwrap();
nonces_map.insert(participant_identifier, nonces);
commitments_map.insert(participant_identifier, commitments);
}
let mut signature_shares = BTreeMap::new();
let message = "message to sign".as_bytes();
let signing_package = SigningPackage::new(commitments_map, message);
let signing_package =
SigningPackage::deserialize(&signing_package.serialize().unwrap()).unwrap();
for participant_identifier in nonces_map.keys() {
let key_package = key_packages.get(participant_identifier).unwrap();
let nonces_to_use = nonces_map.get(participant_identifier).unwrap();
check_sign_errors(
signing_package.clone(),
nonces_to_use.clone(),
key_package.clone(),
);
let signature_share = frost::round2::sign(&signing_package, nonces_to_use, key_package)?;
let signature_share = SignatureShare::deserialize(&signature_share.serialize()).unwrap();
signature_shares.insert(*participant_identifier, signature_share);
}
check_aggregate_errors(
signing_package.clone(),
signature_shares.clone(),
pubkey_package.clone(),
);
check_verifying_shares(
pubkey_package.clone(),
signing_package.clone(),
signature_shares.clone(),
);
check_verify_signature_share(&pubkey_package, &signing_package, &signature_shares);
let group_signature = frost::aggregate(&signing_package, &signature_shares, &pubkey_package)?;
let group_signature = Signature::deserialize(&group_signature.serialize().unwrap()).unwrap();
pubkey_package
.verifying_key
.verify(message, &group_signature)?;
for (participant_identifier, _) in nonces_map.clone() {
let key_package = key_packages.get(&participant_identifier).unwrap();
key_package
.verifying_key
.verify(message, &group_signature)?;
}
Ok((
message.to_owned(),
group_signature,
pubkey_package.verifying_key,
))
}
fn check_sign_errors<C: Ciphersuite + PartialEq>(
signing_package: frost::SigningPackage<C>,
signing_nonces: frost::round1::SigningNonces<C>,
key_package: frost::keys::KeyPackage<C>,
) {
let mut commitments = signing_package.signing_commitments().clone();
let id = *commitments
.keys()
.find(|&&id| id != key_package.identifier)
.unwrap();
commitments.remove(&id);
let signing_package = frost::SigningPackage::new(commitments, signing_package.message());
let r = frost::round2::sign(&signing_package, &signing_nonces, &key_package);
assert_eq!(r, Err(Error::IncorrectNumberOfCommitments));
}
fn check_aggregate_errors<C: Ciphersuite + PartialEq>(
signing_package: frost::SigningPackage<C>,
signature_shares: BTreeMap<frost::Identifier<C>, frost::round2::SignatureShare<C>>,
pubkey_package: frost::keys::PublicKeyPackage<C>,
) {
check_aggregate_corrupted_share(
signing_package.clone(),
signature_shares.clone(),
pubkey_package.clone(),
);
check_aggregate_invalid_share_identifier_for_verifying_shares(
signing_package,
signature_shares,
pubkey_package,
);
}
fn check_aggregate_corrupted_share<C: Ciphersuite + PartialEq>(
signing_package: frost::SigningPackage<C>,
mut signature_shares: BTreeMap<frost::Identifier<C>, frost::round2::SignatureShare<C>>,
pubkey_package: frost::keys::PublicKeyPackage<C>,
) {
use crate::{round2::SignatureShare, CheaterDetection};
let one = <<C as Ciphersuite>::Group as Group>::Field::one();
let id1 = *signature_shares.keys().next().unwrap();
*signature_shares.get_mut(&id1).unwrap() =
SignatureShare::new(signature_shares[&id1].to_scalar() + one);
let id2 = *signature_shares.keys().nth(1).unwrap();
*signature_shares.get_mut(&id2).unwrap() =
SignatureShare::new(signature_shares[&id2].to_scalar() + one);
let e = frost::aggregate(&signing_package, &signature_shares, &pubkey_package).unwrap_err();
assert_eq!(e.culprits(), vec![id1]);
assert_eq!(
e,
Error::InvalidSignatureShare {
culprits: vec![id1]
}
);
let e = frost::aggregate_custom(
&signing_package,
&signature_shares,
&pubkey_package,
crate::CheaterDetection::Disabled,
)
.unwrap_err();
assert_eq!(e.culprits(), vec![]);
assert_eq!(e, Error::InvalidSignature);
let e = frost::aggregate_custom(
&signing_package,
&signature_shares,
&pubkey_package,
crate::CheaterDetection::FirstCheater,
)
.unwrap_err();
assert_eq!(e.culprits(), vec![id1]);
assert_eq!(
e,
Error::InvalidSignatureShare {
culprits: vec![id1]
}
);
let e = frost::aggregate_custom(
&signing_package,
&signature_shares,
&pubkey_package,
CheaterDetection::AllCheaters,
)
.unwrap_err();
assert_eq!(e.culprits(), vec![id1, id2]);
assert_eq!(
e,
Error::InvalidSignatureShare {
culprits: vec![id1, id2]
}
);
}
fn check_aggregate_invalid_share_identifier_for_verifying_shares<C: Ciphersuite + PartialEq>(
signing_package: frost::SigningPackage<C>,
mut signature_shares: BTreeMap<frost::Identifier<C>, frost::round2::SignatureShare<C>>,
pubkey_package: frost::keys::PublicKeyPackage<C>,
) {
let invalid_identifier = Identifier::derive("invalid identifier".as_bytes()).unwrap();
signature_shares.insert(
invalid_identifier,
*signature_shares.values().next().unwrap(),
);
frost::aggregate(&signing_package, &signature_shares, &pubkey_package)
.expect_err("should not work");
}
pub fn check_sign_with_dkg<C: Ciphersuite + PartialEq, R: RngCore + CryptoRng>(
mut rng: R,
) -> (Vec<u8>, Signature<C>, VerifyingKey<C>)
where
C::Group: core::cmp::PartialEq,
{
let max_signers = 5;
let min_signers = 3;
let mut round1_secret_packages: BTreeMap<
frost::Identifier<C>,
frost::keys::dkg::round1::SecretPackage<C>,
> = BTreeMap::new();
let mut received_round1_packages: BTreeMap<
frost::Identifier<C>,
BTreeMap<frost::Identifier<C>, frost::keys::dkg::round1::Package<C>>,
> = BTreeMap::new();
for participant_index in 1..=max_signers {
let participant_identifier = participant_index.try_into().expect("should be nonzero");
let (round1_secret_package, round1_package) =
frost::keys::dkg::part1(participant_identifier, max_signers, min_signers, &mut rng)
.unwrap();
let round1_secret_package = frost::keys::dkg::round1::SecretPackage::<C>::deserialize(
&round1_secret_package.serialize().unwrap(),
)
.unwrap();
let round1_package = frost::keys::dkg::round1::Package::<C>::deserialize(
&round1_package.serialize().unwrap(),
)
.unwrap();
round1_secret_packages.insert(
participant_identifier,
round1::SecretPackage::deserialize(&round1_secret_package.serialize().unwrap())
.unwrap(),
);
for receiver_participant_index in 1..=max_signers {
if receiver_participant_index == participant_index {
continue;
}
let receiver_participant_identifier = receiver_participant_index
.try_into()
.expect("should be nonzero");
received_round1_packages
.entry(receiver_participant_identifier)
.or_default()
.insert(
participant_identifier,
round1::Package::deserialize(&round1_package.serialize().unwrap()).unwrap(),
);
}
}
let mut round2_secret_packages = BTreeMap::new();
let mut received_round2_packages = BTreeMap::new();
for participant_index in 1..=max_signers {
let participant_identifier = participant_index.try_into().expect("should be nonzero");
let round1_secret_package = round1_secret_packages
.remove(&participant_identifier)
.unwrap();
let round1_packages = &received_round1_packages[&participant_identifier];
check_part2_error(round1_secret_package.clone(), round1_packages.clone());
let (round2_secret_package, round2_packages) =
frost::keys::dkg::part2(round1_secret_package, round1_packages).expect("should work");
let round2_secret_package = frost::keys::dkg::round2::SecretPackage::<C>::deserialize(
&round2_secret_package.serialize().unwrap(),
)
.unwrap();
round2_secret_packages.insert(
participant_identifier,
round2::SecretPackage::deserialize(&round2_secret_package.serialize().unwrap())
.unwrap(),
);
for (receiver_identifier, round2_package) in round2_packages {
let round2_package = frost::keys::dkg::round2::Package::<C>::deserialize(
&round2_package.serialize().unwrap(),
)
.unwrap();
received_round2_packages
.entry(receiver_identifier)
.or_insert_with(BTreeMap::new)
.insert(
participant_identifier,
round2::Package::deserialize(&round2_package.serialize().unwrap()).unwrap(),
);
}
}
let mut key_packages = BTreeMap::new();
let mut verifying_shares = BTreeMap::new();
let mut verifying_key = None;
let mut pubkey_packages_by_participant = BTreeMap::new();
check_part3_errors(
max_signers,
round2_secret_packages.clone(),
received_round1_packages.clone(),
received_round2_packages.clone(),
);
for participant_index in 1..=max_signers {
let participant_identifier = participant_index.try_into().expect("should be nonzero");
let (key_package, pubkey_package_for_participant) = frost::keys::dkg::part3(
&round2_secret_packages[&participant_identifier],
&received_round1_packages[&participant_identifier],
&received_round2_packages[&participant_identifier],
)
.unwrap();
let key_package =
frost::keys::KeyPackage::deserialize(&key_package.serialize().unwrap()).unwrap();
let pubkey_package_for_participant = frost::keys::PublicKeyPackage::deserialize(
&pubkey_package_for_participant.serialize().unwrap(),
)
.unwrap();
verifying_shares.insert(participant_identifier, key_package.verifying_share);
if let Some(previous_verifying_key) = verifying_key {
assert_eq!(previous_verifying_key, key_package.verifying_key)
}
verifying_key = Some(key_package.verifying_key);
key_packages.insert(participant_identifier, key_package);
pubkey_packages_by_participant
.insert(participant_identifier, pubkey_package_for_participant);
}
for verifying_keys_for_participant in pubkey_packages_by_participant.values() {
assert!(verifying_keys_for_participant.verifying_shares == verifying_shares);
}
let pubkeys = pubkey_packages_by_participant
.first_key_value()
.unwrap()
.1
.clone();
let pubkeys =
frost::keys::PublicKeyPackage::deserialize(&pubkeys.serialize().unwrap()).unwrap();
check_sign(min_signers, key_packages, rng, pubkeys).unwrap()
}
fn check_part3_errors<C: Ciphersuite>(
max_signers: u16,
round2_secret_packages: BTreeMap<Identifier<C>, frost::keys::dkg::round2::SecretPackage<C>>,
received_round1_packages: BTreeMap<
Identifier<C>,
BTreeMap<Identifier<C>, frost::keys::dkg::round1::Package<C>>,
>,
received_round2_packages: BTreeMap<
Identifier<C>,
BTreeMap<Identifier<C>, frost::keys::dkg::round2::Package<C>>,
>,
) {
check_part3_different_participants(
max_signers,
round2_secret_packages.clone(),
received_round1_packages.clone(),
received_round2_packages.clone(),
);
check_part3_corrupted_share(
max_signers,
round2_secret_packages,
received_round1_packages,
received_round2_packages,
);
}
pub fn check_part3_different_participants<C: Ciphersuite>(
max_signers: u16,
round2_secret_packages: BTreeMap<Identifier<C>, frost::keys::dkg::round2::SecretPackage<C>>,
received_round1_packages: BTreeMap<
Identifier<C>,
BTreeMap<Identifier<C>, frost::keys::dkg::round1::Package<C>>,
>,
received_round2_packages: BTreeMap<
Identifier<C>,
BTreeMap<Identifier<C>, frost::keys::dkg::round2::Package<C>>,
>,
) {
for participant_index in 1..=max_signers {
let participant_identifier = participant_index.try_into().expect("should be nonzero");
let mut received_round2_packages =
received_round2_packages[&participant_identifier].clone();
let package = received_round2_packages
.remove(&received_round2_packages.keys().next().unwrap().clone())
.unwrap();
received_round2_packages.insert(42u16.try_into().unwrap(), package);
let r = frost::keys::dkg::part3(
&round2_secret_packages[&participant_identifier],
&received_round1_packages[&participant_identifier],
&received_round2_packages,
)
.expect_err("Should have failed due to different identifier sets");
assert_eq!(r, Error::IncorrectPackage)
}
}
fn check_part3_corrupted_share<C: Ciphersuite>(
max_signers: u16,
round2_secret_packages: BTreeMap<Identifier<C>, frost::keys::dkg::round2::SecretPackage<C>>,
received_round1_packages: BTreeMap<
Identifier<C>,
BTreeMap<Identifier<C>, frost::keys::dkg::round1::Package<C>>,
>,
received_round2_packages: BTreeMap<
Identifier<C>,
BTreeMap<Identifier<C>, frost::keys::dkg::round2::Package<C>>,
>,
) {
for participant_index in 1..=max_signers {
let participant_identifier = participant_index.try_into().expect("should be nonzero");
let mut received_round2_packages =
received_round2_packages[&participant_identifier].clone();
let culprit = *received_round2_packages.keys().next().unwrap();
let package = received_round2_packages.get_mut(&culprit).unwrap();
let one = <<C as Ciphersuite>::Group as Group>::Field::one();
package.signing_share = SigningShare::new(package.signing_share().to_scalar() + one);
let r = frost::keys::dkg::part3(
&round2_secret_packages[&participant_identifier],
&received_round1_packages[&participant_identifier],
&received_round2_packages,
)
.expect_err("Should have failed due to corrupted share");
assert_eq!(
r,
Error::InvalidSecretShare {
culprit: Some(culprit)
}
)
}
}
pub fn check_sign_with_dealer_and_identifiers<C: Ciphersuite, R: RngCore + CryptoRng>(
mut rng: R,
) -> (Vec<u8>, Signature<C>, VerifyingKey<C>) {
let identifiers: Vec<frost::Identifier<C>> = [1u16, 42, 100, 257, 42]
.into_iter()
.map(|i| i.try_into().unwrap())
.collect();
let max_signers = 5;
let min_signers = 3;
let err = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Custom(&identifiers),
&mut rng,
)
.unwrap_err();
assert_eq!(err, Error::DuplicatedIdentifier);
let identifiers: Vec<frost::Identifier<C>> = [1u16, 42, 100, 257]
.into_iter()
.map(|i| i.try_into().unwrap())
.collect();
let max_signers = 5;
let min_signers = 3;
let err = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Custom(&identifiers),
&mut rng,
)
.unwrap_err();
assert_eq!(err, Error::IncorrectNumberOfIdentifiers);
let identifiers: Vec<frost::Identifier<C>> = [1u16, 42, 100, 257, 65535]
.into_iter()
.map(|i| i.try_into().unwrap())
.collect();
let max_signers = 5;
let min_signers = 3;
let (shares, pubkeys) = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Custom(&identifiers),
&mut rng,
)
.unwrap();
for id in identifiers {
assert!(shares.contains_key(&id));
}
let mut key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>> =
BTreeMap::new();
for (k, v) in shares {
let key_package = frost::keys::KeyPackage::try_from(v).unwrap();
key_packages.insert(k, key_package);
}
check_sign(min_signers, key_packages, rng, pubkeys).unwrap()
}
fn check_part2_error<C: Ciphersuite>(
round1_secret_package: frost::keys::dkg::round1::SecretPackage<C>,
mut round1_packages: BTreeMap<frost::Identifier<C>, frost::keys::dkg::round1::Package<C>>,
) {
let one = <<C as Ciphersuite>::Group as Group>::Field::one();
let id = *round1_packages.keys().next().unwrap();
round1_packages.get_mut(&id).unwrap().proof_of_knowledge.z =
round1_packages[&id].proof_of_knowledge.z + one;
let e = frost::keys::dkg::part2(round1_secret_package, &round1_packages).unwrap_err();
assert_eq!(e.culprits(), vec![id]);
assert_eq!(e, Error::InvalidProofOfKnowledge { culprit: id });
}
pub fn check_error_culprit<C: Ciphersuite>() {
let identifier: frost::Identifier<C> = 42u16.try_into().unwrap();
let e = Error::InvalidSignatureShare {
culprits: vec![identifier],
};
assert_eq!(e.culprits(), vec![identifier]);
let e = Error::InvalidProofOfKnowledge {
culprit: identifier,
};
assert_eq!(e.culprits(), vec![identifier]);
let e: Error<C> = Error::InvalidSignature;
assert_eq!(e.culprits(), vec![]);
}
pub fn check_identifier_derivation<C: Ciphersuite>() {
let id1a = Identifier::<C>::derive("username1".as_bytes()).unwrap();
let id1b = Identifier::<C>::derive("username1".as_bytes()).unwrap();
let id2 = Identifier::<C>::derive("username2".as_bytes()).unwrap();
assert!(id1a == id1b);
assert!(id1a != id2);
}
pub fn check_sign_with_missing_identifier<C: Ciphersuite, R: RngCore + CryptoRng>(mut rng: R) {
let max_signers = 5;
let min_signers = 3;
let (shares, _pubkeys) = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Default,
&mut rng,
)
.unwrap();
let mut key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>> =
BTreeMap::new();
for (k, v) in shares {
let key_package = frost::keys::KeyPackage::try_from(v).unwrap();
key_packages.insert(k, key_package);
}
let mut nonces_map: BTreeMap<frost::Identifier<C>, frost::round1::SigningNonces<C>> =
BTreeMap::new();
let mut commitments_map: BTreeMap<frost::Identifier<C>, frost::round1::SigningCommitments<C>> =
BTreeMap::new();
let id_1 = Identifier::<C>::try_from(1).unwrap();
let id_2 = Identifier::<C>::try_from(2).unwrap();
let id_3 = Identifier::<C>::try_from(3).unwrap();
let id_4 = Identifier::<C>::try_from(4).unwrap();
let key_packages_inc = vec![id_1, id_2, id_3];
for participant_identifier in key_packages_inc {
let (nonces, commitments) = frost::round1::commit(
key_packages
.get(&participant_identifier)
.unwrap()
.signing_share(),
&mut rng,
);
nonces_map.insert(participant_identifier, nonces);
if participant_identifier == id_1 {
commitments_map.insert(id_4, commitments);
} else {
commitments_map.insert(participant_identifier, commitments);
}
}
let message = "message to sign".as_bytes();
let signing_package = SigningPackage::new(commitments_map, message);
let key_package_1 = key_packages.get(&id_1).unwrap();
let nonces_to_use = &nonces_map.get(&id_1).unwrap();
let signature_share = frost::round2::sign(&signing_package, nonces_to_use, key_package_1);
assert_eq!(signature_share, Err(Error::MissingCommitment))
}
pub fn check_sign_with_incorrect_commitments<C: Ciphersuite, R: RngCore + CryptoRng>(mut rng: R) {
let max_signers = 5;
let min_signers = 3;
let (shares, _pubkeys) = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Default,
&mut rng,
)
.unwrap();
let mut key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>> =
BTreeMap::new();
for (k, v) in shares {
let key_package = frost::keys::KeyPackage::try_from(v).unwrap();
key_packages.insert(k, key_package);
}
let mut commitments_map: BTreeMap<frost::Identifier<C>, frost::round1::SigningCommitments<C>> =
BTreeMap::new();
let id_1 = Identifier::<C>::try_from(1).unwrap();
let id_2 = Identifier::<C>::try_from(2).unwrap();
let id_3 = Identifier::<C>::try_from(3).unwrap();
let (_nonces_1, commitments_1) =
frost::round1::commit(key_packages[&id_1].signing_share(), &mut rng);
let (_nonces_2, commitments_2) =
frost::round1::commit(key_packages[&id_2].signing_share(), &mut rng);
let (nonces_3, _commitments_3) =
frost::round1::commit(key_packages[&id_3].signing_share(), &mut rng);
commitments_map.insert(id_1, commitments_1);
commitments_map.insert(id_2, commitments_2);
commitments_map.insert(id_3, commitments_1);
let message = "message to sign".as_bytes();
let signing_package = SigningPackage::new(commitments_map, message);
let key_package_3 = key_packages.get(&id_3).unwrap();
let signature_share = frost::round2::sign(&signing_package, &nonces_3, key_package_3);
assert!(signature_share.is_err());
assert!(signature_share == Err(Error::IncorrectCommitment))
}
fn check_verifying_shares<C: Ciphersuite>(
pubkeys: PublicKeyPackage<C>,
signing_package: SigningPackage<C>,
mut signature_shares: BTreeMap<Identifier<C>, SignatureShare<C>>,
) {
let one = <<C as Ciphersuite>::Group as Group>::Field::one();
let id = *signature_shares.keys().last().unwrap();
*signature_shares.get_mut(&id).unwrap() =
SignatureShare::new(signature_shares[&id].to_scalar() + one);
let e = frost::aggregate(&signing_package, &signature_shares, &pubkeys).unwrap_err();
assert_eq!(e.culprits(), vec![id]);
assert_eq!(e, Error::InvalidSignatureShare { culprits: vec![id] });
}
fn check_verify_signature_share<C: Ciphersuite>(
pubkeys: &PublicKeyPackage<C>,
signing_package: &SigningPackage<C>,
signature_shares: &BTreeMap<Identifier<C>, SignatureShare<C>>,
) {
for (identifier, signature_share) in signature_shares {
frost::verify_signature_share(
*identifier,
pubkeys.verifying_shares().get(identifier).unwrap(),
signature_share,
signing_package,
pubkeys.verifying_key(),
)
.expect("should pass");
}
for (identifier, signature_share) in signature_shares {
let one = <<C as Ciphersuite>::Group as Group>::Field::one();
let signature_share = SignatureShare::new(signature_share.to_scalar() + one);
frost::verify_signature_share(
*identifier,
pubkeys.verifying_shares().get(identifier).unwrap(),
&signature_share,
signing_package,
pubkeys.verifying_key(),
)
.expect_err("should have failed");
}
}
pub async fn async_check_sign<C: Ciphersuite, R: RngCore + CryptoRng + 'static + Send + Sync>(
mut rng: R,
) {
tokio::spawn(async move {
let max_signers = 5;
let min_signers = 3;
let (shares, pubkey_package) = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Default,
&mut rng,
)
.unwrap();
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
let key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>> = shares
.into_iter()
.map(|(k, v)| (k, frost::keys::KeyPackage::try_from(v).unwrap()))
.collect();
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
let mut nonces_map: BTreeMap<frost::Identifier<C>, frost::round1::SigningNonces<C>> =
BTreeMap::new();
let mut commitments_map: BTreeMap<
frost::Identifier<C>,
frost::round1::SigningCommitments<C>,
> = BTreeMap::new();
for participant_identifier in key_packages.keys().take(min_signers as usize).cloned() {
let (nonces, commitments) = frost::round1::commit(
key_packages
.get(&participant_identifier)
.unwrap()
.signing_share(),
&mut rng,
);
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
nonces_map.insert(participant_identifier, nonces);
commitments_map.insert(participant_identifier, commitments);
}
let mut signature_shares = BTreeMap::new();
let message = "message to sign".as_bytes();
let signing_package = SigningPackage::new(commitments_map, message);
for participant_identifier in nonces_map.keys() {
let key_package = key_packages.get(participant_identifier).unwrap();
let nonces_to_use = nonces_map.get(participant_identifier).unwrap();
let signature_share =
frost::round2::sign(&signing_package, nonces_to_use, key_package).unwrap();
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
signature_shares.insert(*participant_identifier, signature_share);
}
let group_signature =
frost::aggregate(&signing_package, &signature_shares, &pubkey_package).unwrap();
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
pubkey_package
.verifying_key
.verify(message, &group_signature)
.unwrap();
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
for (participant_identifier, _) in nonces_map.clone() {
let key_package = key_packages.get(&participant_identifier).unwrap();
key_package
.verifying_key
.verify(message, &group_signature)
.unwrap();
tokio::time::sleep(core::time::Duration::from_millis(1)).await;
}
})
.await
.unwrap();
}