sonr/crypto/tecdsa/dklsv1/protocol_test.go

420 lines
14 KiB
Go
Raw Normal View History

feature/1114 implement account interface (#1167) - **refactor: move session-related code to middleware package** - **refactor: update PKL build process and adjust related configurations** - **feat: integrate base.cosmos.v1 Genesis module** - **refactor: pass session context to modal rendering functions** - **refactor: move nebula package to app directory and update templ version** - **refactor: Move home section video view to dedicated directory** - **refactor: remove unused views file** - **refactor: move styles and UI components to global scope** - **refactor: Rename images.go to cdn.go** - **feat: Add Empty State Illustrations** - **refactor: Consolidate Vault Index Logic** - **fix: References to App.wasm and remove Vault Directory embedded CDN files** - **refactor: Move CDN types to Models** - **fix: Correct line numbers in templ error messages for arch_templ.go** - **refactor: use common types for peer roles** - **refactor: move common types and ORM to a shared package** - **fix: Config import dwn** - **refactor: move nebula directory to app** - **feat: Rebuild nebula** - **fix: correct file paths in panels templates** - **feat: Remove duplicate types** - **refactor: Move dwn to pkg/core** - **refactor: Binary Structure** - **feat: Introduce Crypto Pkg** - **fix: Broken Process Start** - **feat: Update pkg/* structure** - **feat: Refactor PKL Structure** - **build: update pkl build process** - **chore: Remove Empty Files** - **refactor: remove unused macaroon package** - **feat: Add WebAwesome Components** - **refactor: consolidate build and generation tasks into a single taskfile, remove redundant makefile targets** - **refactor: refactor server and move components to pkg/core/dwn** - **build: update go modules** - **refactor: move gateway logic into dedicated hway command** - **feat: Add KSS (Krawczyk-Song-Song) MPC cryptography module** - **feat: Implement MPC-based JWT signing and UCAN token generation** - **feat: add support for MPC-based JWT signing** - **feat: Implement MPC-based UCAN capabilities for smart accounts** - **feat: add address field to keyshareSource** - **feat: Add comprehensive MPC test suite for keyshares, UCAN tokens, and token attenuations** - **refactor: improve MPC keyshare management and signing process** - **feat: enhance MPC capability hierarchy documentation** - **refactor: rename GenerateKeyshares function to NewKeyshareSource for clarity** - **refactor: remove unused Ethereum address computation** - **feat: Add HasHandle and IsAuthenticated methods to HTTPContext** - **refactor: Add context.Context support to session HTTPContext** - **refactor: Resolve context interface conflicts in HTTPContext** - **feat: Add session ID context key and helper functions** - **feat: Update WebApp Page Rendering** - **refactor: Simplify context management by using single HTTPContext key** - **refactor: Simplify HTTPContext creation and context management in session middleware** - **refactor: refactor session middleware to use a single data structure** - **refactor: Simplify HTTPContext implementation and session data handling** - **refactor: Improve session context handling and prevent nil pointer errors** - **refactor: Improve session context handling with nil safety and type support** - **refactor: improve session data injection** - **feat: add full-screen modal component and update registration flow** - **chore: add .air.toml to .gitignore** - **feat: add Air to devbox and update dependencies**
2024-11-23 01:28:58 -05:00
//
// Copyright Coinbase, Inc. All Rights Reserved.
//
// SPDX-License-Identifier: Apache-2.0
//
package dklsv1
import (
"math/big"
"testing"
"github.com/stretchr/testify/require"
"golang.org/x/crypto/sha3"
feature/1121 implement ucan validation (#1176) - **refactor: remove unused auth components** - **refactor: improve devbox configuration and deployment process** - **refactor: improve devnet and testnet setup** - **fix: update templ version to v0.2.778** - **refactor: rename pkl/net.matrix to pkl/matrix.net** - **refactor: migrate webapp components to nebula** - **refactor: protobuf types** - **chore: update dependencies for improved security and stability** - **feat: implement landing page and vault gateway servers** - **refactor: Migrate data models to new module structure and update related files** - **feature/1121-implement-ucan-validation** - **refactor: Replace hardcoded constants with model types in attns.go** - **feature/1121-implement-ucan-validation** - **chore: add origin Host struct and update main function to handle multiple hosts** - **build: remove unused static files from dwn module** - **build: remove unused static files from dwn module** - **refactor: Move DWN models to common package** - **refactor: move models to pkg/common** - **refactor: move vault web app assets to embed module** - **refactor: update session middleware import path** - **chore: configure port labels and auto-forwarding behavior** - **feat: enhance devcontainer configuration** - **feat: Add UCAN middleware for Echo with flexible token validation** - **feat: add JWT middleware for UCAN authentication** - **refactor: update package URI and versioning in PklProject files** - **fix: correct sonr.pkl import path** - **refactor: move JWT related code to auth package** - **feat: introduce vault configuration retrieval and management** - **refactor: Move vault components to gateway module and update file paths** - **refactor: remove Dexie and SQLite database implementations** - **feat: enhance frontend with PWA features and WASM integration** - **feat: add Devbox features and streamline Dockerfile** - **chore: update dependencies to include TigerBeetle** - **chore(deps): update go version to 1.23** - **feat: enhance devnet setup with PATH environment variable and updated PWA manifest** - **fix: upgrade tigerbeetle-go dependency and remove indirect dependency** - **feat: add PostgreSQL support to devnet and testnet deployments** - **refactor: rename keyshare cookie to token cookie** - **feat: upgrade Go version to 1.23.3 and update dependencies** - **refactor: update devnet and testnet configurations** - **feat: add IPFS configuration for devnet** - **I'll help you update the ipfs.config.pkl to include all the peers from the shell script. Here's the updated configuration:** - **refactor: move mpc package to crypto directory** - **feat: add BIP32 support for various cryptocurrencies** - **feat: enhance ATN.pkl with additional capabilities** - **refactor: simplify smart account and vault attenuation creation** - **feat: add new capabilities to the Attenuation type** - **refactor: Rename MPC files for clarity and consistency** - **feat: add DIDKey support for cryptographic operations** - **feat: add devnet and testnet deployment configurations** - **fix: correct key derivation in bip32 package** - **refactor: rename crypto/bip32 package to crypto/accaddr** - **fix: remove duplicate indirect dependency** - **refactor: move vault package to root directory** - **refactor: update routes for gateway and vault** - **refactor: remove obsolete web configuration file** - **refactor: remove unused TigerBeetle imports and update host configuration** - **refactor: adjust styles directory path** - **feat: add broadcastTx and simulateTx functions to gateway** - **feat: add PinVault handler**
2024-12-02 14:27:18 -05:00
"github.com/onsonr/sonr/crypto/core/curves"
"github.com/onsonr/sonr/crypto/core/protocol"
"github.com/onsonr/sonr/crypto/ot/extension/kos"
"github.com/onsonr/sonr/crypto/tecdsa/dklsv1/dkg"
feature/1114 implement account interface (#1167) - **refactor: move session-related code to middleware package** - **refactor: update PKL build process and adjust related configurations** - **feat: integrate base.cosmos.v1 Genesis module** - **refactor: pass session context to modal rendering functions** - **refactor: move nebula package to app directory and update templ version** - **refactor: Move home section video view to dedicated directory** - **refactor: remove unused views file** - **refactor: move styles and UI components to global scope** - **refactor: Rename images.go to cdn.go** - **feat: Add Empty State Illustrations** - **refactor: Consolidate Vault Index Logic** - **fix: References to App.wasm and remove Vault Directory embedded CDN files** - **refactor: Move CDN types to Models** - **fix: Correct line numbers in templ error messages for arch_templ.go** - **refactor: use common types for peer roles** - **refactor: move common types and ORM to a shared package** - **fix: Config import dwn** - **refactor: move nebula directory to app** - **feat: Rebuild nebula** - **fix: correct file paths in panels templates** - **feat: Remove duplicate types** - **refactor: Move dwn to pkg/core** - **refactor: Binary Structure** - **feat: Introduce Crypto Pkg** - **fix: Broken Process Start** - **feat: Update pkg/* structure** - **feat: Refactor PKL Structure** - **build: update pkl build process** - **chore: Remove Empty Files** - **refactor: remove unused macaroon package** - **feat: Add WebAwesome Components** - **refactor: consolidate build and generation tasks into a single taskfile, remove redundant makefile targets** - **refactor: refactor server and move components to pkg/core/dwn** - **build: update go modules** - **refactor: move gateway logic into dedicated hway command** - **feat: Add KSS (Krawczyk-Song-Song) MPC cryptography module** - **feat: Implement MPC-based JWT signing and UCAN token generation** - **feat: add support for MPC-based JWT signing** - **feat: Implement MPC-based UCAN capabilities for smart accounts** - **feat: add address field to keyshareSource** - **feat: Add comprehensive MPC test suite for keyshares, UCAN tokens, and token attenuations** - **refactor: improve MPC keyshare management and signing process** - **feat: enhance MPC capability hierarchy documentation** - **refactor: rename GenerateKeyshares function to NewKeyshareSource for clarity** - **refactor: remove unused Ethereum address computation** - **feat: Add HasHandle and IsAuthenticated methods to HTTPContext** - **refactor: Add context.Context support to session HTTPContext** - **refactor: Resolve context interface conflicts in HTTPContext** - **feat: Add session ID context key and helper functions** - **feat: Update WebApp Page Rendering** - **refactor: Simplify context management by using single HTTPContext key** - **refactor: Simplify HTTPContext creation and context management in session middleware** - **refactor: refactor session middleware to use a single data structure** - **refactor: Simplify HTTPContext implementation and session data handling** - **refactor: Improve session context handling and prevent nil pointer errors** - **refactor: Improve session context handling with nil safety and type support** - **refactor: improve session data injection** - **feat: add full-screen modal component and update registration flow** - **chore: add .air.toml to .gitignore** - **feat: add Air to devbox and update dependencies**
2024-11-23 01:28:58 -05:00
)
// For DKG bob starts first. For refresh and sign, Alice starts first.
func runIteratedProtocol(firstParty protocol.Iterator, secondParty protocol.Iterator) (error, error) {
var (
message *protocol.Message
aErr error
bErr error
)
for aErr != protocol.ErrProtocolFinished || bErr != protocol.ErrProtocolFinished {
// Crank each protocol forward one iteration
message, bErr = firstParty.Next(message)
if bErr != nil && bErr != protocol.ErrProtocolFinished {
return nil, bErr
}
message, aErr = secondParty.Next(message)
if aErr != nil && aErr != protocol.ErrProtocolFinished {
return aErr, nil
}
}
return aErr, bErr
}
// Running steps in sequence ensures that no hidden read/write dependency exist in the read/write interfaces.
func TestDkgProto(t *testing.T) {
curveInstances := []*curves.Curve{
curves.K256(),
curves.P256(),
}
for _, curve := range curveInstances {
alice := NewAliceDkg(curve, protocol.Version1)
bob := NewBobDkg(curve, protocol.Version1)
aErr, bErr := runIteratedProtocol(bob, alice)
t.Run("both alice/bob complete simultaneously", func(t *testing.T) {
require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
})
for i := 0; i < kos.Kappa; i++ {
if alice.Alice.Output().SeedOtResult.OneTimePadDecryptionKey[i] != bob.Bob.Output().SeedOtResult.OneTimePadEncryptionKeys[i][alice.Alice.Output().SeedOtResult.RandomChoiceBits[i]] {
t.Errorf("oblivious transfer is incorrect at index i=%v", i)
}
}
t.Run("Both parties produces identical composite pubkey", func(t *testing.T) {
require.True(t, alice.Alice.Output().PublicKey.Equal(bob.Bob.Output().PublicKey))
})
var aliceResult *dkg.AliceOutput
var bobResult *dkg.BobOutput
t.Run("alice produces valid result", func(t *testing.T) {
// Get the result
r, err := alice.Result(protocol.Version1)
// Test
require.NoError(t, err)
require.NotNil(t, r)
aliceResult, err = DecodeAliceDkgResult(r)
require.NoError(t, err)
})
t.Run("bob produces valid result", func(t *testing.T) {
// Get the result
r, err := bob.Result(protocol.Version1)
// Test
require.NoError(t, err)
require.NotNil(t, r)
bobResult, err = DecodeBobDkgResult(r)
require.NoError(t, err)
})
t.Run("alice/bob agree on pubkey", func(t *testing.T) {
require.Equal(t, aliceResult.PublicKey, bobResult.PublicKey)
})
}
}
//
// // DKG > Refresh > Sign
// func TestRefreshProto(t *testing.T) {
// t.Parallel()
// curveInstances := []*curves.Curve{
// curves.K256(),
// curves.P256(),
// }
// for _, curve := range curveInstances {
// boundCurve := curve
// t.Run(fmt.Sprintf("testing refresh for curve %s", boundCurve.Name), func(tt *testing.T) {
// tt.Parallel()
// // DKG
// aliceDkg := NewAliceDkg(boundCurve, protocol.Version1)
// bobDkg := NewBobDkg(boundCurve, protocol.Version1)
//
// aDkgErr, bDkgErr := runIteratedProtocol(bobDkg, aliceDkg)
// require.ErrorIs(tt, aDkgErr, protocol.ErrProtocolFinished)
// require.ErrorIs(tt, bDkgErr, protocol.ErrProtocolFinished)
//
// aliceDkgResultMessage, err := aliceDkg.Result(protocol.Version1)
// require.NoError(tt, err)
// bobDkgResultMessage, err := bobDkg.Result(protocol.Version1)
// require.NoError(tt, err)
//
// // Refresh
// aliceRefreshResultMessage, bobRefreshResultMessage := refreshV1(t, boundCurve, aliceDkgResultMessage, bobDkgResultMessage)
//
// // sign
// signV1(t, boundCurve, aliceRefreshResultMessage, bobRefreshResultMessage)
// })
// }
// }
// DKG > Output > NewDklsSign > Sign > Output
func TestDkgSignProto(t *testing.T) {
// Setup
curve := curves.K256()
aliceDkg := NewAliceDkg(curve, protocol.Version1)
bobDkg := NewBobDkg(curve, protocol.Version1)
// DKG
aErr, bErr := runIteratedProtocol(bobDkg, aliceDkg)
require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
// Output
aliceDkgResultMessage, err := aliceDkg.Result(protocol.Version1)
require.NoError(t, err)
bobDkgResultMessage, err := bobDkg.Result(protocol.Version1)
require.NoError(t, err)
// New DklsSign
msg := []byte("As soon as you trust yourself, you will know how to live.")
aliceSign, err := NewAliceSign(curve, sha3.New256(), msg, aliceDkgResultMessage, protocol.Version1)
require.NoError(t, err)
bobSign, err := NewBobSign(curve, sha3.New256(), msg, bobDkgResultMessage, protocol.Version1)
require.NoError(t, err)
// Sign
t.Run("sign", func(t *testing.T) {
aErr, bErr = runIteratedProtocol(aliceSign, bobSign)
require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
})
// Don't continue to verifying results if sign didn't run to completion.
require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
// Output
var result *curves.EcdsaSignature
t.Run("bob produces result of correct type", func(t *testing.T) {
resultMessage, err := bobSign.Result(protocol.Version1)
require.NoError(t, err)
result, err = DecodeSignature(resultMessage)
require.NoError(t, err)
})
require.NotNil(t, result)
t.Run("valid signature", func(t *testing.T) {
hash := sha3.New256()
_, err = hash.Write(msg)
require.NoError(t, err)
digest := hash.Sum(nil)
unCompressedAffinePublicKey := aliceDkg.Output().PublicKey.ToAffineUncompressed()
require.Equal(t, 65, len(unCompressedAffinePublicKey))
x := new(big.Int).SetBytes(unCompressedAffinePublicKey[1:33])
y := new(big.Int).SetBytes(unCompressedAffinePublicKey[33:])
ecCurve, err := curve.ToEllipticCurve()
require.NoError(t, err)
publicKey := &curves.EcPoint{
Curve: ecCurve,
X: x,
Y: y,
}
require.True(t,
curves.VerifyEcdsa(publicKey,
digest[:],
result,
),
"signature failed verification",
)
})
}
//
// // Decode > NewDklsSign > Sign > Output
// // NOTE: this cold-start test ensures backwards compatibility with durable,
// // encoding DKG state that may exist within production systems like test
// // Breaking changes must consider downstream production impacts.
// func TestSignColdStart(t *testing.T) {
// // Decode alice/bob state from file
// aliceDkg, err := os.ReadFile("testdata/alice-dkls-v1-dkg.bin")
// require.NoError(t, err)
// bobDkg, err := os.ReadFile("testdata/bob-dkls-v1-dkg.bin")
// require.NoError(t, err)
//
// // The choice of json marshaling is arbitrary, the binary could have been marshaled in other forms as well
// // The purpose here is to obtain an instance of `protocol.Message`
//
// aliceDkgMessage := &protocol.Message{}
// err = json.Unmarshal(aliceDkg, aliceDkgMessage)
// require.NoError(t, err)
//
// bobDkgMessage := &protocol.Message{}
// err = json.Unmarshal(bobDkg, bobDkgMessage)
// require.NoError(t, err)
//
// signV1(t, curves.K256(), aliceDkgMessage, bobDkgMessage)
// }
//
// func TestEncodeDecode(t *testing.T) {
// curve := curves.K256()
//
// alice := NewAliceDkg(curve, protocol.Version1)
// bob := NewBobDkg(curve, protocol.Version1)
// _, _ = runIteratedProtocol(bob, alice)
//
// var aliceBytes []byte
// var bobBytes []byte
// t.Run("Encode Alice/Bob", func(t *testing.T) {
// aliceDkgMessage, err := EncodeAliceDkgOutput(alice.Alice.Output(), protocol.Version1)
// require.NoError(t, err)
// aliceBytes, err = json.Marshal(aliceDkgMessage)
// require.NoError(t, err)
//
// bobDkgMessage, err := EncodeBobDkgOutput(bob.Bob.Output(), protocol.Version1)
// require.NoError(t, err)
// bobBytes, err = json.Marshal(bobDkgMessage)
// require.NoError(t, err)
// })
// require.NotEmpty(t, aliceBytes)
// require.NotEmpty(t, bobBytes)
//
// t.Run("Decode Alice", func(t *testing.T) {
// decodedAliceMessage := &protocol.Message{}
// err := json.Unmarshal(aliceBytes, decodedAliceMessage)
// require.NoError(t, err)
// require.NotNil(t, decodedAliceMessage)
// decodedAlice, err := DecodeAliceDkgResult(decodedAliceMessage)
// require.NoError(t, err)
//
// require.True(t, alice.Output().PublicKey.Equal(decodedAlice.PublicKey))
// require.Equal(t, alice.Output().SecretKeyShare, decodedAlice.SecretKeyShare)
// })
//
// t.Run("Decode Bob", func(t *testing.T) {
// decodedBobMessage := &protocol.Message{}
// err := json.Unmarshal(bobBytes, decodedBobMessage)
// require.NoError(t, err)
// require.NotNil(t, decodedBobMessage)
// decodedBob, err := DecodeBobDkgResult(decodedBobMessage)
// require.NoError(t, err)
//
// require.True(t, bob.Output().PublicKey.Equal(decodedBob.PublicKey))
// require.Equal(t, bob.Output().SecretKeyShare, decodedBob.SecretKeyShare)
// })
// }
//
// func signV1(t *testing.T, curve *curves.Curve, aliceDkgResultMessage *protocol.Message, bobDkgResultMessage *protocol.Message) {
// t.Helper()
// // New DklsSign
// msg := []byte("As soon as you trust yourself, you will know how to live.")
// aliceSign, err := NewAliceSign(curve, sha3.New256(), msg, aliceDkgResultMessage, protocol.Version1)
// require.NoError(t, err)
// bobSign, err := NewBobSign(curve, sha3.New256(), msg, bobDkgResultMessage, protocol.Version1)
// require.NoError(t, err)
//
// // Sign
// var aErr error
// var bErr error
// t.Run("sign", func(t *testing.T) {
// aErr, bErr = runIteratedProtocol(aliceSign, bobSign)
// require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
// require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
// })
// // Don't continue to verifying results if sign didn't run to completion.
// require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
// require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
//
// // Output
// var result *curves.EcdsaSignature
// t.Run("bob produces result of correct type", func(t *testing.T) {
// resultMessage, err := bobSign.Result(protocol.Version1)
// require.NoError(t, err)
// result, err = DecodeSignature(resultMessage)
// require.NoError(t, err)
// })
// require.NotNil(t, result)
//
// aliceDkg, err := DecodeAliceDkgResult(aliceDkgResultMessage)
// require.NoError(t, err)
//
// t.Run("valid signature", func(t *testing.T) {
// hash := sha3.New256()
// _, err = hash.Write(msg)
// require.NoError(t, err)
// digest := hash.Sum(nil)
// unCompressedAffinePublicKey := aliceDkg.PublicKey.ToAffineUncompressed()
// require.Equal(t, 65, len(unCompressedAffinePublicKey))
// x := new(big.Int).SetBytes(unCompressedAffinePublicKey[1:33])
// y := new(big.Int).SetBytes(unCompressedAffinePublicKey[33:])
// ecCurve, err := curve.ToEllipticCurve()
// require.NoError(t, err)
// publicKey := &curves.EcPoint{
// Curve: ecCurve,
// X: x,
// Y: y,
// }
// require.True(t,
// curves.VerifyEcdsa(publicKey,
// digest[:],
// result,
// ),
// "signature failed verification",
// )
// })
// }
//
// func refreshV1(t *testing.T, curve *curves.Curve, aliceDkgResultMessage, bobDkgResultMessage *protocol.Message) (aliceRefreshResultMessage, bobRefreshResultMessage *protocol.Message) {
// t.Helper()
// aliceRefresh, err := NewAliceRefresh(curve, aliceDkgResultMessage, protocol.Version1)
// require.NoError(t, err)
// bobRefresh, err := NewBobRefresh(curve, bobDkgResultMessage, protocol.Version1)
// require.NoError(t, err)
//
// aErr, bErr := runIteratedProtocol(aliceRefresh, bobRefresh)
// require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
// require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
//
// aliceRefreshResultMessage, err = aliceRefresh.Result(protocol.Version1)
// require.NoError(t, err)
// require.NotNil(t, aliceRefreshResultMessage)
// _, err = DecodeAliceRefreshResult(aliceRefreshResultMessage)
// require.NoError(t, err)
//
// bobRefreshResultMessage, err = bobRefresh.Result(protocol.Version1)
// require.NoError(t, err)
// require.NotNil(t, bobRefreshResultMessage)
// _, err = DecodeBobRefreshResult(bobRefreshResultMessage)
// require.NoError(t, err)
//
// return aliceRefreshResultMessage, bobRefreshResultMessage
// }
//
// func BenchmarkDKGProto(b *testing.B) {
// curveInstances := []*curves.Curve{
// curves.K256(),
// curves.P256(),
// }
// for _, curve := range curveInstances {
// alice := NewAliceDkg(curve, protocol.Version1)
// bob := NewBobDkg(curve, protocol.Version1)
// aErr, bErr := runIteratedProtocol(bob, alice)
//
// b.Run("both alice/bob complete simultaneously", func(t *testing.B) {
// require.ErrorIs(t, aErr, protocol.ErrProtocolFinished)
// require.ErrorIs(t, bErr, protocol.ErrProtocolFinished)
// })
//
// for i := 0; i < kos.Kappa; i++ {
// if alice.Alice.Output().SeedOtResult.OneTimePadDecryptionKey[i] != bob.Bob.Output().SeedOtResult.OneTimePadEncryptionKeys[i][alice.Alice.Output().SeedOtResult.RandomChoiceBits[i]] {
// b.Errorf("oblivious transfer is incorrect at index i=%v", i)
// }
// }
//
// b.Run("Both parties produces identical composite pubkey", func(t *testing.B) {
// require.True(t, alice.Alice.Output().PublicKey.Equal(bob.Bob.Output().PublicKey))
// })
//
// var aliceResult *dkg.AliceOutput
// var bobResult *dkg.BobOutput
// b.Run("alice produces valid result", func(t *testing.B) {
// // Get the result
// r, err := alice.Result(protocol.Version1)
//
// // Test
// require.NoError(t, err)
// require.NotNil(t, r)
// aliceResult, err = DecodeAliceDkgResult(r)
// require.NoError(t, err)
// })
// b.Run("bob produces valid result", func(t *testing.B) {
// // Get the result
// r, err := bob.Result(protocol.Version1)
//
// // Test
// require.NoError(t, err)
// require.NotNil(t, r)
// bobResult, err = DecodeBobDkgResult(r)
// require.NoError(t, err)
// })
//
// b.Run("alice/bob agree on pubkey", func(t *testing.B) {
// require.Equal(t, aliceResult.PublicKey, bobResult.PublicKey)
// })
// }
// }