Add 3-of-3 MuSig example
This commit is contained in:
		
							parent
							
								
									b61a1a9d98
								
							
						
					
					
						commit
						0ad6b6036f
					
				@ -4,7 +4,9 @@
 | 
				
			|||||||
#include <stdint.h>
 | 
					#include <stdint.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/** This module implements a Schnorr-based multi-signature scheme called MuSig
 | 
					/** This module implements a Schnorr-based multi-signature scheme called MuSig
 | 
				
			||||||
 * (https://eprint.iacr.org/2018/068.pdf).
 | 
					 * (https://eprint.iacr.org/2018/068.pdf). There's an example C source file in the
 | 
				
			||||||
 | 
					 * module's directory (src/modules/musig/example.c) that demonstrates how it can be
 | 
				
			||||||
 | 
					 * used.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/** Data structure containing data related to a signing session resulting in a single
 | 
					/** Data structure containing data related to a signing session resulting in a single
 | 
				
			||||||
 | 
				
			|||||||
@ -1,3 +1,16 @@
 | 
				
			|||||||
include_HEADERS += include/secp256k1_musig.h
 | 
					include_HEADERS += include/secp256k1_musig.h
 | 
				
			||||||
noinst_HEADERS += src/modules/musig/main_impl.h
 | 
					noinst_HEADERS += src/modules/musig/main_impl.h
 | 
				
			||||||
noinst_HEADERS += src/modules/musig/tests_impl.h
 | 
					noinst_HEADERS += src/modules/musig/tests_impl.h
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					noinst_PROGRAMS += example_musig
 | 
				
			||||||
 | 
					example_musig_SOURCES = src/modules/musig/example.c
 | 
				
			||||||
 | 
					example_musig_CPPFLAGS = -DSECP256K1_BUILD -I$(top_srcdir)/include $(SECP_INCLUDES)
 | 
				
			||||||
 | 
					if !ENABLE_COVERAGE
 | 
				
			||||||
 | 
					example_musig_CPPFLAGS += -DVERIFY
 | 
				
			||||||
 | 
					endif
 | 
				
			||||||
 | 
					example_musig_LDADD = libsecp256k1.la $(SECP_LIBS)
 | 
				
			||||||
 | 
					example_musig_LDFLAGS = -static
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					if USE_TESTS
 | 
				
			||||||
 | 
					TESTS += example_musig
 | 
				
			||||||
 | 
					endif
 | 
				
			||||||
 | 
				
			|||||||
							
								
								
									
										165
									
								
								src/modules/musig/example.c
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										165
									
								
								src/modules/musig/example.c
									
									
									
									
									
										Normal file
									
								
							@ -0,0 +1,165 @@
 | 
				
			|||||||
 | 
					/**********************************************************************
 | 
				
			||||||
 | 
					 * Copyright (c) 2018 Jonas Nick                                      *
 | 
				
			||||||
 | 
					 * Distributed under the MIT software license, see the accompanying   *
 | 
				
			||||||
 | 
					 * file COPYING or http://www.opensource.org/licenses/mit-license.php.*
 | 
				
			||||||
 | 
					 **********************************************************************/
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/**
 | 
				
			||||||
 | 
					 * This file demonstrates how to use the MuSig module to create a multisignature.
 | 
				
			||||||
 | 
					 * Additionally, see the documentation in include/secp256k1_musig.h.
 | 
				
			||||||
 | 
					 */
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					#include <stdio.h>
 | 
				
			||||||
 | 
					#include <assert.h>
 | 
				
			||||||
 | 
					#include <secp256k1.h>
 | 
				
			||||||
 | 
					#include <secp256k1_schnorrsig.h>
 | 
				
			||||||
 | 
					#include <secp256k1_musig.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 /* Number of public keys involved in creating the aggregate signature */
 | 
				
			||||||
 | 
					#define N_SIGNERS 3
 | 
				
			||||||
 | 
					 /* Create a key pair and store it in seckey and pubkey */
 | 
				
			||||||
 | 
					int create_key(const secp256k1_context* ctx, unsigned char* seckey, secp256k1_pubkey* pubkey) {
 | 
				
			||||||
 | 
					    int ret;
 | 
				
			||||||
 | 
					    FILE *frand = fopen("/dev/urandom", "r");
 | 
				
			||||||
 | 
					    if (frand == NULL) {
 | 
				
			||||||
 | 
					        return 0;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    do {
 | 
				
			||||||
 | 
					         if(!fread(seckey, 32, 1, frand)) {
 | 
				
			||||||
 | 
					             fclose(frand);
 | 
				
			||||||
 | 
					             return 0;
 | 
				
			||||||
 | 
					         }
 | 
				
			||||||
 | 
					    /* The probability that this not a valid secret key is approximately 2^-128 */
 | 
				
			||||||
 | 
					    } while (!secp256k1_ec_seckey_verify(ctx, seckey));
 | 
				
			||||||
 | 
					    fclose(frand);
 | 
				
			||||||
 | 
					    ret = secp256k1_ec_pubkey_create(ctx, pubkey, seckey);
 | 
				
			||||||
 | 
					    return ret;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					/* Sign a message hash with the given key pairs and store the result in sig */
 | 
				
			||||||
 | 
					int sign(const secp256k1_context* ctx, unsigned char seckeys[][32], const secp256k1_pubkey* pubkeys, const unsigned char* msg32, secp256k1_schnorrsig *sig) {
 | 
				
			||||||
 | 
					    secp256k1_musig_session musig_session[N_SIGNERS];
 | 
				
			||||||
 | 
					    unsigned char nonce_commitment[N_SIGNERS][32];
 | 
				
			||||||
 | 
					    const unsigned char *nonce_commitment_ptr[N_SIGNERS];
 | 
				
			||||||
 | 
					    secp256k1_musig_session_signer_data signer_data[N_SIGNERS][N_SIGNERS];
 | 
				
			||||||
 | 
					    secp256k1_pubkey nonce[N_SIGNERS];
 | 
				
			||||||
 | 
					    int i, j;
 | 
				
			||||||
 | 
					    secp256k1_musig_partial_signature partial_sig[N_SIGNERS];
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    for (i = 0; i < N_SIGNERS; i++) {
 | 
				
			||||||
 | 
					        FILE *frand;
 | 
				
			||||||
 | 
					        unsigned char session_id32[32];
 | 
				
			||||||
 | 
					        unsigned char pk_hash[32];
 | 
				
			||||||
 | 
					        secp256k1_pubkey combined_pk;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					        /* Create combined pubkey and initialize signer data */
 | 
				
			||||||
 | 
					        if (!secp256k1_musig_pubkey_combine(ctx, NULL, &combined_pk, pk_hash, pubkeys, N_SIGNERS)) {
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					        /* Create random session ID. It is absolutely necessary that the session ID
 | 
				
			||||||
 | 
					         * is unique for every call of secp256k1_musig_session_initialize. Otherwise
 | 
				
			||||||
 | 
					         * it's trivial for an attacker to extract the secret key! */
 | 
				
			||||||
 | 
					        frand = fopen("/dev/urandom", "r");
 | 
				
			||||||
 | 
					        if(frand == NULL) {
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					        if (!fread(session_id32, 32, 1, frand)) {
 | 
				
			||||||
 | 
					            fclose(frand);
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					        fclose(frand);
 | 
				
			||||||
 | 
					        /* Initialize session */
 | 
				
			||||||
 | 
					        if (!secp256k1_musig_session_initialize(ctx, &musig_session[i], signer_data[i], nonce_commitment[i], session_id32, msg32, &combined_pk, pk_hash, N_SIGNERS, i, seckeys[i])) {
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					        nonce_commitment_ptr[i] = &nonce_commitment[i][0];
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    /* Communication round 1: Exchange nonce commitments */
 | 
				
			||||||
 | 
					    for (i = 0; i < N_SIGNERS; i++) {
 | 
				
			||||||
 | 
					        /* Set nonce commitments in the signer data and get the own public nonce */
 | 
				
			||||||
 | 
					        if (!secp256k1_musig_session_get_public_nonce(ctx, &musig_session[i], signer_data[i], &nonce[i], nonce_commitment_ptr, N_SIGNERS)) {
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    /* Communication round 2: Exchange nonces */
 | 
				
			||||||
 | 
					    for (i = 0; i < N_SIGNERS; i++) {
 | 
				
			||||||
 | 
					        for (j = 0; j < N_SIGNERS; j++) {
 | 
				
			||||||
 | 
					            if (!secp256k1_musig_set_nonce(ctx, &signer_data[i][j], &nonce[j])) {
 | 
				
			||||||
 | 
					                /* Signer j's nonce does not match the nonce commitment. In this case
 | 
				
			||||||
 | 
					                 * abort the protocol. If you make another attempt at finishing the
 | 
				
			||||||
 | 
					                 * protocol, create a new session (with a fresh session ID!). */
 | 
				
			||||||
 | 
					                return 0;
 | 
				
			||||||
 | 
					            }
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					        if (!secp256k1_musig_session_combine_nonces(ctx, &musig_session[i], signer_data[i], N_SIGNERS, NULL, NULL)) {
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    for (i = 0; i < N_SIGNERS; i++) {
 | 
				
			||||||
 | 
					        if (!secp256k1_musig_partial_sign(ctx, &musig_session[i], &partial_sig[i])) {
 | 
				
			||||||
 | 
					            return 0;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    /* Communication round 3: Exchange partial signatures */
 | 
				
			||||||
 | 
					    for (i = 0; i < N_SIGNERS; i++) {
 | 
				
			||||||
 | 
					        for (j = 0; j < N_SIGNERS; j++) {
 | 
				
			||||||
 | 
					            /* To check whether signing was successful, it suffices to either verify
 | 
				
			||||||
 | 
					             * the the combined signature with the combined public key using
 | 
				
			||||||
 | 
					             * secp256k1_schnorrsig_verify, or verify all partial signatures of all
 | 
				
			||||||
 | 
					             * signers individually. Verifying the combined signature is cheaper but
 | 
				
			||||||
 | 
					             * verifying the individual partial signatures has the advantage that it
 | 
				
			||||||
 | 
					             * can be used to determine which of the partial signatures are invalid
 | 
				
			||||||
 | 
					             * (if any), i.e., which of the partial signatures cause the combined
 | 
				
			||||||
 | 
					             * signature to be invalid and thus the protocol run to fail. It's also
 | 
				
			||||||
 | 
					             * fine to first verify the combined sig, and only verify the individual
 | 
				
			||||||
 | 
					             * sigs if it does not work.
 | 
				
			||||||
 | 
					             */
 | 
				
			||||||
 | 
					            if (!secp256k1_musig_partial_sig_verify(ctx, &musig_session[i], &signer_data[i][j], &partial_sig[j], &pubkeys[j])) {
 | 
				
			||||||
 | 
					                return 0;
 | 
				
			||||||
 | 
					            }
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    return secp256k1_musig_partial_sig_combine(ctx, &musig_session[0], sig, partial_sig, N_SIGNERS);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					 int main(void) {
 | 
				
			||||||
 | 
					    secp256k1_context* ctx;
 | 
				
			||||||
 | 
					    int i;
 | 
				
			||||||
 | 
					    unsigned char seckeys[N_SIGNERS][32];
 | 
				
			||||||
 | 
					    secp256k1_pubkey pubkeys[N_SIGNERS];
 | 
				
			||||||
 | 
					    secp256k1_pubkey combined_pk;
 | 
				
			||||||
 | 
					    unsigned char msg[32] = "this_could_be_the_hash_of_a_msg!";
 | 
				
			||||||
 | 
					    secp256k1_schnorrsig sig;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					    /* Create a context for signing and verification */
 | 
				
			||||||
 | 
					    ctx = secp256k1_context_create(SECP256K1_CONTEXT_SIGN | SECP256K1_CONTEXT_VERIFY);
 | 
				
			||||||
 | 
					    printf("Creating key pairs......");
 | 
				
			||||||
 | 
					    for (i = 0; i < N_SIGNERS; i++) {
 | 
				
			||||||
 | 
					        if (!create_key(ctx, seckeys[i], &pubkeys[i])) {
 | 
				
			||||||
 | 
					            printf("FAILED\n");
 | 
				
			||||||
 | 
					            return 1;
 | 
				
			||||||
 | 
					        }
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    printf("ok\n");
 | 
				
			||||||
 | 
					    printf("Combining public keys...");
 | 
				
			||||||
 | 
					    if (!secp256k1_musig_pubkey_combine(ctx, NULL, &combined_pk, NULL, pubkeys, N_SIGNERS)) {
 | 
				
			||||||
 | 
					        printf("FAILED\n");
 | 
				
			||||||
 | 
					        return 1;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    printf("ok\n");
 | 
				
			||||||
 | 
					    printf("Signing message.........");
 | 
				
			||||||
 | 
					    if (!sign(ctx, seckeys, pubkeys, msg, &sig)) {
 | 
				
			||||||
 | 
					        printf("FAILED\n");
 | 
				
			||||||
 | 
					        return 1;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    printf("ok\n");
 | 
				
			||||||
 | 
					    printf("Verifying signature.....");
 | 
				
			||||||
 | 
					    if (!secp256k1_schnorrsig_verify(ctx, &sig, msg, &combined_pk)) {
 | 
				
			||||||
 | 
					        printf("FAILED\n");
 | 
				
			||||||
 | 
					        return 1;
 | 
				
			||||||
 | 
					    }
 | 
				
			||||||
 | 
					    printf("ok\n");
 | 
				
			||||||
 | 
					    secp256k1_context_destroy(ctx);
 | 
				
			||||||
 | 
					    return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		Loading…
	
	
			
			x
			
			
		
	
		Reference in New Issue
	
	Block a user