mirror of
https://github.com/bitcoin/bitcoin.git
synced 2025-02-02 09:46:52 -05:00
Add CKey::SignSchnorr function for BIP 340/341 signing
This commit is contained in:
parent
e77a2839b5
commit
a91d532338
5 changed files with 85 additions and 0 deletions
21
src/key.cpp
21
src/key.cpp
|
@ -7,10 +7,13 @@
|
|||
|
||||
#include <crypto/common.h>
|
||||
#include <crypto/hmac_sha512.h>
|
||||
#include <hash.h>
|
||||
#include <random.h>
|
||||
|
||||
#include <secp256k1.h>
|
||||
#include <secp256k1_extrakeys.h>
|
||||
#include <secp256k1_recovery.h>
|
||||
#include <secp256k1_schnorrsig.h>
|
||||
|
||||
static secp256k1_context* secp256k1_context_sign = nullptr;
|
||||
|
||||
|
@ -258,6 +261,24 @@ bool CKey::SignCompact(const uint256 &hash, std::vector<unsigned char>& vchSig)
|
|||
return true;
|
||||
}
|
||||
|
||||
bool CKey::SignSchnorr(const uint256& hash, Span<unsigned char> sig, const uint256* merkle_root, const uint256* aux) const
|
||||
{
|
||||
assert(sig.size() == 64);
|
||||
secp256k1_keypair keypair;
|
||||
if (!secp256k1_keypair_create(secp256k1_context_sign, &keypair, begin())) return false;
|
||||
if (merkle_root) {
|
||||
secp256k1_xonly_pubkey pubkey;
|
||||
if (!secp256k1_keypair_xonly_pub(secp256k1_context_sign, &pubkey, nullptr, &keypair)) return false;
|
||||
unsigned char pubkey_bytes[32];
|
||||
if (!secp256k1_xonly_pubkey_serialize(secp256k1_context_sign, pubkey_bytes, &pubkey)) return false;
|
||||
uint256 tweak = XOnlyPubKey(pubkey_bytes).ComputeTapTweakHash(merkle_root->IsNull() ? nullptr : merkle_root);
|
||||
if (!secp256k1_keypair_xonly_tweak_add(GetVerifyContext(), &keypair, tweak.data())) return false;
|
||||
}
|
||||
bool ret = secp256k1_schnorrsig_sign(secp256k1_context_sign, sig.data(), hash.data(), &keypair, secp256k1_nonce_function_bip340, aux ? (void*)aux->data() : nullptr);
|
||||
memory_cleanse(&keypair, sizeof(keypair));
|
||||
return ret;
|
||||
}
|
||||
|
||||
bool CKey::Load(const CPrivKey &seckey, const CPubKey &vchPubKey, bool fSkipCheck=false) {
|
||||
if (!ec_seckey_import_der(secp256k1_context_sign, (unsigned char*)begin(), seckey.data(), seckey.size()))
|
||||
return false;
|
||||
|
|
12
src/key.h
12
src/key.h
|
@ -128,6 +128,18 @@ public:
|
|||
*/
|
||||
bool SignCompact(const uint256& hash, std::vector<unsigned char>& vchSig) const;
|
||||
|
||||
/**
|
||||
* Create a BIP-340 Schnorr signature, for the xonly-pubkey corresponding to *this,
|
||||
* optionally tweaked by *merkle_root. Additional nonce entropy can be provided through
|
||||
* aux.
|
||||
*
|
||||
* When merkle_root is not nullptr, this results in a signature with a modified key as
|
||||
* specified in BIP341:
|
||||
* - If merkle_root->IsNull(): key + H_TapTweak(pubkey)*G
|
||||
* - Otherwise: key + H_TapTweak(pubkey || *merkle_root)
|
||||
*/
|
||||
bool SignSchnorr(const uint256& hash, Span<unsigned char> sig, const uint256* merkle_root = nullptr, const uint256* aux = nullptr) const;
|
||||
|
||||
//! Derive BIP32 child key.
|
||||
bool Derive(CKey& keyChild, ChainCode &ccChild, unsigned int nChild, const ChainCode& cc) const;
|
||||
|
||||
|
|
|
@ -373,3 +373,7 @@ ECCVerifyHandle::~ECCVerifyHandle()
|
|||
secp256k1_context_verify = nullptr;
|
||||
}
|
||||
}
|
||||
|
||||
const secp256k1_context* GetVerifyContext() {
|
||||
return secp256k1_context_verify;
|
||||
}
|
||||
|
|
|
@ -316,4 +316,10 @@ public:
|
|||
~ECCVerifyHandle();
|
||||
};
|
||||
|
||||
typedef struct secp256k1_context_struct secp256k1_context;
|
||||
|
||||
/** Access to the internal secp256k1 context used for verification. Only intended to be used
|
||||
* by key.cpp. */
|
||||
const secp256k1_context* GetVerifyContext();
|
||||
|
||||
#endif // BITCOIN_PUBKEY_H
|
||||
|
|
|
@ -300,6 +300,48 @@ BOOST_AUTO_TEST_CASE(bip340_test_vectors)
|
|||
auto sig = ParseHex(test.first[2]);
|
||||
BOOST_CHECK_EQUAL(XOnlyPubKey(pubkey).VerifySchnorr(uint256(msg), sig), test.second);
|
||||
}
|
||||
|
||||
static const std::vector<std::array<std::string, 5>> SIGN_VECTORS = {
|
||||
{{"0000000000000000000000000000000000000000000000000000000000000003", "F9308A019258C31049344F85F89D5229B531C845836F99B08601F113BCE036F9", "0000000000000000000000000000000000000000000000000000000000000000", "0000000000000000000000000000000000000000000000000000000000000000", "E907831F80848D1069A5371B402410364BDF1C5F8307B0084C55F1CE2DCA821525F66A4A85EA8B71E482A74F382D2CE5EBEEE8FDB2172F477DF4900D310536C0"}},
|
||||
{{"B7E151628AED2A6ABF7158809CF4F3C762E7160F38B4DA56A784D9045190CFEF", "DFF1D77F2A671C5F36183726DB2341BE58FEAE1DA2DECED843240F7B502BA659", "0000000000000000000000000000000000000000000000000000000000000001", "243F6A8885A308D313198A2E03707344A4093822299F31D0082EFA98EC4E6C89", "6896BD60EEAE296DB48A229FF71DFE071BDE413E6D43F917DC8DCF8C78DE33418906D11AC976ABCCB20B091292BFF4EA897EFCB639EA871CFA95F6DE339E4B0A"}},
|
||||
{{"C90FDAA22168C234C4C6628B80DC1CD129024E088A67CC74020BBEA63B14E5C9", "DD308AFEC5777E13121FA72B9CC1B7CC0139715309B086C960E18FD969774EB8", "C87AA53824B4D7AE2EB035A2B5BBBCCC080E76CDC6D1692C4B0B62D798E6D906", "7E2D58D8B3BCDF1ABADEC7829054F90DDA9805AAB56C77333024B9D0A508B75C", "5831AAEED7B44BB74E5EAB94BA9D4294C49BCF2A60728D8B4C200F50DD313C1BAB745879A5AD954A72C45A91C3A51D3C7ADEA98D82F8481E0E1E03674A6F3FB7"}},
|
||||
{{"0B432B2677937381AEF05BB02A66ECD012773062CF3FA2549E44F58ED2401710", "25D1DFF95105F5253C4022F628A996AD3A0D95FBF21D468A1B33F8C160D8F517", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF", "7EB0509757E246F19449885651611CB965ECC1A187DD51B64FDA1EDC9637D5EC97582B9CB13DB3933705B32BA982AF5AF25FD78881EBB32771FC5922EFC66EA3"}},
|
||||
};
|
||||
|
||||
for (const auto& [sec_hex, pub_hex, aux_hex, msg_hex, sig_hex] : SIGN_VECTORS) {
|
||||
auto sec = ParseHex(sec_hex);
|
||||
auto pub = ParseHex(pub_hex);
|
||||
uint256 aux256(ParseHex(aux_hex));
|
||||
uint256 msg256(ParseHex(msg_hex));
|
||||
auto sig = ParseHex(sig_hex);
|
||||
unsigned char sig64[64];
|
||||
|
||||
// Run the untweaked test vectors above, comparing with exact expected signature.
|
||||
CKey key;
|
||||
key.Set(sec.begin(), sec.end(), true);
|
||||
XOnlyPubKey pubkey(key.GetPubKey());
|
||||
BOOST_CHECK(std::equal(pubkey.begin(), pubkey.end(), pub.begin(), pub.end()));
|
||||
bool ok = key.SignSchnorr(msg256, sig64, nullptr, &aux256);
|
||||
BOOST_CHECK(ok);
|
||||
BOOST_CHECK(std::vector<unsigned char>(sig64, sig64 + 64) == sig);
|
||||
// Verify those signatures for good measure.
|
||||
BOOST_CHECK(pubkey.VerifySchnorr(msg256, sig64));
|
||||
|
||||
// Do 10 iterations where we sign with a random Merkle root to tweak,
|
||||
// and compare against the resulting tweaked keys, with random aux.
|
||||
// In iteration i=0 we tweak with empty Merkle tree.
|
||||
for (int i = 0; i < 10; ++i) {
|
||||
uint256 merkle_root;
|
||||
if (i) merkle_root = InsecureRand256();
|
||||
auto tweaked = pubkey.CreateTapTweak(i ? &merkle_root : nullptr);
|
||||
BOOST_CHECK(tweaked);
|
||||
XOnlyPubKey tweaked_key = tweaked->first;
|
||||
aux256 = InsecureRand256();
|
||||
bool ok = key.SignSchnorr(msg256, sig64, &merkle_root, &aux256);
|
||||
BOOST_CHECK(ok);
|
||||
BOOST_CHECK(tweaked_key.VerifySchnorr(msg256, sig64));
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
BOOST_AUTO_TEST_SUITE_END()
|
||||
|
|
Loading…
Add table
Reference in a new issue