Prad Nukala 807b2e86ec
feature/1220 origin handle exists method (#1241)
* feat: add docs and CI workflow for publishing to onsonr.dev

* (refactor): Move hway,motr executables to their own repos

* feat: simplify devnet and testnet configurations

* refactor: update import path for didcrypto package

* docs(networks): Add README with project overview, architecture, and community links

* refactor: Move network configurations to deploy directory

* build: update golang version to 1.23

* refactor: move logger interface to appropriate package

* refactor: Move devnet configuration to networks/devnet

* chore: improve release process with date variable

* (chore): Move Crypto Library

* refactor: improve code structure and readability in DID module

* feat: integrate Trunk CI checks

* ci: optimize CI workflow by removing redundant build jobs

---------

Co-authored-by: Darp Alakun <i@prad.nu>
2025-01-06 17:06:10 +00:00

84 lines
3.2 KiB
Go
Executable File

//
// Copyright Coinbase, Inc. All Rights Reserved.
//
// SPDX-License-Identifier: Apache-2.0
//
// Package dealer implements key generation via a trusted dealer for the protocol [DKLs18](https://eprint.iacr.org/2018/499.pdf).
// The trusted dealer produces the same output as the corresponding DKG protocol and can be used for signing without
// additional modifications.
// Note that running actual DKG is ALWAYS recommended over a trusted dealer.
package dealer
import (
"crypto/rand"
"github.com/pkg/errors"
"github.com/onsonr/sonr/crypto/core/curves"
"github.com/onsonr/sonr/crypto/ot/base/simplest"
"github.com/onsonr/sonr/crypto/ot/extension/kos"
"github.com/onsonr/sonr/crypto/tecdsa/dklsv1/dkg"
)
// GenerateAndDeal produces private key material for alice and bob which they can later use in signing.
// Running actual DKG is ALWAYS recommended over using this function, as this function breaks the security guarantees of DKG.
// only use this function if you have a very good reason to.
func GenerateAndDeal(curve *curves.Curve) (*dkg.AliceOutput, *dkg.BobOutput, error) {
aliceSecretShare, bobSecretShare, publicKey := produceKeyShares(curve)
aliceOTOutput, bobOTOutput, err := produceOTResults(curve)
if err != nil {
return nil, nil, errors.Wrap(err, "couldn't produce OT results")
}
alice := &dkg.AliceOutput{
PublicKey: publicKey,
SecretKeyShare: aliceSecretShare,
SeedOtResult: aliceOTOutput,
}
bob := &dkg.BobOutput{
PublicKey: publicKey,
SecretKeyShare: bobSecretShare,
SeedOtResult: bobOTOutput,
}
return alice, bob, nil
}
func produceKeyShares(curve *curves.Curve) (aliceSecretShare curves.Scalar, bobSecretShare curves.Scalar, publicKey curves.Point) {
aliceSecretShare = curve.Scalar.Random(rand.Reader)
bobSecretShare = curve.Scalar.Random(rand.Reader)
publicKey = curve.ScalarBaseMult(aliceSecretShare.Mul(bobSecretShare))
return aliceSecretShare, bobSecretShare, publicKey
}
func produceOTResults(curve *curves.Curve) (*simplest.ReceiverOutput, *simplest.SenderOutput, error) {
oneTimePadEncryptionKeys := make([]simplest.OneTimePadEncryptionKeys, kos.Kappa)
oneTimePadDecryptionKey := make([]simplest.OneTimePadDecryptionKey, kos.Kappa)
// we'll need a receiver because in its constructor random bits will be selected.
receiver, err := simplest.NewReceiver(curve, kos.Kappa, [simplest.DigestSize]byte{})
if err != nil {
return nil, nil, errors.Wrap(err, "couldn't initialize a receiver")
}
packedRandomChoiceBits, randomChoiceBits := receiver.Output.PackedRandomChoiceBits, receiver.Output.RandomChoiceBits
for i := 0; i < kos.Kappa; i++ {
if _, err := rand.Read(oneTimePadEncryptionKeys[i][0][:]); err != nil {
return nil, nil, errors.WithStack(err)
}
if _, err := rand.Read(oneTimePadEncryptionKeys[i][1][:]); err != nil {
return nil, nil, errors.WithStack(err)
}
oneTimePadDecryptionKey[i] = oneTimePadEncryptionKeys[i][randomChoiceBits[i]]
}
senderOutput := &simplest.SenderOutput{
OneTimePadEncryptionKeys: oneTimePadEncryptionKeys,
}
receiverOutput := &simplest.ReceiverOutput{
PackedRandomChoiceBits: packedRandomChoiceBits,
RandomChoiceBits: randomChoiceBits,
OneTimePadDecryptionKey: oneTimePadDecryptionKey,
}
return receiverOutput, senderOutput, nil
}