2022-04-30 04:32:19 -04:00
|
|
|
use std::{rc::Rc, cell::RefCell};
|
|
|
|
|
|
2022-05-06 07:33:08 -04:00
|
|
|
use rand_core::{RngCore, CryptoRng, SeedableRng};
|
|
|
|
|
use rand_chacha::ChaCha12Rng;
|
2022-04-30 04:32:19 -04:00
|
|
|
|
|
|
|
|
use curve25519_dalek::{scalar::Scalar, edwards::{EdwardsPoint, CompressedEdwardsY}};
|
|
|
|
|
|
|
|
|
|
use monero::{
|
|
|
|
|
Hash, VarInt,
|
2022-05-03 08:49:46 -04:00
|
|
|
consensus::{Encodable, deserialize},
|
2022-04-30 04:32:19 -04:00
|
|
|
util::ringct::Key,
|
|
|
|
|
blockdata::transaction::{KeyImage, TxIn, Transaction}
|
|
|
|
|
};
|
|
|
|
|
|
2022-05-03 07:20:24 -04:00
|
|
|
use transcript::Transcript as TranscriptTrait;
|
|
|
|
|
use frost::{FrostError, MultisigKeys, MultisigParams, sign::{State, StateMachine, AlgorithmMachine}};
|
|
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
use crate::{
|
2022-05-03 08:49:46 -04:00
|
|
|
frost::{Transcript, Ed25519},
|
|
|
|
|
key_image, bulletproofs, clsag,
|
2022-04-30 04:32:19 -04:00
|
|
|
rpc::Rpc,
|
2022-05-03 08:49:46 -04:00
|
|
|
transaction::{TransactionError, SignableTransaction, mixins}
|
2022-04-30 04:32:19 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
pub struct TransactionMachine {
|
|
|
|
|
leader: bool,
|
|
|
|
|
signable: SignableTransaction,
|
2022-05-06 07:33:08 -04:00
|
|
|
transcript: Transcript,
|
|
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
our_images: Vec<EdwardsPoint>,
|
|
|
|
|
mask_sum: Rc<RefCell<Scalar>>,
|
|
|
|
|
msg: Rc<RefCell<[u8; 32]>>,
|
2022-05-04 06:24:52 -04:00
|
|
|
clsags: Vec<AlgorithmMachine<Ed25519, clsag::Multisig>>,
|
|
|
|
|
inputs: Vec<TxIn>,
|
|
|
|
|
tx: Option<Transaction>,
|
2022-04-30 04:32:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl SignableTransaction {
|
|
|
|
|
pub async fn multisig<R: RngCore + CryptoRng>(
|
2022-05-03 08:49:46 -04:00
|
|
|
mut self,
|
2022-05-06 07:33:08 -04:00
|
|
|
label: Vec<u8>,
|
2022-04-30 04:32:19 -04:00
|
|
|
rng: &mut R,
|
|
|
|
|
rpc: &Rpc,
|
|
|
|
|
keys: Rc<MultisigKeys<Ed25519>>,
|
2022-05-04 08:18:43 -04:00
|
|
|
height: usize,
|
2022-04-30 04:32:19 -04:00
|
|
|
included: &[usize]
|
|
|
|
|
) -> Result<TransactionMachine, TransactionError> {
|
|
|
|
|
let mut our_images = vec![];
|
2022-05-04 06:24:52 -04:00
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
let mask_sum = Rc::new(RefCell::new(Scalar::zero()));
|
|
|
|
|
let msg = Rc::new(RefCell::new([0; 32]));
|
|
|
|
|
let mut clsags = vec![];
|
2022-05-04 06:24:52 -04:00
|
|
|
|
|
|
|
|
let mut inputs = vec![];
|
|
|
|
|
|
|
|
|
|
// Create a RNG out of the input shared keys, which either requires the view key or being every
|
|
|
|
|
// sender, and the payments (address and amount), which a passive adversary may be able to know
|
2022-05-06 07:33:08 -04:00
|
|
|
// depending on how these transactions are coordinated
|
|
|
|
|
|
2022-05-04 06:24:52 -04:00
|
|
|
// The lack of dedicated entropy here is frustrating. We can probably provide entropy inclusion
|
|
|
|
|
// if we move CLSAG ring to a Rc RefCell like msg and mask? TODO
|
2022-05-06 07:33:08 -04:00
|
|
|
let mut transcript = Transcript::new(label);
|
2022-04-30 04:32:19 -04:00
|
|
|
for input in &self.inputs {
|
2022-05-06 07:33:08 -04:00
|
|
|
// These outputs can only be spent once. Therefore, it forces all RNGs derived from this
|
|
|
|
|
// transcript (such as the one used to create one time keys) to be unique
|
|
|
|
|
transcript.append_message(b"input_hash", &input.tx.0);
|
2022-05-06 07:49:18 -04:00
|
|
|
// TODO: Should this be u8, u16, or u32? Right now, outputs are solely up to 16, but what
|
|
|
|
|
// about the future?
|
2022-05-06 07:33:08 -04:00
|
|
|
transcript.append_message(b"input_output_index", &u64::try_from(input.o).unwrap().to_le_bytes());
|
|
|
|
|
// Not including this, with a doxxed list of payments, would allow brute forcing the inputs
|
|
|
|
|
// to determine RNG seeds and therefore the true spends
|
2022-05-06 01:35:23 -04:00
|
|
|
transcript.append_message(b"input_shared_key", &input.key_offset.to_bytes());
|
2022-05-04 06:24:52 -04:00
|
|
|
}
|
|
|
|
|
for payment in &self.payments {
|
2022-05-06 01:35:23 -04:00
|
|
|
transcript.append_message(b"payment_address", &payment.0.as_bytes());
|
|
|
|
|
transcript.append_message(b"payment_amount", &payment.1.to_le_bytes());
|
2022-05-04 06:24:52 -04:00
|
|
|
}
|
2022-05-06 07:33:08 -04:00
|
|
|
// Not only is this an output, but this locks to the base keys to be complete with the above key offsets
|
|
|
|
|
transcript.append_message(b"change", &self.change.as_bytes());
|
2022-04-30 04:32:19 -04:00
|
|
|
|
2022-05-04 06:24:52 -04:00
|
|
|
// Select mixins
|
|
|
|
|
let mixins = mixins::select(
|
2022-05-06 07:33:08 -04:00
|
|
|
&mut ChaCha12Rng::from_seed(transcript.rng_seed(b"mixins", None)),
|
2022-05-04 06:24:52 -04:00
|
|
|
rpc,
|
2022-05-04 08:18:43 -04:00
|
|
|
height,
|
2022-05-04 06:24:52 -04:00
|
|
|
&self.inputs
|
|
|
|
|
).await.map_err(|e| TransactionError::RpcError(e))?;
|
|
|
|
|
|
|
|
|
|
for (i, input) in self.inputs.iter().enumerate() {
|
2022-04-30 04:32:19 -04:00
|
|
|
let keys = keys.offset(dalek_ff_group::Scalar(input.key_offset));
|
|
|
|
|
let (image, _) = key_image::generate_share(
|
|
|
|
|
rng,
|
|
|
|
|
&keys.view(included).map_err(|e| TransactionError::FrostError(e))?
|
|
|
|
|
);
|
|
|
|
|
our_images.push(image);
|
2022-05-04 06:24:52 -04:00
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
clsags.push(
|
|
|
|
|
AlgorithmMachine::new(
|
|
|
|
|
clsag::Multisig::new(
|
2022-05-06 07:33:08 -04:00
|
|
|
transcript.clone(),
|
2022-04-30 04:32:19 -04:00
|
|
|
clsag::Input::new(
|
2022-05-04 06:24:52 -04:00
|
|
|
mixins[i].2.clone(),
|
|
|
|
|
mixins[i].1,
|
2022-04-30 04:32:19 -04:00
|
|
|
input.commitment
|
|
|
|
|
).map_err(|e| TransactionError::ClsagError(e))?,
|
|
|
|
|
msg.clone(),
|
|
|
|
|
mask_sum.clone()
|
|
|
|
|
).map_err(|e| TransactionError::MultisigError(e))?,
|
|
|
|
|
Rc::new(keys),
|
|
|
|
|
included
|
|
|
|
|
).map_err(|e| TransactionError::FrostError(e))?
|
|
|
|
|
);
|
|
|
|
|
|
|
|
|
|
inputs.push(TxIn::ToKey {
|
|
|
|
|
amount: VarInt(0),
|
2022-05-04 06:24:52 -04:00
|
|
|
key_offsets: mixins[i].0.clone(),
|
2022-04-30 04:32:19 -04:00
|
|
|
k_image: KeyImage { image: Hash([0; 32]) }
|
|
|
|
|
});
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Verify these outputs by a dummy prep
|
2022-05-03 08:49:46 -04:00
|
|
|
self.prepare_outputs(rng)?;
|
2022-04-30 04:32:19 -04:00
|
|
|
|
|
|
|
|
Ok(TransactionMachine {
|
|
|
|
|
leader: keys.params().i() == included[0],
|
|
|
|
|
signable: self,
|
2022-05-06 07:33:08 -04:00
|
|
|
transcript,
|
2022-04-30 04:32:19 -04:00
|
|
|
our_images,
|
|
|
|
|
mask_sum,
|
|
|
|
|
msg,
|
2022-05-04 06:24:52 -04:00
|
|
|
clsags,
|
|
|
|
|
inputs,
|
|
|
|
|
tx: None
|
2022-04-30 04:32:19 -04:00
|
|
|
})
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl StateMachine for TransactionMachine {
|
|
|
|
|
type Signature = Transaction;
|
|
|
|
|
|
|
|
|
|
fn preprocess<R: RngCore + CryptoRng>(
|
|
|
|
|
&mut self,
|
|
|
|
|
rng: &mut R
|
|
|
|
|
) -> Result<Vec<u8>, FrostError> {
|
|
|
|
|
if self.state() != State::Fresh {
|
|
|
|
|
Err(FrostError::InvalidSignTransition(State::Fresh, self.state()))?;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Iterate over each CLSAG calling preprocess
|
|
|
|
|
let mut serialized = vec![];
|
|
|
|
|
for clsag in self.clsags.iter_mut() {
|
|
|
|
|
serialized.extend(&clsag.preprocess(rng)?);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if self.leader {
|
2022-05-03 08:49:46 -04:00
|
|
|
let mut entropy = [0; 32];
|
|
|
|
|
rng.fill_bytes(&mut entropy);
|
|
|
|
|
serialized.extend(&entropy);
|
|
|
|
|
|
2022-05-06 07:33:08 -04:00
|
|
|
let mut rng = ChaCha12Rng::from_seed(self.transcript.rng_seed(b"tx_keys", Some(entropy)));
|
2022-05-03 08:49:46 -04:00
|
|
|
// Safe to unwrap thanks to the dummy prepare
|
|
|
|
|
let (commitments, mask_sum) = self.signable.prepare_outputs(&mut rng).unwrap();
|
2022-04-30 04:32:19 -04:00
|
|
|
self.mask_sum.replace(mask_sum);
|
|
|
|
|
|
2022-05-03 08:49:46 -04:00
|
|
|
let bp = bulletproofs::generate(&commitments).unwrap();
|
|
|
|
|
bp.consensus_encode(&mut serialized).unwrap();
|
|
|
|
|
|
|
|
|
|
let tx = self.signable.prepare_transaction(&commitments, bp);
|
|
|
|
|
self.tx = Some(tx);
|
2022-04-30 04:32:19 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Ok(serialized)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn sign(
|
|
|
|
|
&mut self,
|
|
|
|
|
commitments: &[Option<Vec<u8>>],
|
|
|
|
|
_: &[u8]
|
|
|
|
|
) -> Result<Vec<u8>, FrostError> {
|
|
|
|
|
if self.state() != State::Preprocessed {
|
|
|
|
|
Err(FrostError::InvalidSignTransition(State::Preprocessed, self.state()))?;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// FROST commitments, image, commitments, and their proofs
|
|
|
|
|
let clsag_len = 64 + clsag::Multisig::serialized_len();
|
|
|
|
|
let clsag_lens = clsag_len * self.clsags.len();
|
|
|
|
|
|
|
|
|
|
// Split out the prep and update the TX
|
|
|
|
|
let mut tx = None;
|
|
|
|
|
if self.leader {
|
|
|
|
|
tx = self.tx.take();
|
|
|
|
|
} else {
|
|
|
|
|
for (l, prep) in commitments.iter().enumerate() {
|
|
|
|
|
if prep.is_none() {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
let prep = prep.as_ref().unwrap();
|
|
|
|
|
|
2022-05-06 07:33:08 -04:00
|
|
|
let mut rng = ChaCha12Rng::from_seed(
|
|
|
|
|
self.transcript.rng_seed(
|
|
|
|
|
b"tx_keys",
|
|
|
|
|
Some(prep[clsag_lens .. (clsag_lens + 32)].try_into().map_err(|_| FrostError::InvalidShare(l))?)
|
|
|
|
|
)
|
2022-05-03 08:49:46 -04:00
|
|
|
);
|
|
|
|
|
// Not invalid outputs due to doing a dummy prep as leader
|
|
|
|
|
let (commitments, mask_sum) = self.signable.prepare_outputs(&mut rng).map_err(|_| FrostError::InvalidShare(l))?;
|
2022-04-30 04:32:19 -04:00
|
|
|
self.mask_sum.replace(mask_sum);
|
2022-05-03 08:49:46 -04:00
|
|
|
|
|
|
|
|
// Verify the provided bulletproofs if not leader
|
|
|
|
|
let bp = deserialize(&prep[(clsag_lens + 32) .. prep.len()]).map_err(|_| FrostError::InvalidShare(l))?;
|
|
|
|
|
if !bulletproofs::verify(&bp, &commitments.iter().map(|c| c.calculate()).collect::<Vec<EdwardsPoint>>()) {
|
|
|
|
|
Err(FrostError::InvalidShare(l))?;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let tx_inner = self.signable.prepare_transaction(&commitments, bp);
|
2022-04-30 04:32:19 -04:00
|
|
|
tx = Some(tx_inner);
|
|
|
|
|
break;
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Calculate the key images and update the TX
|
|
|
|
|
// Multisig will parse/calculate/validate this as needed, yet doing so here as well provides
|
|
|
|
|
// the easiest API overall
|
|
|
|
|
for c in 0 .. self.clsags.len() {
|
|
|
|
|
let mut image = self.our_images[c];
|
|
|
|
|
for (l, serialized) in commitments.iter().enumerate() {
|
|
|
|
|
if serialized.is_none() {
|
|
|
|
|
continue;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
image += CompressedEdwardsY(
|
|
|
|
|
serialized.as_ref().unwrap()[((c * clsag_len) + 64) .. ((c * clsag_len) + 96)]
|
|
|
|
|
.try_into().map_err(|_| FrostError::InvalidCommitment(l))?
|
|
|
|
|
).decompress().ok_or(FrostError::InvalidCommitment(l))?;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
self.inputs[c] = match self.inputs[c].clone() {
|
|
|
|
|
TxIn::ToKey { amount, key_offsets, k_image: _ } => TxIn::ToKey {
|
|
|
|
|
amount, key_offsets,
|
|
|
|
|
k_image: KeyImage { image: Hash(image.compress().to_bytes()) }
|
|
|
|
|
},
|
|
|
|
|
_ => panic!("Signing for an input which isn't ToKey")
|
|
|
|
|
};
|
|
|
|
|
}
|
|
|
|
|
|
2022-05-03 08:49:46 -04:00
|
|
|
// TODO sort inputs
|
|
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
let mut tx = tx.unwrap();
|
|
|
|
|
tx.prefix.inputs = self.inputs.clone();
|
|
|
|
|
self.msg.replace(tx.signature_hash().unwrap().0);
|
|
|
|
|
self.tx = Some(tx);
|
|
|
|
|
|
|
|
|
|
// Iterate over each CLSAG calling sign
|
|
|
|
|
let mut serialized = Vec::with_capacity(self.clsags.len() * 32);
|
|
|
|
|
for (c, clsag) in self.clsags.iter_mut().enumerate() {
|
|
|
|
|
serialized.extend(&clsag.sign(
|
|
|
|
|
&commitments.iter().map(
|
|
|
|
|
|commitments| commitments.clone().map(
|
|
|
|
|
|commitments| commitments[(c * clsag_len) .. ((c * clsag_len) + clsag_len)].to_vec()
|
|
|
|
|
)
|
|
|
|
|
).collect::<Vec<_>>(),
|
|
|
|
|
&vec![]
|
|
|
|
|
)?);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
Ok(serialized)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn complete(&mut self, shares: &[Option<Vec<u8>>]) -> Result<Transaction, FrostError> {
|
|
|
|
|
if self.state() != State::Signed {
|
|
|
|
|
Err(FrostError::InvalidSignTransition(State::Signed, self.state()))?;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
let mut tx = self.tx.take().unwrap();
|
|
|
|
|
let mut prunable = tx.rct_signatures.p.unwrap();
|
|
|
|
|
for (c, clsag) in self.clsags.iter_mut().enumerate() {
|
|
|
|
|
let (clsag, pseudo_out) = clsag.complete(&shares.iter().map(
|
|
|
|
|
|share| share.clone().map(|share| share[(c * 32) .. ((c * 32) + 32)].to_vec())
|
|
|
|
|
).collect::<Vec<_>>())?;
|
|
|
|
|
prunable.Clsags.push(clsag);
|
|
|
|
|
prunable.pseudo_outs.push(Key { key: pseudo_out.compress().to_bytes() });
|
|
|
|
|
}
|
|
|
|
|
tx.rct_signatures.p = Some(prunable);
|
|
|
|
|
|
|
|
|
|
Ok(tx)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn multisig_params(&self) -> MultisigParams {
|
|
|
|
|
self.clsags[0].multisig_params()
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn state(&self) -> State {
|
|
|
|
|
self.clsags[0].state()
|
|
|
|
|
}
|
|
|
|
|
}
|