Files
serai/coins/monero/src/tests/clsag.rs

134 lines
3.9 KiB
Rust
Raw Normal View History

#[cfg(feature = "multisig")]
use std::{cell::RefCell, rc::Rc, collections::HashMap};
2022-04-30 04:32:19 -04:00
2022-04-29 15:28:04 -04:00
use rand::{RngCore, rngs::OsRng};
use curve25519_dalek::{constants::ED25519_BASEPOINT_TABLE, scalar::Scalar};
2022-05-21 20:26:28 -04:00
use crate::{
Commitment,
random_scalar, generate_key_image,
2022-05-21 20:26:28 -04:00
wallet::Decoys,
ringct::clsag::{ClsagInput, Clsag}
};
#[cfg(feature = "multisig")]
use crate::{frost::{MultisigError, Transcript}, ringct::clsag::{ClsagDetails, ClsagMultisig}};
#[cfg(feature = "multisig")]
2022-05-21 20:26:28 -04:00
use crate::tests::frost::{THRESHOLD, generate_keys, sign};
const RING_LEN: u64 = 11;
const AMOUNT: u64 = 1337;
#[cfg(feature = "multisig")]
const RING_INDEX: u8 = 3;
#[test]
fn clsag() {
for real in 0 .. RING_LEN {
let msg = [1; 32];
let mut secrets = [Scalar::zero(), Scalar::zero()];
let mut ring = vec![];
for i in 0 .. RING_LEN {
let dest = random_scalar(&mut OsRng);
let mask = random_scalar(&mut OsRng);
let amount;
if i == u64::from(real) {
secrets = [dest, mask];
amount = AMOUNT;
} else {
amount = OsRng.next_u64();
}
ring.push([&dest * &ED25519_BASEPOINT_TABLE, Commitment::new(mask, amount).calculate()]);
}
2022-05-17 19:15:53 -04:00
let image = generate_key_image(&secrets[0]);
let (clsag, pseudo_out) = Clsag::sign(
&mut OsRng,
&vec![(
secrets[0],
image,
ClsagInput::new(
Commitment::new(secrets[1], AMOUNT),
Decoys {
i: u8::try_from(real).unwrap(),
offsets: (1 ..= RING_LEN).into_iter().collect(),
ring: ring.clone()
}
).unwrap()
)],
random_scalar(&mut OsRng),
msg
2022-05-21 20:26:28 -04:00
).swap_remove(0);
clsag.verify(&ring, &image, &pseudo_out, &msg).unwrap();
#[cfg(feature = "experimental")]
clsag.rust_verify(&ring, &image, &pseudo_out, &msg).unwrap();
}
}
#[cfg(feature = "multisig")]
#[test]
fn clsag_multisig() -> Result<(), MultisigError> {
2022-04-28 21:47:25 -04:00
let (keys, group_private) = generate_keys();
let randomness = random_scalar(&mut OsRng);
let mut ring = vec![];
for i in 0 .. RING_LEN {
let dest;
2022-04-28 12:01:20 -04:00
let mask;
let amount;
2022-04-27 22:48:58 -04:00
if i != u64::from(RING_INDEX) {
dest = random_scalar(&mut OsRng);
2022-04-28 12:01:20 -04:00
mask = random_scalar(&mut OsRng);
amount = OsRng.next_u64();
} else {
dest = group_private.0;
2022-04-28 12:01:20 -04:00
mask = randomness;
amount = AMOUNT;
}
2022-04-28 12:01:20 -04:00
ring.push([&dest * &ED25519_BASEPOINT_TABLE, Commitment::new(mask, amount).calculate()]);
}
2022-05-06 19:07:37 -04:00
let mask_sum = random_scalar(&mut OsRng);
let mut machines = HashMap::new();
for i in 1 ..= THRESHOLD {
machines.insert(
i,
sign::AlgorithmMachine::new(
2022-05-21 20:26:28 -04:00
ClsagMultisig::new(
2022-05-06 07:33:08 -04:00
Transcript::new(b"Monero Serai CLSAG Test".to_vec()),
2022-05-06 19:07:37 -04:00
Rc::new(RefCell::new(Some(
ClsagDetails::new(
ClsagInput::new(
2022-05-06 19:07:37 -04:00
Commitment::new(randomness, AMOUNT),
Decoys {
i: RING_INDEX,
offsets: (1 ..= RING_LEN).into_iter().collect(),
2022-05-06 19:07:37 -04:00
ring: ring.clone()
}
).unwrap(),
mask_sum
)
)))
).unwrap(),
Rc::new(keys[&i].clone()),
&(1 ..= THRESHOLD).collect::<Vec<_>>()
).unwrap()
);
}
let mut signatures = sign(&mut machines, &[1; 32]);
2022-04-28 21:47:25 -04:00
let signature = signatures.swap_remove(0);
for s in 0 .. usize::from(THRESHOLD - 1) {
2022-04-28 21:47:25 -04:00
// Verify the commitments and the non-decoy s scalar are identical to every other signature
// FROST will already have called verify on the produced signature, before checking individual
// key shares. For FROST Schnorr, it's cheaper. For CLSAG, it may be more expensive? Yet it
// ensures we have usable signatures, not just signatures we think are usable
assert_eq!(signatures[s].1, signature.1);
assert_eq!(signatures[s].0.s[RING_INDEX as usize], signature.0.s[RING_INDEX as usize]);
}
Ok(())
}