158 lines
3.7 KiB
Go
Raw Normal View History

feature/1114 implement account interface (#1167) - **refactor: move session-related code to middleware package** - **refactor: update PKL build process and adjust related configurations** - **feat: integrate base.cosmos.v1 Genesis module** - **refactor: pass session context to modal rendering functions** - **refactor: move nebula package to app directory and update templ version** - **refactor: Move home section video view to dedicated directory** - **refactor: remove unused views file** - **refactor: move styles and UI components to global scope** - **refactor: Rename images.go to cdn.go** - **feat: Add Empty State Illustrations** - **refactor: Consolidate Vault Index Logic** - **fix: References to App.wasm and remove Vault Directory embedded CDN files** - **refactor: Move CDN types to Models** - **fix: Correct line numbers in templ error messages for arch_templ.go** - **refactor: use common types for peer roles** - **refactor: move common types and ORM to a shared package** - **fix: Config import dwn** - **refactor: move nebula directory to app** - **feat: Rebuild nebula** - **fix: correct file paths in panels templates** - **feat: Remove duplicate types** - **refactor: Move dwn to pkg/core** - **refactor: Binary Structure** - **feat: Introduce Crypto Pkg** - **fix: Broken Process Start** - **feat: Update pkg/* structure** - **feat: Refactor PKL Structure** - **build: update pkl build process** - **chore: Remove Empty Files** - **refactor: remove unused macaroon package** - **feat: Add WebAwesome Components** - **refactor: consolidate build and generation tasks into a single taskfile, remove redundant makefile targets** - **refactor: refactor server and move components to pkg/core/dwn** - **build: update go modules** - **refactor: move gateway logic into dedicated hway command** - **feat: Add KSS (Krawczyk-Song-Song) MPC cryptography module** - **feat: Implement MPC-based JWT signing and UCAN token generation** - **feat: add support for MPC-based JWT signing** - **feat: Implement MPC-based UCAN capabilities for smart accounts** - **feat: add address field to keyshareSource** - **feat: Add comprehensive MPC test suite for keyshares, UCAN tokens, and token attenuations** - **refactor: improve MPC keyshare management and signing process** - **feat: enhance MPC capability hierarchy documentation** - **refactor: rename GenerateKeyshares function to NewKeyshareSource for clarity** - **refactor: remove unused Ethereum address computation** - **feat: Add HasHandle and IsAuthenticated methods to HTTPContext** - **refactor: Add context.Context support to session HTTPContext** - **refactor: Resolve context interface conflicts in HTTPContext** - **feat: Add session ID context key and helper functions** - **feat: Update WebApp Page Rendering** - **refactor: Simplify context management by using single HTTPContext key** - **refactor: Simplify HTTPContext creation and context management in session middleware** - **refactor: refactor session middleware to use a single data structure** - **refactor: Simplify HTTPContext implementation and session data handling** - **refactor: Improve session context handling and prevent nil pointer errors** - **refactor: Improve session context handling with nil safety and type support** - **refactor: improve session data injection** - **feat: add full-screen modal component and update registration flow** - **chore: add .air.toml to .gitignore** - **feat: add Air to devbox and update dependencies**
2024-11-23 01:28:58 -05:00
//
// Copyright Coinbase, Inc. All Rights Reserved.
//
// SPDX-License-Identifier: Apache-2.0
//
package frost
import (
"fmt"
"github.com/onsonr/sonr/crypto/core/curves"
"github.com/onsonr/sonr/crypto/internal"
feature/1114 implement account interface (#1167) - **refactor: move session-related code to middleware package** - **refactor: update PKL build process and adjust related configurations** - **feat: integrate base.cosmos.v1 Genesis module** - **refactor: pass session context to modal rendering functions** - **refactor: move nebula package to app directory and update templ version** - **refactor: Move home section video view to dedicated directory** - **refactor: remove unused views file** - **refactor: move styles and UI components to global scope** - **refactor: Rename images.go to cdn.go** - **feat: Add Empty State Illustrations** - **refactor: Consolidate Vault Index Logic** - **fix: References to App.wasm and remove Vault Directory embedded CDN files** - **refactor: Move CDN types to Models** - **fix: Correct line numbers in templ error messages for arch_templ.go** - **refactor: use common types for peer roles** - **refactor: move common types and ORM to a shared package** - **fix: Config import dwn** - **refactor: move nebula directory to app** - **feat: Rebuild nebula** - **fix: correct file paths in panels templates** - **feat: Remove duplicate types** - **refactor: Move dwn to pkg/core** - **refactor: Binary Structure** - **feat: Introduce Crypto Pkg** - **fix: Broken Process Start** - **feat: Update pkg/* structure** - **feat: Refactor PKL Structure** - **build: update pkl build process** - **chore: Remove Empty Files** - **refactor: remove unused macaroon package** - **feat: Add WebAwesome Components** - **refactor: consolidate build and generation tasks into a single taskfile, remove redundant makefile targets** - **refactor: refactor server and move components to pkg/core/dwn** - **build: update go modules** - **refactor: move gateway logic into dedicated hway command** - **feat: Add KSS (Krawczyk-Song-Song) MPC cryptography module** - **feat: Implement MPC-based JWT signing and UCAN token generation** - **feat: add support for MPC-based JWT signing** - **feat: Implement MPC-based UCAN capabilities for smart accounts** - **feat: add address field to keyshareSource** - **feat: Add comprehensive MPC test suite for keyshares, UCAN tokens, and token attenuations** - **refactor: improve MPC keyshare management and signing process** - **feat: enhance MPC capability hierarchy documentation** - **refactor: rename GenerateKeyshares function to NewKeyshareSource for clarity** - **refactor: remove unused Ethereum address computation** - **feat: Add HasHandle and IsAuthenticated methods to HTTPContext** - **refactor: Add context.Context support to session HTTPContext** - **refactor: Resolve context interface conflicts in HTTPContext** - **feat: Add session ID context key and helper functions** - **feat: Update WebApp Page Rendering** - **refactor: Simplify context management by using single HTTPContext key** - **refactor: Simplify HTTPContext creation and context management in session middleware** - **refactor: refactor session middleware to use a single data structure** - **refactor: Simplify HTTPContext implementation and session data handling** - **refactor: Improve session context handling and prevent nil pointer errors** - **refactor: Improve session context handling with nil safety and type support** - **refactor: improve session data injection** - **feat: add full-screen modal component and update registration flow** - **chore: add .air.toml to .gitignore** - **feat: add Air to devbox and update dependencies**
2024-11-23 01:28:58 -05:00
)
// Round3Bcast contains the output of FROST signature, i.e., it contains FROST signature (z,c) and the
// corresponding message msg.
type Round3Bcast struct {
R curves.Point
Z, C curves.Scalar
msg []byte
}
// Define frost signature type
type Signature struct {
Z curves.Scalar
C curves.Scalar
}
func (signer *Signer) SignRound3(round3Input map[uint32]*Round2Bcast) (*Round3Bcast, error) {
// Make sure signer is not empty
if signer == nil || signer.curve == nil {
return nil, internal.ErrNilArguments
}
// Make sure signer's smallD and smallE are zero
if !signer.state.smallD.IsZero() || !signer.state.smallE.IsZero() {
return nil, fmt.Errorf("signer's private smallD and smallE should be zero since one-time use")
}
// Make sure the signer has had the msg
if len(signer.state.msg) == 0 {
return nil, internal.ErrNilArguments
}
// Validate Round3Input
if round3Input == nil {
return nil, internal.ErrNilArguments
}
for _, data := range round3Input {
if data == nil {
return nil, internal.ErrNilArguments
}
}
// Make sure the signer has commitments stored at the end of round 1.
if signer.state.commitments == nil || len(signer.state.commitments) != len(round3Input) {
return nil, internal.ErrNilArguments
}
// Make sure the round number is correct
if signer.round != 3 {
return nil, internal.ErrInvalidRound
}
// Round2 Input has different length of threshold
if uint32(len(round3Input)) != signer.threshold {
return nil, fmt.Errorf("invalid length of round3Input")
}
// Step 1-3
// Step 1: For j in [1...t]
z := signer.curve.NewScalar()
negate := signer.state.sumR.IsNegative()
for id, data := range round3Input {
zj := data.Zi
vkj := data.Vki
// Step 2: Verify zj*G = Rj + c*Lj*vkj
// zj*G
zjG := signer.curve.ScalarBaseMult(zj)
// c*Lj
cLj := signer.state.c.Mul(signer.lCoeffs[id])
// cLjvkj
cLjvkj := vkj.Mul(cLj)
// Rj + c*Lj*vkj
Rj := signer.state.capRs[id]
if negate {
Rj = Rj.Neg()
}
right := cLjvkj.Add(Rj)
// Check equation
if !zjG.Equal(right) {
return nil, fmt.Errorf("zjG != right with participant id %d\n", id)
}
// Step 3 - z = z+zj
z = z.Add(zj)
}
// Step 4 - 7: Self verify the signature (z, c)
// Step 5 - R' = z*G + (-c)*vk
zG := signer.curve.ScalarBaseMult(z)
cvk := signer.verificationKey.Mul(signer.state.c.Neg())
tempR := zG.Add(cvk)
// Step 6 - c' = H(m, R')
tempC, err := signer.challengeDeriver.DeriveChallenge(signer.state.msg, signer.verificationKey, tempR)
if err != nil {
return nil, err
}
// Step 7 - Check c = c'
if tempC.Cmp(signer.state.c) != 0 {
return nil, fmt.Errorf("invalid signature: c != c'")
}
// Updating round number
signer.round = 4
// Step 8 - Broadcast signature and message
return &Round3Bcast{
signer.state.sumR,
z,
signer.state.c,
signer.state.msg,
}, nil
}
// Method to verify a frost signature.
func Verify(curve *curves.Curve, challengeDeriver ChallengeDerive, vk curves.Point, msg []byte, signature *Signature) (bool, error) {
if vk == nil || msg == nil || len(msg) == 0 || signature.C == nil || signature.Z == nil {
return false, fmt.Errorf("invalid input")
}
z := signature.Z
c := signature.C
// R' = z*G - c*vk
zG := curve.ScalarBaseMult(z)
cvk := vk.Mul(c.Neg())
tempR := zG.Add(cvk)
// c' = H(m, R')
tempC, err := challengeDeriver.DeriveChallenge(msg, vk, tempR)
if err != nil {
return false, err
}
// Check c == c'
if tempC.Cmp(c) != 0 {
return false, fmt.Errorf("invalid signature: c != c'")
}
return true, nil
}