2022-04-29 22:03:34 -04:00
|
|
|
use core::fmt::Debug;
|
2022-04-30 04:32:19 -04:00
|
|
|
use std::{rc::Rc, cell::RefCell};
|
2022-04-29 22:03:34 -04:00
|
|
|
|
2022-04-28 17:12:54 -04:00
|
|
|
use rand_core::{RngCore, CryptoRng, SeedableRng};
|
|
|
|
|
use rand_chacha::ChaCha12Rng;
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-28 17:12:54 -04:00
|
|
|
use blake2::{Digest, Blake2b512};
|
2022-04-21 21:36:18 -04:00
|
|
|
|
|
|
|
|
use curve25519_dalek::{
|
|
|
|
|
constants::ED25519_BASEPOINT_TABLE,
|
2022-04-29 22:03:34 -04:00
|
|
|
traits::Identity,
|
2022-04-21 21:36:18 -04:00
|
|
|
scalar::Scalar,
|
|
|
|
|
edwards::EdwardsPoint
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
use group::Group;
|
2022-04-28 17:12:54 -04:00
|
|
|
use dalek_ff_group as dfg;
|
2022-04-30 04:32:19 -04:00
|
|
|
use frost::{Curve, FrostError, algorithm::Algorithm, MultisigView};
|
2022-04-21 21:36:18 -04:00
|
|
|
|
|
|
|
|
use monero::util::ringct::{Key, Clsag};
|
|
|
|
|
|
|
|
|
|
use crate::{
|
|
|
|
|
hash_to_point,
|
2022-04-28 12:01:20 -04:00
|
|
|
frost::{MultisigError, Ed25519, DLEqProof},
|
2022-04-29 22:03:34 -04:00
|
|
|
key_image,
|
2022-04-28 17:29:56 -04:00
|
|
|
clsag::{Input, sign_core, verify}
|
2022-04-21 21:36:18 -04:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
|
struct ClsagSignInterim {
|
|
|
|
|
c: Scalar,
|
2022-04-28 12:01:20 -04:00
|
|
|
s: Scalar,
|
2022-04-21 21:36:18 -04:00
|
|
|
|
|
|
|
|
clsag: Clsag,
|
|
|
|
|
C_out: EdwardsPoint
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
|
#[derive(Clone, Debug)]
|
2022-04-30 04:32:19 -04:00
|
|
|
pub struct Multisig {
|
2022-04-30 01:43:15 -04:00
|
|
|
entropy: Vec<u8>,
|
2022-04-29 22:03:34 -04:00
|
|
|
AH: (dfg::EdwardsPoint, dfg::EdwardsPoint),
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-28 17:29:56 -04:00
|
|
|
input: Input,
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
image: EdwardsPoint,
|
2022-04-30 04:32:19 -04:00
|
|
|
|
|
|
|
|
msg: Rc<RefCell<[u8; 32]>>,
|
|
|
|
|
mask_sum: Rc<RefCell<Scalar>>,
|
2022-04-29 22:03:34 -04:00
|
|
|
|
2022-04-21 21:36:18 -04:00
|
|
|
interim: Option<ClsagSignInterim>
|
|
|
|
|
}
|
|
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
impl Multisig {
|
2022-04-29 15:28:04 -04:00
|
|
|
pub fn new(
|
2022-04-29 22:03:34 -04:00
|
|
|
input: Input,
|
2022-04-30 04:32:19 -04:00
|
|
|
msg: Rc<RefCell<[u8; 32]>>,
|
|
|
|
|
mask_sum: Rc<RefCell<Scalar>>,
|
|
|
|
|
) -> Result<Multisig, MultisigError> {
|
2022-04-21 21:36:18 -04:00
|
|
|
Ok(
|
|
|
|
|
Multisig {
|
2022-04-30 01:43:15 -04:00
|
|
|
entropy: vec![],
|
2022-04-29 22:03:34 -04:00
|
|
|
AH: (dfg::EdwardsPoint::identity(), dfg::EdwardsPoint::identity()),
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-28 12:01:20 -04:00
|
|
|
input,
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
image: EdwardsPoint::identity(),
|
2022-04-30 04:32:19 -04:00
|
|
|
|
|
|
|
|
msg,
|
|
|
|
|
mask_sum,
|
2022-04-30 01:43:15 -04:00
|
|
|
|
2022-04-21 21:36:18 -04:00
|
|
|
interim: None
|
|
|
|
|
}
|
|
|
|
|
)
|
|
|
|
|
}
|
2022-04-30 04:32:19 -04:00
|
|
|
|
|
|
|
|
pub fn serialized_len() -> usize {
|
|
|
|
|
3 * (32 + 64)
|
|
|
|
|
}
|
2022-04-21 21:36:18 -04:00
|
|
|
}
|
|
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
impl Algorithm<Ed25519> for Multisig {
|
2022-04-21 21:36:18 -04:00
|
|
|
type Signature = (Clsag, EdwardsPoint);
|
|
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
// We arguably don't have to commit to the nonces at all thanks to xG and yG being committed to,
|
|
|
|
|
// both of those being proven to have the same scalar as xH and yH, yet it doesn't hurt
|
2022-04-30 04:32:19 -04:00
|
|
|
// As for the image, that should be committed to by the msg, yet putting it here as well ensures
|
|
|
|
|
// the security bounds of this
|
2022-04-21 21:36:18 -04:00
|
|
|
fn addendum_commit_len() -> usize {
|
2022-04-30 01:43:15 -04:00
|
|
|
3 * 32
|
2022-04-21 21:36:18 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn preprocess_addendum<R: RngCore + CryptoRng>(
|
|
|
|
|
rng: &mut R,
|
2022-04-30 04:32:19 -04:00
|
|
|
view: &MultisigView<Ed25519>,
|
2022-04-21 21:36:18 -04:00
|
|
|
nonces: &[dfg::Scalar; 2]
|
|
|
|
|
) -> Vec<u8> {
|
2022-04-30 04:32:19 -04:00
|
|
|
let (share, proof) = key_image::generate_share(rng, view);
|
2022-04-30 01:43:15 -04:00
|
|
|
|
2022-04-21 21:36:18 -04:00
|
|
|
#[allow(non_snake_case)]
|
2022-04-23 03:49:30 -04:00
|
|
|
let H = hash_to_point(&view.group_key().0);
|
2022-04-30 01:43:15 -04:00
|
|
|
#[allow(non_snake_case)]
|
|
|
|
|
let nH = (nonces[0].0 * H, nonces[1].0 * H);
|
|
|
|
|
|
2022-04-30 04:32:19 -04:00
|
|
|
let mut serialized = Vec::with_capacity(Multisig::serialized_len());
|
|
|
|
|
serialized.extend(share.compress().to_bytes());
|
2022-04-30 01:43:15 -04:00
|
|
|
serialized.extend(nH.0.compress().to_bytes());
|
|
|
|
|
serialized.extend(nH.1.compress().to_bytes());
|
|
|
|
|
serialized.extend(&DLEqProof::prove(rng, &nonces[0].0, &H, &nH.0).serialize());
|
|
|
|
|
serialized.extend(&DLEqProof::prove(rng, &nonces[1].0, &H, &nH.1).serialize());
|
|
|
|
|
serialized.extend(proof);
|
2022-04-21 21:36:18 -04:00
|
|
|
serialized
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn process_addendum(
|
|
|
|
|
&mut self,
|
2022-04-30 04:32:19 -04:00
|
|
|
view: &MultisigView<Ed25519>,
|
2022-04-21 21:36:18 -04:00
|
|
|
l: usize,
|
|
|
|
|
commitments: &[dfg::EdwardsPoint; 2],
|
|
|
|
|
serialized: &[u8]
|
|
|
|
|
) -> Result<(), FrostError> {
|
2022-04-30 04:32:19 -04:00
|
|
|
if serialized.len() != Multisig::serialized_len() {
|
2022-04-21 21:36:18 -04:00
|
|
|
// Not an optimal error but...
|
2022-04-30 01:43:15 -04:00
|
|
|
Err(FrostError::InvalidCommitmentQuantity(l, 9, serialized.len() / 32))?;
|
2022-04-21 21:36:18 -04:00
|
|
|
}
|
|
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
// Use everyone's commitments to derive a random source all signers can agree upon
|
|
|
|
|
// Cannot be manipulated to effect and all signers must, and will, know this
|
|
|
|
|
self.entropy.extend(&l.to_le_bytes());
|
2022-04-30 04:32:19 -04:00
|
|
|
self.entropy.extend(&serialized[0 .. Multisig::addendum_commit_len()]);
|
2022-04-30 01:43:15 -04:00
|
|
|
|
|
|
|
|
let (share, serialized) = key_image::verify_share(view, l, serialized).map_err(|_| FrostError::InvalidShare(l))?;
|
|
|
|
|
self.image += share;
|
|
|
|
|
|
2022-04-28 12:01:20 -04:00
|
|
|
let alt = &hash_to_point(&self.input.ring[self.input.i][0]);
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
#[allow(non_snake_case)]
|
|
|
|
|
let H = (
|
|
|
|
|
<Ed25519 as Curve>::G_from_slice(&serialized[0 .. 32]).map_err(|_| FrostError::InvalidCommitment(l))?,
|
|
|
|
|
<Ed25519 as Curve>::G_from_slice(&serialized[32 .. 64]).map_err(|_| FrostError::InvalidCommitment(l))?
|
|
|
|
|
);
|
|
|
|
|
|
2022-04-21 21:36:18 -04:00
|
|
|
DLEqProof::deserialize(&serialized[64 .. 128]).ok_or(FrostError::InvalidCommitment(l))?.verify(
|
|
|
|
|
&alt,
|
|
|
|
|
&commitments[0],
|
2022-04-30 01:43:15 -04:00
|
|
|
&H.0
|
2022-04-21 21:36:18 -04:00
|
|
|
).map_err(|_| FrostError::InvalidCommitment(l))?;
|
|
|
|
|
|
|
|
|
|
DLEqProof::deserialize(&serialized[128 .. 192]).ok_or(FrostError::InvalidCommitment(l))?.verify(
|
|
|
|
|
&alt,
|
|
|
|
|
&commitments[1],
|
2022-04-30 01:43:15 -04:00
|
|
|
&H.1
|
2022-04-21 21:36:18 -04:00
|
|
|
).map_err(|_| FrostError::InvalidCommitment(l))?;
|
|
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
self.AH.0 += H.0;
|
|
|
|
|
self.AH.1 += H.1;
|
2022-04-21 21:36:18 -04:00
|
|
|
|
|
|
|
|
Ok(())
|
|
|
|
|
}
|
|
|
|
|
|
2022-04-29 15:28:04 -04:00
|
|
|
fn context(&self) -> Vec<u8> {
|
2022-04-30 04:32:19 -04:00
|
|
|
let mut context = Vec::with_capacity(32 + 32 + 1 + (2 * 11 * 32));
|
|
|
|
|
context.extend(&*self.msg.borrow());
|
|
|
|
|
context.extend(&self.mask_sum.borrow().to_bytes());
|
2022-04-29 15:28:04 -04:00
|
|
|
context.extend(&self.input.context());
|
|
|
|
|
context
|
|
|
|
|
}
|
|
|
|
|
|
2022-04-21 21:36:18 -04:00
|
|
|
fn sign_share(
|
|
|
|
|
&mut self,
|
2022-04-30 04:32:19 -04:00
|
|
|
view: &MultisigView<Ed25519>,
|
2022-04-21 21:36:18 -04:00
|
|
|
nonce_sum: dfg::EdwardsPoint,
|
2022-04-29 22:03:34 -04:00
|
|
|
b: dfg::Scalar,
|
2022-04-23 03:49:30 -04:00
|
|
|
nonce: dfg::Scalar,
|
|
|
|
|
_: &[u8]
|
2022-04-21 21:36:18 -04:00
|
|
|
) -> dfg::Scalar {
|
2022-04-29 22:03:34 -04:00
|
|
|
// Apply the binding factor to the H variant of the nonce
|
|
|
|
|
self.AH.0 += self.AH.1 * b;
|
|
|
|
|
|
2022-04-30 01:43:15 -04:00
|
|
|
// Use the context with the entropy to prevent passive observers of messages from being able to
|
|
|
|
|
// break privacy, as the context includes the index of the output in the ring, which can only
|
|
|
|
|
// be known if you have the view key and know which of the wallet's TXOs is being spent
|
2022-04-28 17:12:54 -04:00
|
|
|
let mut seed = b"CLSAG_randomness".to_vec();
|
|
|
|
|
seed.extend(&self.context());
|
2022-04-30 01:43:15 -04:00
|
|
|
seed.extend(&self.entropy);
|
2022-04-28 17:12:54 -04:00
|
|
|
let mut rng = ChaCha12Rng::from_seed(Blake2b512::digest(seed)[0 .. 32].try_into().unwrap());
|
2022-04-28 12:01:20 -04:00
|
|
|
|
2022-04-21 21:36:18 -04:00
|
|
|
#[allow(non_snake_case)]
|
2022-04-23 03:49:30 -04:00
|
|
|
let (clsag, c, mu_C, z, mu_P, C_out) = sign_core(
|
2022-04-28 17:12:54 -04:00
|
|
|
&mut rng,
|
2022-04-30 04:32:19 -04:00
|
|
|
&self.msg.borrow(),
|
2022-04-28 12:01:20 -04:00
|
|
|
&self.input,
|
2022-04-30 01:43:15 -04:00
|
|
|
&self.image,
|
2022-04-30 04:32:19 -04:00
|
|
|
*self.mask_sum.borrow(),
|
2022-04-23 03:49:30 -04:00
|
|
|
nonce_sum.0,
|
2022-04-29 22:03:34 -04:00
|
|
|
self.AH.0.0
|
2022-04-23 03:49:30 -04:00
|
|
|
);
|
2022-04-28 12:01:20 -04:00
|
|
|
self.interim = Some(ClsagSignInterim { c: c * mu_P, s: c * mu_C * z, clsag, C_out });
|
2022-04-21 21:36:18 -04:00
|
|
|
|
2022-04-28 12:01:20 -04:00
|
|
|
let share = dfg::Scalar(nonce.0 - (c * mu_P * view.secret_share().0));
|
2022-04-21 21:36:18 -04:00
|
|
|
|
|
|
|
|
share
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn verify(
|
|
|
|
|
&self,
|
|
|
|
|
_: dfg::EdwardsPoint,
|
|
|
|
|
_: dfg::EdwardsPoint,
|
|
|
|
|
sum: dfg::Scalar
|
|
|
|
|
) -> Option<Self::Signature> {
|
|
|
|
|
let interim = self.interim.as_ref().unwrap();
|
|
|
|
|
|
|
|
|
|
let mut clsag = interim.clsag.clone();
|
2022-04-28 12:01:20 -04:00
|
|
|
clsag.s[self.input.i] = Key { key: (sum.0 - interim.s).to_bytes() };
|
2022-04-30 04:32:19 -04:00
|
|
|
if verify(&clsag, &self.msg.borrow(), self.image, &self.input.ring, interim.C_out) {
|
2022-04-21 21:36:18 -04:00
|
|
|
return Some((clsag, interim.C_out));
|
|
|
|
|
}
|
|
|
|
|
return None;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn verify_share(
|
|
|
|
|
&self,
|
|
|
|
|
verification_share: dfg::EdwardsPoint,
|
|
|
|
|
nonce: dfg::EdwardsPoint,
|
|
|
|
|
share: dfg::Scalar,
|
|
|
|
|
) -> bool {
|
|
|
|
|
let interim = self.interim.as_ref().unwrap();
|
|
|
|
|
return (&share.0 * &ED25519_BASEPOINT_TABLE) == (
|
2022-04-28 12:01:20 -04:00
|
|
|
nonce.0 - (interim.c * verification_share.0)
|
2022-04-21 21:36:18 -04:00
|
|
|
);
|
|
|
|
|
}
|
|
|
|
|
}
|