sonr/pkg/crypto/ted25519/frost/participant.go
Prad Nukala 89989fa102
feature/1114 implement account interface (#1167)
- **refactor: move session-related code to middleware package**
- **refactor: update PKL build process and adjust related
configurations**
- **feat: integrate base.cosmos.v1 Genesis module**
- **refactor: pass session context to modal rendering functions**
- **refactor: move nebula package to app directory and update templ
version**
- **refactor: Move home section video view to dedicated directory**
- **refactor: remove unused views file**
- **refactor: move styles and UI components to global scope**
- **refactor: Rename images.go to cdn.go**
- **feat: Add Empty State Illustrations**
- **refactor: Consolidate Vault Index Logic**
- **fix: References to App.wasm and remove Vault Directory embedded CDN
files**
- **refactor: Move CDN types to Models**
- **fix: Correct line numbers in templ error messages for
arch_templ.go**
- **refactor: use common types for peer roles**
- **refactor: move common types and ORM to a shared package**
- **fix: Config import dwn**
- **refactor: move nebula directory to app**
- **feat: Rebuild nebula**
- **fix: correct file paths in panels templates**
- **feat: Remove duplicate types**
- **refactor: Move dwn to pkg/core**
- **refactor: Binary Structure**
- **feat: Introduce Crypto Pkg**
- **fix: Broken Process Start**
- **feat: Update pkg/* structure**
- **feat: Refactor PKL Structure**
- **build: update pkl build process**
- **chore: Remove Empty Files**
- **refactor: remove unused macaroon package**
- **feat: Add WebAwesome Components**
- **refactor: consolidate build and generation tasks into a single
taskfile, remove redundant makefile targets**
- **refactor: refactor server and move components to pkg/core/dwn**
- **build: update go modules**
- **refactor: move gateway logic into dedicated hway command**
- **feat: Add KSS (Krawczyk-Song-Song) MPC cryptography module**
- **feat: Implement MPC-based JWT signing and UCAN token generation**
- **feat: add support for MPC-based JWT signing**
- **feat: Implement MPC-based UCAN capabilities for smart accounts**
- **feat: add address field to keyshareSource**
- **feat: Add comprehensive MPC test suite for keyshares, UCAN tokens,
and token attenuations**
- **refactor: improve MPC keyshare management and signing process**
- **feat: enhance MPC capability hierarchy documentation**
- **refactor: rename GenerateKeyshares function to NewKeyshareSource for
clarity**
- **refactor: remove unused Ethereum address computation**
- **feat: Add HasHandle and IsAuthenticated methods to HTTPContext**
- **refactor: Add context.Context support to session HTTPContext**
- **refactor: Resolve context interface conflicts in HTTPContext**
- **feat: Add session ID context key and helper functions**
- **feat: Update WebApp Page Rendering**
- **refactor: Simplify context management by using single HTTPContext
key**
- **refactor: Simplify HTTPContext creation and context management in
session middleware**
- **refactor: refactor session middleware to use a single data
structure**
- **refactor: Simplify HTTPContext implementation and session data
handling**
- **refactor: Improve session context handling and prevent nil pointer
errors**
- **refactor: Improve session context handling with nil safety and type
support**
- **refactor: improve session data injection**
- **feat: add full-screen modal component and update registration flow**
- **chore: add .air.toml to .gitignore**
- **feat: add Air to devbox and update dependencies**
2024-11-23 01:28:58 -05:00

84 lines
2.8 KiB
Go
Executable File

//
// Copyright Coinbase, Inc. All Rights Reserved.
//
// SPDX-License-Identifier: Apache-2.0
//
// Package frost is an implementation of t-of-n threshold signature of https://eprint.iacr.org/2020/852.pdf
package frost
import (
"fmt"
"github.com/onsonr/sonr/pkg/crypto/core/curves"
"github.com/onsonr/sonr/pkg/crypto/dkg/frost"
"github.com/onsonr/sonr/pkg/crypto/internal"
)
// Signer is a tSchnorr player performing the signing operation.
type Signer struct {
skShare curves.Scalar // secret signing share for this signer
vkShare curves.Point // store verification key share
verificationKey curves.Point // verification key
id uint32 // The ID assigned to this signer's shamir share
threshold uint32
curve *curves.Curve
round uint
lCoeffs map[uint32]curves.Scalar // lCoeffs are Lagrange coefficients of each cosigner.
cosigners []uint32
state *state // Accumulated intermediate values associated with signing
challengeDeriver ChallengeDerive
}
type state struct {
// Round 1
capD, capE curves.Point // capD, capE are commitments this signer generates in signing round 1
smallD, smallE curves.Scalar // smallD, smallE are scalars this signer generates in signing round 1
// Round 2
commitments map[uint32]*Round1Bcast // Store commitments broadcast after signing round 1
msg []byte
c curves.Scalar
capRs map[uint32]curves.Point
sumR curves.Point
}
// NewSigner create a signer from a dkg participant
// Note that we can pre-assign Lagrange coefficients lcoeffs of each cosigner. This optimizes performance.
// See paragraph 3 of section 3 in the draft - https://tools.ietf.org/pdf/draft-komlo-frost-00.pdf
func NewSigner(info *frost.DkgParticipant, id, thresh uint32, lcoeffs map[uint32]curves.Scalar, cosigners []uint32, challengeDeriver ChallengeDerive) (*Signer, error) {
if info == nil || len(cosigners) == 0 || len(lcoeffs) == 0 {
return nil, internal.ErrNilArguments
}
if thresh > uint32(len(cosigners)) {
return nil, fmt.Errorf("threshold is higher than number of signers")
}
if len(lcoeffs) != len(cosigners) {
return nil, fmt.Errorf("expected coefficients to be equal to number of cosigners")
}
// Check if cosigners and lcoeffs contain the same IDs
for i := 0; i < len(cosigners); i++ {
id := cosigners[i]
if _, ok := lcoeffs[id]; !ok {
return nil, fmt.Errorf("lcoeffs and cosigners have inconsistent ID")
}
}
return &Signer{
skShare: info.SkShare,
vkShare: info.VkShare,
verificationKey: info.VerificationKey,
id: id,
threshold: thresh,
curve: info.Curve,
round: 1,
lCoeffs: lcoeffs,
cosigners: cosigners,
state: &state{},
challengeDeriver: challengeDeriver,
}, nil
}