@aztec/bb.js 0.85.0-nightly.20250416 → 0.85.0-nightly.20250418

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (48) hide show
  1. package/dest/browser/barretenberg/backend.d.ts +5 -6
  2. package/dest/browser/barretenberg/backend.d.ts.map +1 -1
  3. package/dest/browser/barretenberg-threads.js +1 -1
  4. package/dest/browser/barretenberg.js +1 -1
  5. package/dest/browser/barretenberg_api/index.d.ts +15 -27
  6. package/dest/browser/barretenberg_api/index.d.ts.map +1 -1
  7. package/dest/browser/index.js +2149 -198
  8. package/dest/node/barretenberg/backend.d.ts +5 -6
  9. package/dest/node/barretenberg/backend.d.ts.map +1 -1
  10. package/dest/node/barretenberg/backend.js +49 -10
  11. package/dest/node/barretenberg_api/index.d.ts +15 -27
  12. package/dest/node/barretenberg_api/index.d.ts.map +1 -1
  13. package/dest/node/barretenberg_api/index.js +93 -194
  14. package/dest/node/barretenberg_wasm/barretenberg-threads.wasm.gz +0 -0
  15. package/dest/node/bindgen/mappings.d.ts.map +1 -1
  16. package/dest/node/bindgen/mappings.js +2 -1
  17. package/dest/node/bindgen/typescript.d.ts.map +1 -1
  18. package/dest/node/bindgen/typescript.js +3 -2
  19. package/dest/node/main.d.ts +0 -1
  20. package/dest/node/main.d.ts.map +1 -1
  21. package/dest/node/main.js +1 -35
  22. package/dest/node-cjs/barretenberg/backend.d.ts +5 -6
  23. package/dest/node-cjs/barretenberg/backend.d.ts.map +1 -1
  24. package/dest/node-cjs/barretenberg/backend.js +49 -10
  25. package/dest/node-cjs/barretenberg_api/index.d.ts +15 -27
  26. package/dest/node-cjs/barretenberg_api/index.d.ts.map +1 -1
  27. package/dest/node-cjs/barretenberg_api/index.js +92 -193
  28. package/dest/node-cjs/barretenberg_wasm/barretenberg-threads.wasm.gz +0 -0
  29. package/dest/node-cjs/bindgen/mappings.d.ts.map +1 -1
  30. package/dest/node-cjs/bindgen/mappings.js +2 -1
  31. package/dest/node-cjs/bindgen/typescript.d.ts.map +1 -1
  32. package/dest/node-cjs/bindgen/typescript.js +3 -2
  33. package/dest/node-cjs/main.d.ts +0 -1
  34. package/dest/node-cjs/main.d.ts.map +1 -1
  35. package/dest/node-cjs/main.js +2 -37
  36. package/package.json +2 -2
  37. package/src/barretenberg/backend.ts +64 -11
  38. package/src/barretenberg_api/index.ts +152 -355
  39. package/src/bindgen/mappings.ts +1 -0
  40. package/src/bindgen/typescript.ts +2 -1
  41. package/src/main.ts +0 -39
  42. package/dest/node/barretenberg/schnorr.test.d.ts +0 -2
  43. package/dest/node/barretenberg/schnorr.test.d.ts.map +0 -1
  44. package/dest/node/barretenberg/schnorr.test.js +0 -113
  45. package/dest/node-cjs/barretenberg/schnorr.test.d.ts +0 -2
  46. package/dest/node-cjs/barretenberg/schnorr.test.d.ts.map +0 -1
  47. package/dest/node-cjs/barretenberg/schnorr.test.js +0 -115
  48. package/src/barretenberg/schnorr.test.ts +0 -182
package/src/main.ts CHANGED
@@ -4,9 +4,7 @@ import { Crs, GrumpkinCrs, Barretenberg, RawBuffer } from './index.js';
4
4
  import createDebug from 'debug';
5
5
  import { readFileSync, writeFileSync } from 'fs';
6
6
  import { gunzipSync } from 'zlib';
7
- import { ungzip } from 'pako';
8
7
  import { Command } from 'commander';
9
- import { decode } from '@msgpack/msgpack';
10
8
  import { Timer, writeBenchmark } from './benchmark/index.js';
11
9
  import path from 'path';
12
10
  import { UltraHonkBackendOptions } from './barretenberg/backend.js';
@@ -46,16 +44,6 @@ function base64ToUint8Array(base64: string) {
46
44
  return bytes;
47
45
  }
48
46
 
49
- function readStack(bytecodePath: string, numToDrop = 0) {
50
- const encodedPackedZippedBytecodeArray = readFileSync(bytecodePath, 'utf-8');
51
- const packedZippedBytecodeArray = base64ToUint8Array(encodedPackedZippedBytecodeArray);
52
- const zipped = decode(
53
- packedZippedBytecodeArray.subarray(0, packedZippedBytecodeArray.length - numToDrop),
54
- ) as Uint8Array[];
55
- const bytecodeArray = zipped.map((arr: Uint8Array) => ungzip(arr));
56
- return bytecodeArray;
57
- }
58
-
59
47
  // TODO(https://github.com/AztecProtocol/barretenberg/issues/1126): split this into separate Plonk and Honk functions as their gate count differs
60
48
  async function getGatesUltra(bytecodePath: string, recursive: boolean, honkRecursion: boolean, api: Barretenberg) {
61
49
  const { total } = await computeCircuitSize(bytecodePath, recursive, honkRecursion, api);
@@ -222,22 +210,6 @@ export async function proveAndVerifyMegaHonk(
222
210
  /* eslint-enable camelcase */
223
211
  }
224
212
 
225
- export async function proveAndVerifyAztecClient(bytecodePath: string, witnessPath: string, crsPath: string) {
226
- /* eslint-disable camelcase */
227
- const { api } = await initClientIVC(crsPath);
228
- try {
229
- const bytecode = readStack(bytecodePath);
230
- const witness = readStack(witnessPath);
231
-
232
- const verified = await api.acirProveAndVerifyAztecClient(bytecode, witness);
233
- debug(`Verification ${verified ? 'successful' : 'failed'}`);
234
- return verified;
235
- } finally {
236
- await api.destroy();
237
- }
238
- /* eslint-enable camelcase */
239
- }
240
-
241
213
  export async function prove(
242
214
  bytecodePath: string,
243
215
  recursive: boolean,
@@ -586,17 +558,6 @@ program
586
558
  process.exit(result ? 0 : 1);
587
559
  });
588
560
 
589
- program
590
- .command('client_ivc_prove_and_verify')
591
- .description('Generate a ClientIVC proof.')
592
- .option('-b, --bytecode-path <path>', 'Specify the bytecode path', './target/acir.msgpack.b64')
593
- .option('-w, --witness-path <path>', 'Specify the witness path', './target/witnesses.msgpack.b64')
594
- .action(async ({ bytecodePath, witnessPath }) => {
595
- const { crsPath } = handleGlobalOptions();
596
- const result = await proveAndVerifyAztecClient(bytecodePath, witnessPath, crsPath);
597
- process.exit(result ? 0 : 1);
598
- });
599
-
600
561
  program
601
562
  .command('prove')
602
563
  .description('Generate a proof and write it to a file.')
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=schnorr.test.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"schnorr.test.d.ts","sourceRoot":"","sources":["../../../src/barretenberg/schnorr.test.ts"],"names":[],"mappings":""}
@@ -1,113 +0,0 @@
1
- import { TextEncoder } from 'util';
2
- import { Buffer128, Buffer32, Fq, Fr, Point } from '../types/index.js';
3
- import { Barretenberg } from './index.js';
4
- import { asyncMap } from '../async_map/index.js';
5
- describe('schnorr', () => {
6
- const msg = Buffer.from(new TextEncoder().encode('The quick brown dog jumped over the lazy fox.'));
7
- let api;
8
- beforeAll(async () => {
9
- api = await Barretenberg.new({ threads: 1 });
10
- }, 30000);
11
- afterAll(async () => {
12
- await api.destroy();
13
- });
14
- it('should verify signature', async () => {
15
- const pk = Fr.fromBuffer(new Uint8Array([
16
- 0x0b, 0x9b, 0x3a, 0xde, 0xe6, 0xb3, 0xd8, 0x1b, 0x28, 0xa0, 0x88, 0x6b, 0x2a, 0x84, 0x15, 0xc7, 0xda, 0x31,
17
- 0x29, 0x1a, 0x5e, 0x96, 0xbb, 0x7a, 0x56, 0x63, 0x9e, 0x17, 0x7d, 0x30, 0x1b, 0xeb,
18
- ]));
19
- const pubKey = await api.schnorrComputePublicKey(pk);
20
- const [s, e] = await api.schnorrConstructSignature(msg, pk);
21
- const verified = await api.schnorrVerifySignature(msg, pubKey, s, e);
22
- expect(verified).toBe(true);
23
- });
24
- it('public key negation should work', async () => {
25
- const publicKeyStr = '0x164f01b1011a1b292217acf53eef4d74f625f6e9bd5edfdb74c56fd81aafeebb21912735f9266a3719f61c1eb747ddee0cac9917f5c807485d356709b529b62c';
26
- const publicKey = Point.fromString(publicKeyStr);
27
- // hardcoded expected negated public key
28
- const expectedInvertedStr = '0x164f01b1011a1b292217acf53eef4d74f625f6e9bd5edfdb74c56fd81aafeebb0ed3273ce80b35f29e5a2997ca397a6f1b874f3083f16948e6ac8e8a3ad649d5';
29
- const expectedInverted = Point.fromString(expectedInvertedStr);
30
- // negate - should match expected negated key
31
- const negatedPublicKey = await api.schnorrNegatePublicKey(publicKey);
32
- expect(negatedPublicKey.equals(expectedInverted)).toEqual(true);
33
- // negate again - should be original public key now
34
- expect((await api.schnorrNegatePublicKey(negatedPublicKey)).equals(publicKey)).toEqual(true);
35
- });
36
- it('should create + verify multi signature', async () => {
37
- // set up multisig accounts
38
- const numSigners = 7;
39
- const pks = [...Array(numSigners)].map(() => Fq.random());
40
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
41
- // round one
42
- const roundOnePublicOutputs = [];
43
- const roundOnePrivateOutputs = [];
44
- for (let i = 0; i < numSigners; ++i) {
45
- const [publicOutput, privateOutput] = await api.schnorrMultisigConstructSignatureRound1();
46
- roundOnePublicOutputs.push(publicOutput);
47
- roundOnePrivateOutputs.push(privateOutput);
48
- }
49
- // round two
50
- const roundTwoOutputs = await asyncMap(pks, async (pk, i) => (await api.schnorrMultisigConstructSignatureRound2(msg, pk, roundOnePrivateOutputs[i], pubKeys, roundOnePublicOutputs))[0]);
51
- // generate signature
52
- const [s, e] = await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, roundTwoOutputs);
53
- const [combinedKey] = await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys);
54
- expect(combinedKey).not.toEqual(Buffer.alloc(64));
55
- const verified = await api.schnorrVerifySignature(msg, combinedKey, s, e);
56
- expect(verified).toBe(true);
57
- });
58
- it('should identify invalid multi signature', async () => {
59
- const pks = [...Array(3)].map(() => Fq.random());
60
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
61
- const [combinedKey] = await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys);
62
- const verified = await api.schnorrVerifySignature(msg, combinedKey, Buffer32.random(), Buffer32.random());
63
- expect(verified).toBe(false);
64
- });
65
- it('should not construct invalid multi signature', async () => {
66
- // set up multisig accounts
67
- const numSigners = 7;
68
- const pks = [...Array(numSigners)].map(() => Fq.random());
69
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
70
- // round one
71
- const roundOnePublicOutputs = [];
72
- const roundOnePrivateOutputs = [];
73
- for (let i = 0; i < numSigners; ++i) {
74
- const [publicOutput, privateOutput] = await api.schnorrMultisigConstructSignatureRound1();
75
- roundOnePublicOutputs.push(publicOutput);
76
- roundOnePrivateOutputs.push(privateOutput);
77
- }
78
- // round two
79
- const roundTwoOutputs = await asyncMap(pks, async (pk, i) => (await api.schnorrMultisigConstructSignatureRound2(msg, pk, roundOnePrivateOutputs[i], pubKeys, roundOnePublicOutputs))[0]);
80
- // wrong number of data
81
- {
82
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys.slice(0, -1), roundOnePublicOutputs.slice(0, -1), roundTwoOutputs.slice(0, -1)))[2]).toBe(false);
83
- }
84
- // invalid round two output
85
- {
86
- const invalidOutputs = [...roundTwoOutputs];
87
- invalidOutputs[1] = (await api.schnorrMultisigConstructSignatureRound2(msg, pks[2], // <- Wrong private key.
88
- roundOnePrivateOutputs[1], pubKeys, roundOnePublicOutputs))[0];
89
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, invalidOutputs))[2]).toBe(false);
90
- }
91
- // contains duplicates
92
- {
93
- const invalidOutputs = [...roundTwoOutputs];
94
- invalidOutputs[1] = roundTwoOutputs[2];
95
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, invalidOutputs))[2]).toBe(false);
96
- }
97
- });
98
- it('should not create combined key from public keys containing invalid key', async () => {
99
- const pks = [...Array(5)].map(() => Fq.random());
100
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
101
- // not a valid point
102
- {
103
- pubKeys[1] = new Buffer128(Buffer.alloc(128));
104
- expect((await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys))[1]).toBe(false);
105
- }
106
- // contains duplicates
107
- {
108
- pubKeys[1] = pubKeys[2];
109
- expect((await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys))[1]).toBe(false);
110
- }
111
- });
112
- });
113
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"schnorr.test.js","sourceRoot":"","sources":["../../../src/barretenberg/schnorr.test.ts"],"names":[],"mappings":"AAAA,OAAO,EAAE,WAAW,EAAE,MAAM,MAAM,CAAC;AACnC,OAAO,EAAE,SAAS,EAAE,QAAQ,EAAE,EAAE,EAAE,EAAE,EAAE,KAAK,EAAE,MAAM,mBAAmB,CAAC;AACvE,OAAO,EAAE,YAAY,EAAE,MAAM,YAAY,CAAC;AAC1C,OAAO,EAAE,QAAQ,EAAE,MAAM,uBAAuB,CAAC;AAEjD,QAAQ,CAAC,SAAS,EAAE,GAAG,EAAE;IACvB,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,WAAW,EAAE,CAAC,MAAM,CAAC,+CAA+C,CAAC,CAAC,CAAC;IACnG,IAAI,GAAiB,CAAC;IAEtB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,GAAG,GAAG,MAAM,YAAY,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,CAAC,CAAC;IAC/C,CAAC,EAAE,KAAK,CAAC,CAAC;IAEV,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,MAAM,GAAG,CAAC,OAAO,EAAE,CAAC;IACtB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,yBAAyB,EAAE,KAAK,IAAI,EAAE;QACvC,MAAM,EAAE,GAAG,EAAE,CAAC,UAAU,CACtB,IAAI,UAAU,CAAC;YACb,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAC1G,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;SACnF,CAAC,CACH,CAAC;QACF,MAAM,MAAM,GAAG,MAAM,GAAG,CAAC,uBAAuB,CAAC,EAAE,CAAC,CAAC;QACrD,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,yBAAyB,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;QAC5D,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,GAAG,EAAE,MAAM,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;QAErE,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,YAAY,GAChB,oIAAoI,CAAC;QACvI,MAAM,SAAS,GAAG,KAAK,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;QACjD,wCAAwC;QACxC,MAAM,mBAAmB,GACvB,oIAAoI,CAAC;QACvI,MAAM,gBAAgB,GAAG,KAAK,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC;QAE/D,6CAA6C;QAC7C,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QACrE,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAChE,mDAAmD;QACnD,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,sBAAsB,CAAC,gBAAgB,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IAC/F,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACtD,2BAA2B;QAC3B,MAAM,UAAU,GAAG,CAAC,CAAC;QACrB,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1D,MAAM,OAAO,GAAG,MAAM,QAAQ,CAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAE1F,YAAY;QACZ,MAAM,qBAAqB,GAAgB,EAAE,CAAC;QAC9C,MAAM,sBAAsB,GAAgB,EAAE,CAAC;QAC/C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,EAAE,CAAC,EAAE,CAAC;YACpC,MAAM,CAAC,YAAY,EAAE,aAAa,CAAC,GAAG,MAAM,GAAG,CAAC,uCAAuC,EAAE,CAAC;YAC1F,qBAAqB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACzC,sBAAsB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC7C,CAAC;QAED,YAAY;QACZ,MAAM,eAAe,GAAG,MAAM,QAAQ,CACpC,GAAG,EACH,KAAK,EAAE,EAAE,EAAE,CAAC,EAAE,EAAE,CACd,CACE,MAAM,GAAG,CAAC,uCAAuC,CAC/C,GAAG,EACH,EAAE,EACF,sBAAsB,CAAC,CAAC,CAAC,EACzB,OAAO,EACP,qBAAqB,CACtB,CACF,CAAC,CAAC,CAAC,CACP,CAAC;QAEF,qBAAqB;QACrB,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,gCAAgC,CAAC,GAAG,EAAE,OAAO,EAAE,qBAAqB,EAAE,eAAe,CAAE,CAAC;QACjH,MAAM,CAAC,WAAW,CAAC,GAAG,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC;QACxF,MAAM,CAAC,WAAW,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC,CAAC;QAClD,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,GAAG,EAAE,WAAW,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;QAC1E,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;QACvD,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QACjD,MAAM,OAAO,GAAG,MAAM,QAAQ,CAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAC1F,MAAM,CAAC,WAAW,CAAC,GAAG,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC;QAExF,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,GAAG,EAAE,WAAW,EAAE,QAAQ,CAAC,MAAM,EAAE,EAAE,QAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1G,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IAC/B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;QAC5D,2BAA2B;QAC3B,MAAM,UAAU,GAAG,CAAC,CAAC;QACrB,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1D,MAAM,OAAO,GAAG,MAAM,QAAQ,CAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAE1F,YAAY;QACZ,MAAM,qBAAqB,GAAgB,EAAE,CAAC;QAC9C,MAAM,sBAAsB,GAAgB,EAAE,CAAC;QAC/C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,EAAE,CAAC,EAAE,CAAC;YACpC,MAAM,CAAC,YAAY,EAAE,aAAa,CAAC,GAAG,MAAM,GAAG,CAAC,uCAAuC,EAAE,CAAC;YAC1F,qBAAqB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACzC,sBAAsB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC7C,CAAC;QAED,YAAY;QACZ,MAAM,eAAe,GAAG,MAAM,QAAQ,CACpC,GAAG,EACH,KAAK,EAAE,EAAE,EAAE,CAAC,EAAE,EAAE,CACd,CACE,MAAM,GAAG,CAAC,uCAAuC,CAC/C,GAAG,EACH,EAAE,EACF,sBAAsB,CAAC,CAAC,CAAC,EACzB,OAAO,EACP,qBAAqB,CACtB,CACF,CAAC,CAAC,CAAC,CACP,CAAC;QAEF,uBAAuB;QACvB,CAAC;YACC,MAAM,CACJ,CACE,MAAM,GAAG,CAAC,gCAAgC,CACxC,GAAG,EACH,OAAO,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EACpB,qBAAqB,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EAClC,eAAe,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAC7B,CACF,CAAC,CAAC,CAAC,CACL,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAChB,CAAC;QAED,2BAA2B;QAC3B,CAAC;YACC,MAAM,cAAc,GAAG,CAAC,GAAG,eAAe,CAAC,CAAC;YAC5C,cAAc,CAAC,CAAC,CAAC,GAAG,CAClB,MAAM,GAAG,CAAC,uCAAuC,CAC/C,GAAG,EACH,GAAG,CAAC,CAAC,CAAC,EAAE,wBAAwB;YAChC,sBAAsB,CAAC,CAAC,CAAC,EACzB,OAAO,EACP,qBAAqB,CACtB,CACF,CAAC,CAAC,CAAC,CAAC;YACL,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,gCAAgC,CAAC,GAAG,EAAE,OAAO,EAAE,qBAAqB,EAAE,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAC/G,KAAK,CACN,CAAC;QACJ,CAAC;QAED,sBAAsB;QACtB,CAAC;YACC,MAAM,cAAc,GAAG,CAAC,GAAG,eAAe,CAAC,CAAC;YAC5C,cAAc,CAAC,CAAC,CAAC,GAAG,eAAe,CAAC,CAAC,CAAC,CAAC;YACvC,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,gCAAgC,CAAC,GAAG,EAAE,OAAO,EAAE,qBAAqB,EAAE,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAC/G,KAAK,CACN,CAAC;QACJ,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,wEAAwE,EAAE,KAAK,IAAI,EAAE;QACtF,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,EAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QACjD,MAAM,OAAO,GAAG,MAAM,QAAQ,CAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAE1F,oBAAoB;QACpB,CAAC;YACC,OAAO,CAAC,CAAC,CAAC,GAAG,IAAI,SAAS,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC;YAC9C,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC7F,CAAC;QAED,sBAAsB;QACtB,CAAC;YACC,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;YACxB,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC7F,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -1,2 +0,0 @@
1
- export {};
2
- //# sourceMappingURL=schnorr.test.d.ts.map
@@ -1 +0,0 @@
1
- {"version":3,"file":"schnorr.test.d.ts","sourceRoot":"","sources":["../../../src/barretenberg/schnorr.test.ts"],"names":[],"mappings":""}
@@ -1,115 +0,0 @@
1
- "use strict";
2
- Object.defineProperty(exports, "__esModule", { value: true });
3
- const util_1 = require("util");
4
- const index_js_1 = require("../types/index.js");
5
- const index_js_2 = require("./index.js");
6
- const index_js_3 = require("../async_map/index.js");
7
- describe('schnorr', () => {
8
- const msg = Buffer.from(new util_1.TextEncoder().encode('The quick brown dog jumped over the lazy fox.'));
9
- let api;
10
- beforeAll(async () => {
11
- api = await index_js_2.Barretenberg.new({ threads: 1 });
12
- }, 30000);
13
- afterAll(async () => {
14
- await api.destroy();
15
- });
16
- it('should verify signature', async () => {
17
- const pk = index_js_1.Fr.fromBuffer(new Uint8Array([
18
- 0x0b, 0x9b, 0x3a, 0xde, 0xe6, 0xb3, 0xd8, 0x1b, 0x28, 0xa0, 0x88, 0x6b, 0x2a, 0x84, 0x15, 0xc7, 0xda, 0x31,
19
- 0x29, 0x1a, 0x5e, 0x96, 0xbb, 0x7a, 0x56, 0x63, 0x9e, 0x17, 0x7d, 0x30, 0x1b, 0xeb,
20
- ]));
21
- const pubKey = await api.schnorrComputePublicKey(pk);
22
- const [s, e] = await api.schnorrConstructSignature(msg, pk);
23
- const verified = await api.schnorrVerifySignature(msg, pubKey, s, e);
24
- expect(verified).toBe(true);
25
- });
26
- it('public key negation should work', async () => {
27
- const publicKeyStr = '0x164f01b1011a1b292217acf53eef4d74f625f6e9bd5edfdb74c56fd81aafeebb21912735f9266a3719f61c1eb747ddee0cac9917f5c807485d356709b529b62c';
28
- const publicKey = index_js_1.Point.fromString(publicKeyStr);
29
- // hardcoded expected negated public key
30
- const expectedInvertedStr = '0x164f01b1011a1b292217acf53eef4d74f625f6e9bd5edfdb74c56fd81aafeebb0ed3273ce80b35f29e5a2997ca397a6f1b874f3083f16948e6ac8e8a3ad649d5';
31
- const expectedInverted = index_js_1.Point.fromString(expectedInvertedStr);
32
- // negate - should match expected negated key
33
- const negatedPublicKey = await api.schnorrNegatePublicKey(publicKey);
34
- expect(negatedPublicKey.equals(expectedInverted)).toEqual(true);
35
- // negate again - should be original public key now
36
- expect((await api.schnorrNegatePublicKey(negatedPublicKey)).equals(publicKey)).toEqual(true);
37
- });
38
- it('should create + verify multi signature', async () => {
39
- // set up multisig accounts
40
- const numSigners = 7;
41
- const pks = [...Array(numSigners)].map(() => index_js_1.Fq.random());
42
- const pubKeys = await (0, index_js_3.asyncMap)(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
43
- // round one
44
- const roundOnePublicOutputs = [];
45
- const roundOnePrivateOutputs = [];
46
- for (let i = 0; i < numSigners; ++i) {
47
- const [publicOutput, privateOutput] = await api.schnorrMultisigConstructSignatureRound1();
48
- roundOnePublicOutputs.push(publicOutput);
49
- roundOnePrivateOutputs.push(privateOutput);
50
- }
51
- // round two
52
- const roundTwoOutputs = await (0, index_js_3.asyncMap)(pks, async (pk, i) => (await api.schnorrMultisigConstructSignatureRound2(msg, pk, roundOnePrivateOutputs[i], pubKeys, roundOnePublicOutputs))[0]);
53
- // generate signature
54
- const [s, e] = await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, roundTwoOutputs);
55
- const [combinedKey] = await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys);
56
- expect(combinedKey).not.toEqual(Buffer.alloc(64));
57
- const verified = await api.schnorrVerifySignature(msg, combinedKey, s, e);
58
- expect(verified).toBe(true);
59
- });
60
- it('should identify invalid multi signature', async () => {
61
- const pks = [...Array(3)].map(() => index_js_1.Fq.random());
62
- const pubKeys = await (0, index_js_3.asyncMap)(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
63
- const [combinedKey] = await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys);
64
- const verified = await api.schnorrVerifySignature(msg, combinedKey, index_js_1.Buffer32.random(), index_js_1.Buffer32.random());
65
- expect(verified).toBe(false);
66
- });
67
- it('should not construct invalid multi signature', async () => {
68
- // set up multisig accounts
69
- const numSigners = 7;
70
- const pks = [...Array(numSigners)].map(() => index_js_1.Fq.random());
71
- const pubKeys = await (0, index_js_3.asyncMap)(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
72
- // round one
73
- const roundOnePublicOutputs = [];
74
- const roundOnePrivateOutputs = [];
75
- for (let i = 0; i < numSigners; ++i) {
76
- const [publicOutput, privateOutput] = await api.schnorrMultisigConstructSignatureRound1();
77
- roundOnePublicOutputs.push(publicOutput);
78
- roundOnePrivateOutputs.push(privateOutput);
79
- }
80
- // round two
81
- const roundTwoOutputs = await (0, index_js_3.asyncMap)(pks, async (pk, i) => (await api.schnorrMultisigConstructSignatureRound2(msg, pk, roundOnePrivateOutputs[i], pubKeys, roundOnePublicOutputs))[0]);
82
- // wrong number of data
83
- {
84
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys.slice(0, -1), roundOnePublicOutputs.slice(0, -1), roundTwoOutputs.slice(0, -1)))[2]).toBe(false);
85
- }
86
- // invalid round two output
87
- {
88
- const invalidOutputs = [...roundTwoOutputs];
89
- invalidOutputs[1] = (await api.schnorrMultisigConstructSignatureRound2(msg, pks[2], // <- Wrong private key.
90
- roundOnePrivateOutputs[1], pubKeys, roundOnePublicOutputs))[0];
91
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, invalidOutputs))[2]).toBe(false);
92
- }
93
- // contains duplicates
94
- {
95
- const invalidOutputs = [...roundTwoOutputs];
96
- invalidOutputs[1] = roundTwoOutputs[2];
97
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, invalidOutputs))[2]).toBe(false);
98
- }
99
- });
100
- it('should not create combined key from public keys containing invalid key', async () => {
101
- const pks = [...Array(5)].map(() => index_js_1.Fq.random());
102
- const pubKeys = await (0, index_js_3.asyncMap)(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
103
- // not a valid point
104
- {
105
- pubKeys[1] = new index_js_1.Buffer128(Buffer.alloc(128));
106
- expect((await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys))[1]).toBe(false);
107
- }
108
- // contains duplicates
109
- {
110
- pubKeys[1] = pubKeys[2];
111
- expect((await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys))[1]).toBe(false);
112
- }
113
- });
114
- });
115
- //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"schnorr.test.js","sourceRoot":"","sources":["../../../src/barretenberg/schnorr.test.ts"],"names":[],"mappings":";;AAAA,+BAAmC;AACnC,gDAAuE;AACvE,yCAA0C;AAC1C,oDAAiD;AAEjD,QAAQ,CAAC,SAAS,EAAE,GAAG,EAAE;IACvB,MAAM,GAAG,GAAG,MAAM,CAAC,IAAI,CAAC,IAAI,kBAAW,EAAE,CAAC,MAAM,CAAC,+CAA+C,CAAC,CAAC,CAAC;IACnG,IAAI,GAAiB,CAAC;IAEtB,SAAS,CAAC,KAAK,IAAI,EAAE;QACnB,GAAG,GAAG,MAAM,uBAAY,CAAC,GAAG,CAAC,EAAE,OAAO,EAAE,CAAC,EAAE,CAAC,CAAC;IAC/C,CAAC,EAAE,KAAK,CAAC,CAAC;IAEV,QAAQ,CAAC,KAAK,IAAI,EAAE;QAClB,MAAM,GAAG,CAAC,OAAO,EAAE,CAAC;IACtB,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,yBAAyB,EAAE,KAAK,IAAI,EAAE;QACvC,MAAM,EAAE,GAAG,aAAE,CAAC,UAAU,CACtB,IAAI,UAAU,CAAC;YACb,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;YAC1G,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI,EAAE,IAAI;SACnF,CAAC,CACH,CAAC;QACF,MAAM,MAAM,GAAG,MAAM,GAAG,CAAC,uBAAuB,CAAC,EAAE,CAAC,CAAC;QACrD,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,yBAAyB,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;QAC5D,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,GAAG,EAAE,MAAM,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;QAErE,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,iCAAiC,EAAE,KAAK,IAAI,EAAE;QAC/C,MAAM,YAAY,GAChB,oIAAoI,CAAC;QACvI,MAAM,SAAS,GAAG,gBAAK,CAAC,UAAU,CAAC,YAAY,CAAC,CAAC;QACjD,wCAAwC;QACxC,MAAM,mBAAmB,GACvB,oIAAoI,CAAC;QACvI,MAAM,gBAAgB,GAAG,gBAAK,CAAC,UAAU,CAAC,mBAAmB,CAAC,CAAC;QAE/D,6CAA6C;QAC7C,MAAM,gBAAgB,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,SAAS,CAAC,CAAC;QACrE,MAAM,CAAC,gBAAgB,CAAC,MAAM,CAAC,gBAAgB,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;QAChE,mDAAmD;QACnD,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,sBAAsB,CAAC,gBAAgB,CAAC,CAAC,CAAC,MAAM,CAAC,SAAS,CAAC,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,CAAC;IAC/F,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,wCAAwC,EAAE,KAAK,IAAI,EAAE;QACtD,2BAA2B;QAC3B,MAAM,UAAU,GAAG,CAAC,CAAC;QACrB,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,aAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1D,MAAM,OAAO,GAAG,MAAM,IAAA,mBAAQ,EAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAE1F,YAAY;QACZ,MAAM,qBAAqB,GAAgB,EAAE,CAAC;QAC9C,MAAM,sBAAsB,GAAgB,EAAE,CAAC;QAC/C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,EAAE,CAAC,EAAE,CAAC;YACpC,MAAM,CAAC,YAAY,EAAE,aAAa,CAAC,GAAG,MAAM,GAAG,CAAC,uCAAuC,EAAE,CAAC;YAC1F,qBAAqB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACzC,sBAAsB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC7C,CAAC;QAED,YAAY;QACZ,MAAM,eAAe,GAAG,MAAM,IAAA,mBAAQ,EACpC,GAAG,EACH,KAAK,EAAE,EAAE,EAAE,CAAC,EAAE,EAAE,CACd,CACE,MAAM,GAAG,CAAC,uCAAuC,CAC/C,GAAG,EACH,EAAE,EACF,sBAAsB,CAAC,CAAC,CAAC,EACzB,OAAO,EACP,qBAAqB,CACtB,CACF,CAAC,CAAC,CAAC,CACP,CAAC;QAEF,qBAAqB;QACrB,MAAM,CAAC,CAAC,EAAE,CAAC,CAAC,GAAG,MAAM,GAAG,CAAC,gCAAgC,CAAC,GAAG,EAAE,OAAO,EAAE,qBAAqB,EAAE,eAAe,CAAE,CAAC;QACjH,MAAM,CAAC,WAAW,CAAC,GAAG,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC;QACxF,MAAM,CAAC,WAAW,CAAC,CAAC,GAAG,CAAC,OAAO,CAAC,MAAM,CAAC,KAAK,CAAC,EAAE,CAAC,CAAC,CAAC;QAClD,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,GAAG,EAAE,WAAW,EAAE,CAAC,EAAE,CAAC,CAAC,CAAC;QAC1E,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC;IAC9B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,yCAAyC,EAAE,KAAK,IAAI,EAAE;QACvD,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,aAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QACjD,MAAM,OAAO,GAAG,MAAM,IAAA,mBAAQ,EAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAC1F,MAAM,CAAC,WAAW,CAAC,GAAG,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC;QAExF,MAAM,QAAQ,GAAG,MAAM,GAAG,CAAC,sBAAsB,CAAC,GAAG,EAAE,WAAW,EAAE,mBAAQ,CAAC,MAAM,EAAE,EAAE,mBAAQ,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1G,MAAM,CAAC,QAAQ,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;IAC/B,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,8CAA8C,EAAE,KAAK,IAAI,EAAE;QAC5D,2BAA2B;QAC3B,MAAM,UAAU,GAAG,CAAC,CAAC;QACrB,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,aAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QAC1D,MAAM,OAAO,GAAG,MAAM,IAAA,mBAAQ,EAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAE1F,YAAY;QACZ,MAAM,qBAAqB,GAAgB,EAAE,CAAC;QAC9C,MAAM,sBAAsB,GAAgB,EAAE,CAAC;QAC/C,KAAK,IAAI,CAAC,GAAG,CAAC,EAAE,CAAC,GAAG,UAAU,EAAE,EAAE,CAAC,EAAE,CAAC;YACpC,MAAM,CAAC,YAAY,EAAE,aAAa,CAAC,GAAG,MAAM,GAAG,CAAC,uCAAuC,EAAE,CAAC;YAC1F,qBAAqB,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC;YACzC,sBAAsB,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC;QAC7C,CAAC;QAED,YAAY;QACZ,MAAM,eAAe,GAAG,MAAM,IAAA,mBAAQ,EACpC,GAAG,EACH,KAAK,EAAE,EAAE,EAAE,CAAC,EAAE,EAAE,CACd,CACE,MAAM,GAAG,CAAC,uCAAuC,CAC/C,GAAG,EACH,EAAE,EACF,sBAAsB,CAAC,CAAC,CAAC,EACzB,OAAO,EACP,qBAAqB,CACtB,CACF,CAAC,CAAC,CAAC,CACP,CAAC;QAEF,uBAAuB;QACvB,CAAC;YACC,MAAM,CACJ,CACE,MAAM,GAAG,CAAC,gCAAgC,CACxC,GAAG,EACH,OAAO,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EACpB,qBAAqB,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,EAClC,eAAe,CAAC,KAAK,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC,CAC7B,CACF,CAAC,CAAC,CAAC,CACL,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAChB,CAAC;QAED,2BAA2B;QAC3B,CAAC;YACC,MAAM,cAAc,GAAG,CAAC,GAAG,eAAe,CAAC,CAAC;YAC5C,cAAc,CAAC,CAAC,CAAC,GAAG,CAClB,MAAM,GAAG,CAAC,uCAAuC,CAC/C,GAAG,EACH,GAAG,CAAC,CAAC,CAAC,EAAE,wBAAwB;YAChC,sBAAsB,CAAC,CAAC,CAAC,EACzB,OAAO,EACP,qBAAqB,CACtB,CACF,CAAC,CAAC,CAAC,CAAC;YACL,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,gCAAgC,CAAC,GAAG,EAAE,OAAO,EAAE,qBAAqB,EAAE,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAC/G,KAAK,CACN,CAAC;QACJ,CAAC;QAED,sBAAsB;QACtB,CAAC;YACC,MAAM,cAAc,GAAG,CAAC,GAAG,eAAe,CAAC,CAAC;YAC5C,cAAc,CAAC,CAAC,CAAC,GAAG,eAAe,CAAC,CAAC,CAAC,CAAC;YACvC,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,gCAAgC,CAAC,GAAG,EAAE,OAAO,EAAE,qBAAqB,EAAE,cAAc,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAC/G,KAAK,CACN,CAAC;QACJ,CAAC;IACH,CAAC,CAAC,CAAC;IAEH,EAAE,CAAC,wEAAwE,EAAE,KAAK,IAAI,EAAE;QACtF,MAAM,GAAG,GAAG,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC,CAAC,GAAG,CAAC,GAAG,EAAE,CAAC,aAAE,CAAC,MAAM,EAAE,CAAC,CAAC;QACjD,MAAM,OAAO,GAAG,MAAM,IAAA,mBAAQ,EAAC,GAAG,EAAE,EAAE,CAAC,EAAE,CAAC,GAAG,CAAC,sCAAsC,CAAC,EAAE,CAAC,CAAC,CAAC;QAE1F,oBAAoB;QACpB,CAAC;YACC,OAAO,CAAC,CAAC,CAAC,GAAG,IAAI,oBAAS,CAAC,MAAM,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC;YAC9C,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC7F,CAAC;QAED,sBAAsB;QACtB,CAAC;YACC,OAAO,CAAC,CAAC,CAAC,GAAG,OAAO,CAAC,CAAC,CAAC,CAAC;YACxB,MAAM,CAAC,CAAC,MAAM,GAAG,CAAC,8CAA8C,CAAC,OAAO,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;QAC7F,CAAC;IACH,CAAC,CAAC,CAAC;AACL,CAAC,CAAC,CAAC"}
@@ -1,182 +0,0 @@
1
- import { TextEncoder } from 'util';
2
- import { Buffer128, Buffer32, Fq, Fr, Point } from '../types/index.js';
3
- import { Barretenberg } from './index.js';
4
- import { asyncMap } from '../async_map/index.js';
5
-
6
- describe('schnorr', () => {
7
- const msg = Buffer.from(new TextEncoder().encode('The quick brown dog jumped over the lazy fox.'));
8
- let api: Barretenberg;
9
-
10
- beforeAll(async () => {
11
- api = await Barretenberg.new({ threads: 1 });
12
- }, 30000);
13
-
14
- afterAll(async () => {
15
- await api.destroy();
16
- });
17
-
18
- it('should verify signature', async () => {
19
- const pk = Fr.fromBuffer(
20
- new Uint8Array([
21
- 0x0b, 0x9b, 0x3a, 0xde, 0xe6, 0xb3, 0xd8, 0x1b, 0x28, 0xa0, 0x88, 0x6b, 0x2a, 0x84, 0x15, 0xc7, 0xda, 0x31,
22
- 0x29, 0x1a, 0x5e, 0x96, 0xbb, 0x7a, 0x56, 0x63, 0x9e, 0x17, 0x7d, 0x30, 0x1b, 0xeb,
23
- ]),
24
- );
25
- const pubKey = await api.schnorrComputePublicKey(pk);
26
- const [s, e] = await api.schnorrConstructSignature(msg, pk);
27
- const verified = await api.schnorrVerifySignature(msg, pubKey, s, e);
28
-
29
- expect(verified).toBe(true);
30
- });
31
-
32
- it('public key negation should work', async () => {
33
- const publicKeyStr =
34
- '0x164f01b1011a1b292217acf53eef4d74f625f6e9bd5edfdb74c56fd81aafeebb21912735f9266a3719f61c1eb747ddee0cac9917f5c807485d356709b529b62c';
35
- const publicKey = Point.fromString(publicKeyStr);
36
- // hardcoded expected negated public key
37
- const expectedInvertedStr =
38
- '0x164f01b1011a1b292217acf53eef4d74f625f6e9bd5edfdb74c56fd81aafeebb0ed3273ce80b35f29e5a2997ca397a6f1b874f3083f16948e6ac8e8a3ad649d5';
39
- const expectedInverted = Point.fromString(expectedInvertedStr);
40
-
41
- // negate - should match expected negated key
42
- const negatedPublicKey = await api.schnorrNegatePublicKey(publicKey);
43
- expect(negatedPublicKey.equals(expectedInverted)).toEqual(true);
44
- // negate again - should be original public key now
45
- expect((await api.schnorrNegatePublicKey(negatedPublicKey)).equals(publicKey)).toEqual(true);
46
- });
47
-
48
- it('should create + verify multi signature', async () => {
49
- // set up multisig accounts
50
- const numSigners = 7;
51
- const pks = [...Array(numSigners)].map(() => Fq.random());
52
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
53
-
54
- // round one
55
- const roundOnePublicOutputs: Buffer128[] = [];
56
- const roundOnePrivateOutputs: Buffer128[] = [];
57
- for (let i = 0; i < numSigners; ++i) {
58
- const [publicOutput, privateOutput] = await api.schnorrMultisigConstructSignatureRound1();
59
- roundOnePublicOutputs.push(publicOutput);
60
- roundOnePrivateOutputs.push(privateOutput);
61
- }
62
-
63
- // round two
64
- const roundTwoOutputs = await asyncMap(
65
- pks,
66
- async (pk, i) =>
67
- (
68
- await api.schnorrMultisigConstructSignatureRound2(
69
- msg,
70
- pk,
71
- roundOnePrivateOutputs[i],
72
- pubKeys,
73
- roundOnePublicOutputs,
74
- )
75
- )[0],
76
- );
77
-
78
- // generate signature
79
- const [s, e] = await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, roundTwoOutputs)!;
80
- const [combinedKey] = await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys);
81
- expect(combinedKey).not.toEqual(Buffer.alloc(64));
82
- const verified = await api.schnorrVerifySignature(msg, combinedKey, s, e);
83
- expect(verified).toBe(true);
84
- });
85
-
86
- it('should identify invalid multi signature', async () => {
87
- const pks = [...Array(3)].map(() => Fq.random());
88
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
89
- const [combinedKey] = await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys);
90
-
91
- const verified = await api.schnorrVerifySignature(msg, combinedKey, Buffer32.random(), Buffer32.random());
92
- expect(verified).toBe(false);
93
- });
94
-
95
- it('should not construct invalid multi signature', async () => {
96
- // set up multisig accounts
97
- const numSigners = 7;
98
- const pks = [...Array(numSigners)].map(() => Fq.random());
99
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
100
-
101
- // round one
102
- const roundOnePublicOutputs: Buffer128[] = [];
103
- const roundOnePrivateOutputs: Buffer128[] = [];
104
- for (let i = 0; i < numSigners; ++i) {
105
- const [publicOutput, privateOutput] = await api.schnorrMultisigConstructSignatureRound1();
106
- roundOnePublicOutputs.push(publicOutput);
107
- roundOnePrivateOutputs.push(privateOutput);
108
- }
109
-
110
- // round two
111
- const roundTwoOutputs = await asyncMap(
112
- pks,
113
- async (pk, i) =>
114
- (
115
- await api.schnorrMultisigConstructSignatureRound2(
116
- msg,
117
- pk,
118
- roundOnePrivateOutputs[i],
119
- pubKeys,
120
- roundOnePublicOutputs,
121
- )
122
- )[0],
123
- );
124
-
125
- // wrong number of data
126
- {
127
- expect(
128
- (
129
- await api.schnorrMultisigCombineSignatures(
130
- msg,
131
- pubKeys.slice(0, -1),
132
- roundOnePublicOutputs.slice(0, -1),
133
- roundTwoOutputs.slice(0, -1),
134
- )
135
- )[2],
136
- ).toBe(false);
137
- }
138
-
139
- // invalid round two output
140
- {
141
- const invalidOutputs = [...roundTwoOutputs];
142
- invalidOutputs[1] = (
143
- await api.schnorrMultisigConstructSignatureRound2(
144
- msg,
145
- pks[2], // <- Wrong private key.
146
- roundOnePrivateOutputs[1],
147
- pubKeys,
148
- roundOnePublicOutputs,
149
- )
150
- )[0];
151
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, invalidOutputs))[2]).toBe(
152
- false,
153
- );
154
- }
155
-
156
- // contains duplicates
157
- {
158
- const invalidOutputs = [...roundTwoOutputs];
159
- invalidOutputs[1] = roundTwoOutputs[2];
160
- expect((await api.schnorrMultisigCombineSignatures(msg, pubKeys, roundOnePublicOutputs, invalidOutputs))[2]).toBe(
161
- false,
162
- );
163
- }
164
- });
165
-
166
- it('should not create combined key from public keys containing invalid key', async () => {
167
- const pks = [...Array(5)].map(() => Fq.random());
168
- const pubKeys = await asyncMap(pks, pk => api.schnorrMultisigCreateMultisigPublicKey(pk));
169
-
170
- // not a valid point
171
- {
172
- pubKeys[1] = new Buffer128(Buffer.alloc(128));
173
- expect((await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys))[1]).toBe(false);
174
- }
175
-
176
- // contains duplicates
177
- {
178
- pubKeys[1] = pubKeys[2];
179
- expect((await api.schnorrMultisigValidateAndCombineSignerPubkeys(pubKeys))[1]).toBe(false);
180
- }
181
- });
182
- });