|
|
|
@ -4,9 +4,11 @@ import binascii
|
|
|
|
|
import ed25519raw
|
|
|
|
|
import pyblake2
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def hex(by):
|
|
|
|
|
return str(binascii.hexlify(by), 'ascii')
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def combine_keys(pks):
|
|
|
|
|
combine = None
|
|
|
|
|
for pk in pks:
|
|
|
|
@ -17,6 +19,7 @@ def combine_keys(pks):
|
|
|
|
|
combine = ed25519raw.edwards(combine, P)
|
|
|
|
|
return ed25519raw.encodepoint(combine)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def combine_sig(R, sigs):
|
|
|
|
|
s = 0
|
|
|
|
|
for si in sigs:
|
|
|
|
@ -25,12 +28,14 @@ def combine_sig(R, sigs):
|
|
|
|
|
sig = R + ed25519raw.encodeint(s)
|
|
|
|
|
return sig
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def binom(n, k):
|
|
|
|
|
b = 1
|
|
|
|
|
for i in range(1, k+1):
|
|
|
|
|
for i in range(1, k + 1):
|
|
|
|
|
b = b * (n - k + i) // i
|
|
|
|
|
return b
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def compute_mask(combination, m, n):
|
|
|
|
|
result = 0
|
|
|
|
|
signer = 0
|
|
|
|
@ -47,6 +52,7 @@ def compute_mask(combination, m, n):
|
|
|
|
|
signer = signer + 1
|
|
|
|
|
return result
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def createPubkey():
|
|
|
|
|
print('Enter randomness: ', end='')
|
|
|
|
|
seckey = ed25519raw.H(input().encode('utf-8'))[0:32]
|
|
|
|
@ -54,38 +60,41 @@ def createPubkey():
|
|
|
|
|
print('Secret Key: %s' % hex(seckey))
|
|
|
|
|
print('Public Key: %s' % hex(pubkey))
|
|
|
|
|
|
|
|
|
|
def combinePubkeys(m,n):
|
|
|
|
|
if binom(n,m) > 100:
|
|
|
|
|
|
|
|
|
|
def combinePubkeys(m, n):
|
|
|
|
|
if binom(n, m) > 100:
|
|
|
|
|
raise Exception("Too many keys")
|
|
|
|
|
pks = []
|
|
|
|
|
for i in range(0, n):
|
|
|
|
|
print('Enter pubkey %d: ' %i, end='')
|
|
|
|
|
print('Enter pubkey %d: ' % i, end='')
|
|
|
|
|
pk = binascii.unhexlify(input())
|
|
|
|
|
# remove 00 prefix if present
|
|
|
|
|
if len(pk) == 33:
|
|
|
|
|
pk = pk[1:]
|
|
|
|
|
pks.append(ed25519raw.decodepoint(pk))
|
|
|
|
|
for i in range(0, binom(n,m)):
|
|
|
|
|
for i in range(0, binom(n, m)):
|
|
|
|
|
mask = compute_mask(i, m, n)
|
|
|
|
|
sum = None
|
|
|
|
|
for j in range(0, n):
|
|
|
|
|
if mask & (1<<j) != 0:
|
|
|
|
|
if mask & (1 << j) != 0:
|
|
|
|
|
if sum == None:
|
|
|
|
|
sum = pks[j]
|
|
|
|
|
else:
|
|
|
|
|
sum = ed25519raw.edwards(sum, pks[j])
|
|
|
|
|
pk = ed25519raw.encodepoint(sum)
|
|
|
|
|
print ('Key %02x: %s' % (mask, hex(pk)))
|
|
|
|
|
print('Key %02x: %s' % (mask, hex(pk)))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def get_nonce(sk,data,ctr):
|
|
|
|
|
def get_nonce(sk, data, ctr):
|
|
|
|
|
h = ed25519raw.H(sk)
|
|
|
|
|
b = ed25519raw.b
|
|
|
|
|
a = 2**(b-2) + sum(2**i * ed25519raw.bit(h,i) for i in range(3,b-2))
|
|
|
|
|
r = ed25519raw.Hint(bytes([h[i] for i in range(b>>3,b>>2)]) + data +
|
|
|
|
|
a = 2**(b - 2) + sum(2**i * ed25519raw.bit(h, i) for i in range(3, b - 2))
|
|
|
|
|
r = ed25519raw.Hint(bytes([h[i] for i in range(b >> 3, b >> 2)]) + data +
|
|
|
|
|
binascii.unhexlify("%08x" % ctr))
|
|
|
|
|
R = ed25519raw.scalarmult(ed25519raw.B,r)
|
|
|
|
|
R = ed25519raw.scalarmult(ed25519raw.B, r)
|
|
|
|
|
return (r, ed25519raw.encodepoint(R))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def phase1(data):
|
|
|
|
|
digest = pyblake2.blake2s(data).digest()
|
|
|
|
|
print('Digest: %s' % hex(digest))
|
|
|
|
@ -96,6 +105,7 @@ def phase1(data):
|
|
|
|
|
(_, R) = get_nonce(seckey, digest, ctr)
|
|
|
|
|
print('Local commit: %s' % hex(R))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def combinePhase1(m):
|
|
|
|
|
commits = []
|
|
|
|
|
for i in range(0, m):
|
|
|
|
@ -103,6 +113,7 @@ def combinePhase1(m):
|
|
|
|
|
commits.append(binascii.unhexlify(input()))
|
|
|
|
|
print('Global commit: %s' % hex(combine_keys(commits)))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def phase2(data):
|
|
|
|
|
digest = pyblake2.blake2s(data).digest()
|
|
|
|
|
print('Digest: %s' % hex(digest))
|
|
|
|
@ -118,11 +129,12 @@ def phase2(data):
|
|
|
|
|
(r, Ri) = get_nonce(seckey, digest, ctr)
|
|
|
|
|
h = ed25519raw.H(seckey)
|
|
|
|
|
b = ed25519raw.b
|
|
|
|
|
a = 2**(b-2) + sum(2**i * ed25519raw.bit(h,i) for i in range(3,b-2))
|
|
|
|
|
a = 2**(b - 2) + sum(2**i * ed25519raw.bit(h, i) for i in range(3, b - 2))
|
|
|
|
|
S = (r + ed25519raw.Hint(R + pk + digest) * a) % ed25519raw.l
|
|
|
|
|
print('Local commit: %s' % hex(Ri))
|
|
|
|
|
print('Local sig: %s' % hex(ed25519raw.encodeint(S)))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def combinePhase2(m):
|
|
|
|
|
sigs = []
|
|
|
|
|
print('Enter global commit: ', end='')
|
|
|
|
@ -133,6 +145,7 @@ def combinePhase2(m):
|
|
|
|
|
sig = combine_sig(R, sigs)
|
|
|
|
|
print('Combined sig: %s' % hex(sig))
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def checkSignature(data):
|
|
|
|
|
digest = pyblake2.blake2s(data).digest()
|
|
|
|
|
print('Digest: %s' % hex(digest))
|
|
|
|
@ -143,6 +156,7 @@ def checkSignature(data):
|
|
|
|
|
ed25519raw.checkvalid(sig, digest, pubkey)
|
|
|
|
|
print('Valid Signature!')
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def usage():
|
|
|
|
|
print('Usage: keyctl phase options')
|
|
|
|
|
print('Phases:')
|
|
|
|
@ -154,6 +168,7 @@ def usage():
|
|
|
|
|
print(' keyctl combine_ph2 m: combine signatures')
|
|
|
|
|
print(' keyctl check_sig file.bin: check signature')
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def main():
|
|
|
|
|
if len(sys.argv) < 2:
|
|
|
|
|
usage()
|
|
|
|
@ -164,7 +179,7 @@ def main():
|
|
|
|
|
elif func == 'combine_pub':
|
|
|
|
|
m = int(sys.argv[2])
|
|
|
|
|
n = int(sys.argv[3])
|
|
|
|
|
combinePubkeys(m,n)
|
|
|
|
|
combinePubkeys(m, n)
|
|
|
|
|
elif func == 'ph1':
|
|
|
|
|
filename = sys.argv[2]
|
|
|
|
|
data = open(filename, 'rb').read()
|
|
|
|
@ -186,10 +201,11 @@ def main():
|
|
|
|
|
else:
|
|
|
|
|
usage()
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
def test():
|
|
|
|
|
data = sys.argv[1].encode('utf-8')
|
|
|
|
|
N = 5
|
|
|
|
|
keyset = [1,3,4]
|
|
|
|
|
keyset = [1, 3, 4]
|
|
|
|
|
|
|
|
|
|
digest = pyblake2.blake2s(data).digest()
|
|
|
|
|
print('Digest: %s' % hex(digest))
|
|
|
|
@ -199,8 +215,8 @@ def test():
|
|
|
|
|
commits = []
|
|
|
|
|
sigs = []
|
|
|
|
|
for i in range(0, N):
|
|
|
|
|
print('----- Key %d ------' % (i+1))
|
|
|
|
|
seckey = ed25519raw.H(("key%d"%(i+1)).encode('utf-8'))[0:32]
|
|
|
|
|
print('----- Key %d ------' % (i + 1))
|
|
|
|
|
seckey = ed25519raw.H(("key%d" % (i + 1)).encode('utf-8'))[0:32]
|
|
|
|
|
pubkey = ed25519raw.publickey(seckey)
|
|
|
|
|
print('Secret Key: %s' % hex(seckey))
|
|
|
|
|
print('Public Key: %s' % hex(pubkey))
|
|
|
|
@ -216,26 +232,27 @@ def test():
|
|
|
|
|
globalPk = combine_keys([pks[i] for i in keyset])
|
|
|
|
|
globalR = combine_keys([commits[i] for i in keyset])
|
|
|
|
|
print('-----------------')
|
|
|
|
|
print('Global pubkey: %s' %hex(globalPk))
|
|
|
|
|
print('Global commit: %s' %hex(globalR))
|
|
|
|
|
print('Global pubkey: %s' % hex(globalPk))
|
|
|
|
|
print('Global commit: %s' % hex(globalR))
|
|
|
|
|
print('-----------------')
|
|
|
|
|
|
|
|
|
|
for i in range(0,5):
|
|
|
|
|
for i in range(0, 5):
|
|
|
|
|
seckey = sks[i]
|
|
|
|
|
pubkey = pks[i]
|
|
|
|
|
r = nonces[i]
|
|
|
|
|
R = commits[i]
|
|
|
|
|
h = ed25519raw.H(seckey)
|
|
|
|
|
b = ed25519raw.b
|
|
|
|
|
a = 2**(b-2) + sum(2**i * ed25519raw.bit(h,i) for i in range(3,b-2))
|
|
|
|
|
a = 2**(b - 2) + sum(2**i * ed25519raw.bit(h, i)
|
|
|
|
|
for i in range(3, b - 2))
|
|
|
|
|
S = (r + ed25519raw.Hint(globalR + globalPk + digest) * a) % ed25519raw.l
|
|
|
|
|
print('Local sig %d: %s' % (i+1, hex(ed25519raw.encodeint(S))))
|
|
|
|
|
print('Local sig %d: %s' % (i + 1, hex(ed25519raw.encodeint(S))))
|
|
|
|
|
commits.append(R)
|
|
|
|
|
sigs.append(ed25519raw.encodeint(S))
|
|
|
|
|
|
|
|
|
|
print('-----------------')
|
|
|
|
|
sig = combine_sig(globalR, [sigs[i] for i in [1,3,4]])
|
|
|
|
|
print('Global sig: %s' %hex(sig))
|
|
|
|
|
sig = combine_sig(globalR, [sigs[i] for i in [1, 3, 4]])
|
|
|
|
|
print('Global sig: %s' % hex(sig))
|
|
|
|
|
ed25519raw.checkvalid(sig, digest, globalPk)
|
|
|
|
|
print('Valid Signature!')
|
|
|
|
|
|
|
|
|
|