mirror of
https://github.com/codex-storage/constantine.git
synced 2025-02-04 15:03:36 +00:00
Tests for the eth2 BLS signature protocol (BLS12-381, pubkeys G1, signatures G2) using low-level primitives (#164)
This commit is contained in:
parent
0bc228126a
commit
979d183657
@ -161,6 +161,10 @@ const testDesc: seq[tuple[path: string, useGMP: bool]] = @[
|
||||
# Prime order fields
|
||||
# ----------------------------------------------------------
|
||||
("tests/t_fr.nim", false),
|
||||
|
||||
# Protocols
|
||||
# ----------------------------------------------------------
|
||||
("tests/t_sig_bls_lowlevel.nim", false),
|
||||
]
|
||||
|
||||
# For temporary (hopefully) investigation that can only be reproduced in CI
|
||||
@ -178,7 +182,8 @@ const skipSanitizers = [
|
||||
"tests/t_ec_sage_bls12_377.nim",
|
||||
"tests/t_ec_sage_bls12_381.nim",
|
||||
"tests/t_hash_to_field.nim",
|
||||
"tests/t_hash_to_curve.nim"
|
||||
"tests/t_hash_to_curve.nim",
|
||||
"tests/t_sig_bls_lowlevel.nim"
|
||||
]
|
||||
|
||||
when defined(windows):
|
||||
|
155
tests/t_sig_bls_lowlevel.nim
Normal file
155
tests/t_sig_bls_lowlevel.nim
Normal file
@ -0,0 +1,155 @@
|
||||
# Constantine
|
||||
# Copyright (c) 2018-2019 Status Research & Development GmbH
|
||||
# Copyright (c) 2020-Present Mamy André-Ratsimbazafy
|
||||
# Licensed and distributed under either of
|
||||
# * MIT license (license terms in the root directory or at http://opensource.org/licenses/MIT).
|
||||
# * Apache v2 license (license terms in the root directory or at http://www.apache.org/licenses/LICENSE-2.0).
|
||||
# at your option. This file may not be copied, modified, or distributed except according to those terms.
|
||||
|
||||
import
|
||||
# Standard library
|
||||
std/[os, times],
|
||||
# Internals
|
||||
../constantine/config/common,
|
||||
../constantine/[
|
||||
arithmetic, primitives,
|
||||
towers, ec_shortweierstrass,
|
||||
hashes
|
||||
],
|
||||
../constantine/elliptic/ec_scalar_mul,
|
||||
../constantine/io/[io_fields, io_towers, io_ec],
|
||||
../constantine/config/curves,
|
||||
../constantine/hash_to_curve/[hash_to_curve, cofactors],
|
||||
../constantine/pairing/pairing_bls12,
|
||||
# Test utilities
|
||||
../helpers/prng_unsafe
|
||||
|
||||
# Testing implementation of BLS signature scheme
|
||||
# with low-level primitives
|
||||
# ----------------------------------------------
|
||||
|
||||
var rng: RngState
|
||||
let timeseed = uint32(toUnix(getTime()) and (1'i64 shl 32 - 1)) # unixTime mod 2^32
|
||||
seed(rng, timeseed)
|
||||
echo "\n------------------------------------------------------\n"
|
||||
echo "test_sig_bls xoshiro512** seed: ", timeseed
|
||||
|
||||
# Generators
|
||||
# -------------------------------------------------------------
|
||||
# https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-pairing-friendly-curves-10#section-4.2.1
|
||||
#
|
||||
const BLS12_381_G1_generator_x = Fp[BLS12_381].fromHex(
|
||||
"0x17f1d3a73197d7942695638c4fa9ac0fc3688c4f9774b905a14e3a3f171bac58" &
|
||||
"6c55e83ff97a1aeffb3af00adb22c6bb"
|
||||
)
|
||||
|
||||
const BLS12_381_G1_generator_y = Fp[BLS12_381].fromHex(
|
||||
"0x08b3f481e3aaa0f1a09e30ed741d8ae4fcf5e095d5d00af600db18cb2c04b3ed" &
|
||||
"d03cc744a2888ae40caa232946c5e7e1"
|
||||
)
|
||||
|
||||
const BLS12_381_G2_generator_x = Fp2[BLS12_381].fromHex(
|
||||
"0x024aa2b2f08f0a91260805272dc51051c6e47ad4fa403b02b4510b647ae3d177" &
|
||||
"0bac0326a805bbefd48056c8c121bdb8",
|
||||
"0x13e02b6052719f607dacd3a088274f65596bd0d09920b61ab5da61bbdc7f5049" &
|
||||
"334cf11213945d57e5ac7d055d042b7e"
|
||||
)
|
||||
|
||||
const BLS12_381_G2_generator_y = Fp2[BLS12_381].fromHex(
|
||||
"0x0ce5d527727d6e118cc9cdc6da2e351aadfd9baa8cbdd3a76d429a695160d12c" &
|
||||
"923ac9cc3baca289e193548608b82801",
|
||||
"0x0606c4a02ea734cc32acd2b02bc28b99cb3e287e85a763af267492ab572e99ab" &
|
||||
"3f370d275cec1da1aaa9075ff05f79be"
|
||||
)
|
||||
|
||||
const BLS12_381_G1_generator = ECP_ShortW_Aff[Fp[BLS12_381], NotOnTwist](
|
||||
x: BLS12_381_G1_generator_x, y: BLS12_381_G1_generator_y
|
||||
)
|
||||
const BLS12_381_G2_generator = ECP_ShortW_Aff[Fp2[BLS12_381], OnTwist](
|
||||
x: BLS12_381_G2_generator_x, y: BLS12_381_G2_generator_y
|
||||
)
|
||||
|
||||
# We test using the pubkey on G1, signature on G2 scheme.
|
||||
# with SHA256 hash and proof-of-possession. (Ethereum 2 config).
|
||||
const DomainSepTag = "BLS_SIG_BLS12381G2_XMD:SHA-256_SSWU_RO_POP_"
|
||||
|
||||
func genSecretKey(rng: var RngState, seckey: var Fr[BLS12_381]) =
|
||||
# Don't do this at home!
|
||||
seckey = rng.random_unsafe(Fr[BLS12_381])
|
||||
while seckey.isZero().bool:
|
||||
seckey = rng.random_unsafe(Fr[BLS12_381])
|
||||
|
||||
func publicKeyG1(
|
||||
pubkey: var ECP_ShortW_Aff[Fp[BLS12_381], NotOnTwist],
|
||||
seckey: Fr[BLS12_381]
|
||||
) =
|
||||
var t: ECP_ShortW_Prj[Fp[BLS12_381], NotOnTwist]
|
||||
t.projectiveFromAffine(BLS12_381_G1_generator)
|
||||
t.scalarMul(seckey.toBig())
|
||||
pubkey.affineFromprojective(t)
|
||||
doAssert not bool pubkey.isInf()
|
||||
|
||||
func signG2[T: byte|char](
|
||||
signature: var ECP_ShortW_Aff[Fp2[BLS12_381], OnTwist],
|
||||
message: openarray[T],
|
||||
secretKey: Fr[BLS12_381]
|
||||
) =
|
||||
doAssert not bool secretKey.isZero()
|
||||
var t: ECP_ShortW_Prj[Fp2[BLS12_381], OnTwist]
|
||||
hashToCurve(
|
||||
H = sha256, k = 128,
|
||||
output = t,
|
||||
augmentation = "",
|
||||
message = message,
|
||||
domainSepTag = DomainSepTag
|
||||
)
|
||||
t.scalarMul(secretKey.toBig())
|
||||
signature.affineFromprojective(t)
|
||||
doAssert not bool signature.isInf()
|
||||
|
||||
func verifyG2[T: byte|char](
|
||||
pubkey: ECP_ShortW_Aff[Fp[BLS12_381], NotOnTwist],
|
||||
message: openarray[T],
|
||||
signature: ECP_ShortW_Aff[Fp2[BLS12_381], OnTwist]
|
||||
): SecretBool =
|
||||
doAssert not pubkey.isInf.bool
|
||||
doAssert not signature.isInf.bool
|
||||
|
||||
var Q {.noinit.}: typeof(signature)
|
||||
var Qprj {.noInit.}: ECP_ShortW_Prj[Fp2[BLS12_381], OnTwist]
|
||||
hashToCurve(
|
||||
H = sha256, k = 128,
|
||||
output = Qprj,
|
||||
augmentation = "",
|
||||
message = message,
|
||||
domainSepTag = DomainSepTag
|
||||
)
|
||||
Q.affineFromprojective(Qprj)
|
||||
|
||||
var e0{.noInit.}, e1{.noInit.}: Fp12[BLS12_381]
|
||||
e0.pairing_bls12(pubkey, Q)
|
||||
e1.pairing_bls12(BLS12_381_G1_generator, signature)
|
||||
|
||||
return e0 == e1
|
||||
|
||||
proc bls_signature_test(rng: var RngState, i: int) =
|
||||
var
|
||||
seckey: Fr[BLS12_381]
|
||||
pubkey: ECP_ShortW_Aff[Fp[BLS12_381], NotOnTwist]
|
||||
message = rng.random_byte_seq(length = i)
|
||||
signature: ECP_ShortW_Aff[Fp2[BLS12_381], OnTwist]
|
||||
|
||||
rng.genSecretKey(seckey)
|
||||
pubkey.publicKeyG1(seckey)
|
||||
signature.signG2(message, seckey)
|
||||
|
||||
let ok = pubkey.verifyG2(message, signature)
|
||||
doAssert bool ok
|
||||
|
||||
for i in 0 ..< 500:
|
||||
rng.bls_signature_test(i)
|
||||
stdout.write('.')
|
||||
stdout.flushFile()
|
||||
stdout.write('\n')
|
||||
|
||||
echo "SUCCESS - BLS Signature scheme on BLS12_381, pubkey on G1, signatures on G2"
|
Loading…
x
Reference in New Issue
Block a user