#![cfg(feature = "serialization")]
use alloc::borrow::ToOwned;
use alloc::collections::BTreeMap;
use alloc::vec::Vec;
use crate::{frost_core as frost, RandomizedCiphersuite, RandomizedParams, Randomizer};
use frost_core::{
round1::SigningCommitments, Field, Group, Identifier, Signature, SigningPackage, VerifyingKey,
};
use rand_core::{CryptoRng, RngCore};
pub fn check_randomized_sign_with_dealer<C: RandomizedCiphersuite, R: RngCore + CryptoRng>(
mut rng: R,
) -> (Vec<u8>, Signature<C>, VerifyingKey<C>) {
let max_signers = 5;
let min_signers = 3;
let (shares, pubkeys) = frost::keys::generate_with_dealer(
max_signers,
min_signers,
frost::keys::IdentifierList::Default,
&mut rng,
)
.unwrap();
let mut key_packages: BTreeMap<frost::Identifier<C>, frost::keys::KeyPackage<C>> =
BTreeMap::new();
for (k, v) in shares {
key_packages.insert(k, frost::keys::KeyPackage::try_from(v).unwrap());
}
let mut nonces: BTreeMap<frost::Identifier<C>, frost::round1::SigningNonces<C>> =
BTreeMap::new();
let mut commitments: BTreeMap<frost::Identifier<C>, frost::round1::SigningCommitments<C>> =
BTreeMap::new();
for participant_index in 1..(min_signers + 1) {
let participant_identifier = participant_index.try_into().expect("should be nonzero");
let (nonce, commitment) = frost::round1::commit(
key_packages
.get(&participant_identifier)
.unwrap()
.signing_share(),
&mut rng,
);
nonces.insert(participant_identifier, nonce);
commitments.insert(participant_identifier, commitment);
}
let mut signature_shares: BTreeMap<frost::Identifier<_>, frost::round2::SignatureShare<_>> =
BTreeMap::new();
let message = "message to sign".as_bytes();
let signing_package = frost::SigningPackage::new(commitments, message);
check_randomizer(&pubkeys, &signing_package, &mut rng);
let (randomizer_params, randomizer_seed) = RandomizedParams::new_from_commitments(
pubkeys.verifying_key(),
signing_package.signing_commitments(),
&mut rng,
)
.unwrap();
for participant_identifier in nonces.keys() {
let key_package = key_packages.get(participant_identifier).unwrap();
let nonces_to_use = &nonces.get(participant_identifier).unwrap();
let signature_share = crate::sign_with_randomizer_seed(
&signing_package,
nonces_to_use,
key_package,
&randomizer_seed,
)
.unwrap();
signature_shares.insert(*participant_identifier, signature_share);
}
let group_signature_res = crate::aggregate(
&signing_package,
&signature_shares,
&pubkeys,
&randomizer_params,
);
assert!(group_signature_res.is_ok());
let group_signature = group_signature_res.unwrap();
assert!(randomizer_params
.randomized_verifying_key()
.verify(message, &group_signature)
.is_ok());
(
message.to_owned(),
group_signature,
*randomizer_params.randomized_verifying_key(),
)
}
fn check_randomizer<C: RandomizedCiphersuite, R: RngCore + CryptoRng>(
pubkeys: &frost::keys::PublicKeyPackage<C>,
signing_package: &frost::SigningPackage<C>,
mut rng: &mut R,
) {
check_from_randomizer(&mut rng, signing_package, pubkeys);
check_from_randomizer_and_signing_package(&mut rng, signing_package);
check_from_seed_and_signing_commitments(&mut rng, signing_package.signing_commitments());
}
fn check_from_randomizer<C: RandomizedCiphersuite, R: RngCore + CryptoRng>(
rng: &mut R,
signing_package: &SigningPackage<C>,
pubkeys: &frost::keys::PublicKeyPackage<C>,
) {
#[allow(deprecated)]
let randomizer = Randomizer::new(rng, signing_package).unwrap();
let randomizer_params = RandomizedParams::from_randomizer(pubkeys.verifying_key(), randomizer);
assert!(*randomizer_params.randomizer() == randomizer);
}
fn check_from_randomizer_and_signing_package<C: RandomizedCiphersuite, R: RngCore + CryptoRng>(
mut rng: &mut R,
signing_package: &SigningPackage<C>,
) {
let rng_randomizer1 = <<C::Group as Group>::Field as Field>::random(&mut rng);
let rng_randomizer2 = <<C::Group as Group>::Field as Field>::random(&mut rng);
let randomizer1 =
Randomizer::from_randomizer_and_signing_package(rng_randomizer1, signing_package);
let randomizer2 =
Randomizer::from_randomizer_and_signing_package(rng_randomizer1, signing_package);
assert!(randomizer1 == randomizer2);
let randomizer2 =
Randomizer::from_randomizer_and_signing_package(rng_randomizer2, signing_package);
assert!(randomizer1 != randomizer2);
let signing_package2 = SigningPackage::new(
signing_package.signing_commitments().clone(),
"fresh new message".as_bytes(),
);
let randomizer2 =
Randomizer::from_randomizer_and_signing_package(rng_randomizer1, &signing_package2);
assert!(randomizer1 != randomizer2);
}
fn check_from_seed_and_signing_commitments<C: RandomizedCiphersuite, R: RngCore + CryptoRng>(
mut rng: &mut R,
signing_commitments: &BTreeMap<Identifier<C>, SigningCommitments<C>>,
) {
let (randomizer1, randomizer_seed1) =
Randomizer::new_from_commitments(&mut rng, signing_commitments).unwrap();
let randomizer2 =
Randomizer::regenerate_from_seed_and_commitments(&randomizer_seed1, signing_commitments)
.unwrap();
assert!(randomizer1 == randomizer2);
let (randomizer2, randomizer_seed2) =
Randomizer::new_from_commitments(&mut rng, signing_commitments).unwrap();
assert!(randomizer1 != randomizer2);
assert!(randomizer_seed1 != randomizer_seed2);
let mut modified_signing_commitments = signing_commitments.clone();
modified_signing_commitments
.first_entry()
.unwrap()
.insert(*signing_commitments.last_key_value().unwrap().1);
let randomizer2 = Randomizer::regenerate_from_seed_and_commitments(
&randomizer_seed1,
&modified_signing_commitments,
)
.unwrap();
assert!(randomizer1 != randomizer2);
}