@bitgo-beta/sdk-lib-mpc 8.2.1-alpha.4 → 8.2.1-alpha.41

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (71) hide show
  1. package/CHANGELOG.md +134 -0
  2. package/dist/src/curves/constant.d.ts +2 -0
  3. package/dist/src/curves/constant.d.ts.map +1 -0
  4. package/dist/src/curves/constant.js +6 -0
  5. package/dist/src/curves/{baseCurve.d.ts → ed25519.d.ts} +9 -7
  6. package/dist/src/curves/ed25519.d.ts.map +1 -0
  7. package/dist/src/curves/ed25519.js +72 -0
  8. package/dist/src/curves/ed25519Bip32HdTree.d.ts +10 -0
  9. package/dist/src/curves/ed25519Bip32HdTree.d.ts.map +1 -0
  10. package/dist/src/curves/ed25519Bip32HdTree.js +85 -0
  11. package/dist/src/curves/index.d.ts +6 -1
  12. package/dist/src/curves/index.d.ts.map +1 -1
  13. package/dist/src/curves/index.js +7 -2
  14. package/dist/src/curves/secp256k1.d.ts +3 -1
  15. package/dist/src/curves/secp256k1.d.ts.map +1 -1
  16. package/dist/src/curves/secp256k1.js +14 -7
  17. package/dist/src/curves/secp256k1Bip32HdTree.d.ts +8 -0
  18. package/dist/src/curves/secp256k1Bip32HdTree.d.ts.map +1 -0
  19. package/dist/src/curves/secp256k1Bip32HdTree.js +54 -0
  20. package/dist/src/curves/types.d.ts +36 -0
  21. package/dist/src/curves/types.d.ts.map +1 -0
  22. package/dist/src/curves/types.js +3 -0
  23. package/dist/src/curves/util.d.ts +2 -0
  24. package/dist/src/curves/util.d.ts.map +1 -0
  25. package/dist/src/curves/util.js +11 -0
  26. package/dist/src/hashCommitment.d.ts +17 -0
  27. package/dist/src/hashCommitment.d.ts.map +1 -0
  28. package/dist/src/hashCommitment.js +45 -0
  29. package/dist/src/index.d.ts +6 -1
  30. package/dist/src/index.d.ts.map +1 -1
  31. package/dist/src/index.js +20 -2
  32. package/dist/src/schnorrProof.d.ts +22 -0
  33. package/dist/src/schnorrProof.d.ts.map +1 -0
  34. package/dist/src/schnorrProof.js +62 -0
  35. package/dist/src/shamir/index.d.ts +3 -0
  36. package/dist/src/shamir/index.d.ts.map +1 -0
  37. package/dist/src/shamir/index.js +15 -0
  38. package/dist/src/shamir/shamir.d.ts +38 -0
  39. package/dist/src/shamir/shamir.d.ts.map +1 -0
  40. package/dist/src/shamir/shamir.js +136 -0
  41. package/dist/src/shamir/types.d.ts +5 -0
  42. package/dist/src/shamir/types.d.ts.map +1 -0
  43. package/dist/src/shamir/types.js +3 -0
  44. package/dist/src/tss/ecdsa/index.d.ts +3 -0
  45. package/dist/src/tss/ecdsa/index.d.ts.map +1 -1
  46. package/dist/src/tss/ecdsa/index.js +5 -2
  47. package/dist/src/tss/ecdsa/paillierproof.d.ts +24 -0
  48. package/dist/src/tss/ecdsa/paillierproof.d.ts.map +1 -0
  49. package/dist/src/tss/ecdsa/paillierproof.js +86 -0
  50. package/dist/src/tss/ecdsa/primes.d.ts +2 -0
  51. package/dist/src/tss/ecdsa/primes.d.ts.map +1 -0
  52. package/dist/src/tss/ecdsa/primes.js +1846 -0
  53. package/dist/src/tss/ecdsa/rangeproof.d.ts +1 -1
  54. package/dist/src/tss/ecdsa/rangeproof.d.ts.map +1 -1
  55. package/dist/src/tss/ecdsa/rangeproof.js +24 -23
  56. package/dist/src/tss/ecdsa/types.d.ts +71 -13
  57. package/dist/src/tss/ecdsa/types.d.ts.map +1 -1
  58. package/dist/src/tss/ecdsa/types.js +76 -14
  59. package/dist/src/tss/ecdsa/zkVProof.d.ts +25 -0
  60. package/dist/src/tss/ecdsa/zkVProof.d.ts.map +1 -0
  61. package/dist/src/tss/ecdsa/zkVProof.js +71 -0
  62. package/dist/src/types.d.ts +14 -0
  63. package/dist/src/types.d.ts.map +1 -0
  64. package/dist/src/types.js +3 -0
  65. package/dist/src/util.d.ts +21 -6
  66. package/dist/src/util.d.ts.map +1 -1
  67. package/dist/src/util.js +56 -14
  68. package/dist/tsconfig.tsbuildinfo +1 -3621
  69. package/package.json +4 -4
  70. package/dist/src/curves/baseCurve.d.ts.map +0 -1
  71. package/dist/src/curves/baseCurve.js +0 -6
@@ -0,0 +1,36 @@
1
+ /// <reference types="node" />
2
+ export declare type PublicKeychain = {
3
+ pk: bigint;
4
+ chaincode: bigint;
5
+ };
6
+ export declare type PrivateKeychain = PublicKeychain & {
7
+ sk: bigint;
8
+ prefix?: bigint;
9
+ };
10
+ /**
11
+ * An interface for calculating a subkey in an HD key scheme.
12
+ */
13
+ export interface HDTree {
14
+ publicDerive(keychain: PublicKeychain, path: string): PublicKeychain;
15
+ privateDerive(keychain: PrivateKeychain, path: string): PrivateKeychain;
16
+ }
17
+ /**
18
+ * Base Interface for supporting elliptic curve parameters
19
+ */
20
+ export interface BaseCurve {
21
+ scalarReduce(s: bigint): bigint;
22
+ scalarNegate(s: bigint): bigint;
23
+ scalarInvert(s: bigint): bigint;
24
+ scalarRandom(): bigint;
25
+ scalarAdd(x: bigint, y: bigint): bigint;
26
+ scalarSub(x: bigint, y: bigint): bigint;
27
+ scalarMult(x: bigint, y: bigint): bigint;
28
+ basePointMult(n: bigint): bigint;
29
+ pointAdd(p: bigint, q: bigint): bigint;
30
+ pointMultiply(p: bigint, s: bigint): bigint;
31
+ verify(message: Buffer, signature: Buffer, publicKey: bigint): boolean;
32
+ order: () => bigint;
33
+ scalarBytes: number;
34
+ pointBytes: number;
35
+ }
36
+ //# sourceMappingURL=types.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../src/curves/types.ts"],"names":[],"mappings":";AAAA,oBAAY,cAAc,GAAG;IAE3B,EAAE,EAAE,MAAM,CAAC;IACX,SAAS,EAAE,MAAM,CAAC;CACnB,CAAC;AAEF,oBAAY,eAAe,GAAG,cAAc,GAAG;IAE7C,EAAE,EAAE,MAAM,CAAC;IACX,MAAM,CAAC,EAAE,MAAM,CAAC;CACjB,CAAC;AAEF;;GAEG;AACH,MAAM,WAAW,MAAM;IACrB,YAAY,CAAC,QAAQ,EAAE,cAAc,EAAE,IAAI,EAAE,MAAM,GAAG,cAAc,CAAC;IAErE,aAAa,CAAC,QAAQ,EAAE,eAAe,EAAE,IAAI,EAAE,MAAM,GAAG,eAAe,CAAC;CACzE;AAED;;GAEG;AACH,MAAM,WAAW,SAAS;IAGxB,YAAY,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAGhC,YAAY,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAGhC,YAAY,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAEhC,YAAY,IAAI,MAAM,CAAC;IAGvB,SAAS,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAGxC,SAAS,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAGxC,UAAU,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAEzC,aAAa,CAAC,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAEjC,QAAQ,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAEvC,aAAa,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,MAAM,GAAG,MAAM,CAAC;IAE5C,MAAM,CAAC,OAAO,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,GAAG,OAAO,CAAC;IAEvE,KAAK,EAAE,MAAM,MAAM,CAAC;IAEpB,WAAW,EAAE,MAAM,CAAC;IAEpB,UAAU,EAAE,MAAM,CAAC;CACpB"}
@@ -0,0 +1,3 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,2 @@
1
+ export declare function pathToIndices(path: string): number[];
2
+ //# sourceMappingURL=util.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"util.d.ts","sourceRoot":"","sources":["../../../src/curves/util.ts"],"names":[],"mappings":"AAAA,wBAAgB,aAAa,CAAC,IAAI,EAAE,MAAM,GAAG,MAAM,EAAE,CAKpD"}
@@ -0,0 +1,11 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.pathToIndices = void 0;
4
+ function pathToIndices(path) {
5
+ return path
6
+ .replace(/^m?\//, '')
7
+ .split('/')
8
+ .map((index) => parseInt(index, 10));
9
+ }
10
+ exports.pathToIndices = pathToIndices;
11
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,17 @@
1
+ /// <reference types="node" />
2
+ import { HashCommitDecommit, HashDecommitment } from './types';
3
+ /**
4
+ * Create hash commitment and decommietment of a secret value.
5
+ * @param secret The secret value/message.
6
+ * @param r The randomness/nonce to be added to the commmitment.
7
+ * @returns The created commitment and decommitment.
8
+ */
9
+ export declare function createCommitment(secret: Buffer, r?: Buffer): HashCommitDecommit;
10
+ /**
11
+ * Verify hash commitment and decommietment of a secret value.
12
+ * @param commitment The commitment.
13
+ * @param decommietment The decommitment.
14
+ * @returns True if verification succeeds.
15
+ */
16
+ export declare function verifyCommitment(commitment: Buffer, decommietment: HashDecommitment): boolean;
17
+ //# sourceMappingURL=hashCommitment.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"hashCommitment.d.ts","sourceRoot":"","sources":["../../src/hashCommitment.ts"],"names":[],"mappings":";AACA,OAAO,EAAE,kBAAkB,EAAE,gBAAgB,EAAE,MAAM,SAAS,CAAC;AAK/D;;;;;GAKG;AACH,wBAAgB,gBAAgB,CAAC,MAAM,EAAE,MAAM,EAAE,CAAC,GAAE,MAAyC,GAAG,kBAAkB,CAWjH;AAaD;;;;;GAKG;AACH,wBAAgB,gBAAgB,CAAC,UAAU,EAAE,MAAM,EAAE,aAAa,EAAE,gBAAgB,GAAG,OAAO,CAE7F"}
@@ -0,0 +1,45 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.verifyCommitment = exports.createCommitment = void 0;
4
+ const crypto_1 = require("crypto");
5
+ const util_1 = require("./util");
6
+ const minRandomnessLength = 32;
7
+ /**
8
+ * Create hash commitment and decommietment of a secret value.
9
+ * @param secret The secret value/message.
10
+ * @param r The randomness/nonce to be added to the commmitment.
11
+ * @returns The created commitment and decommitment.
12
+ */
13
+ function createCommitment(secret, r = crypto_1.randomBytes(minRandomnessLength)) {
14
+ if (r.length < minRandomnessLength) {
15
+ throw new Error(`randomness must be at least ${minRandomnessLength} bytes long`);
16
+ }
17
+ return {
18
+ commitment: hash(secret, r),
19
+ decommitment: {
20
+ blindingFactor: r,
21
+ secret: secret,
22
+ },
23
+ };
24
+ }
25
+ exports.createCommitment = createCommitment;
26
+ const bytesPerUint32 = 4;
27
+ function hash(secret, r) {
28
+ return crypto_1.createHash('sha256')
29
+ .update(util_1.bigIntToBufferBE(BigInt(secret.length), bytesPerUint32))
30
+ .update(secret)
31
+ .update(util_1.bigIntToBufferBE(BigInt(r.length), bytesPerUint32))
32
+ .update(r)
33
+ .digest();
34
+ }
35
+ /**
36
+ * Verify hash commitment and decommietment of a secret value.
37
+ * @param commitment The commitment.
38
+ * @param decommietment The decommitment.
39
+ * @returns True if verification succeeds.
40
+ */
41
+ function verifyCommitment(commitment, decommietment) {
42
+ return hash(decommietment.secret, decommietment.blindingFactor).compare(commitment) === 0;
43
+ }
44
+ exports.verifyCommitment = verifyCommitment;
45
+ //# sourceMappingURL=data:application/json;base64,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
@@ -1,4 +1,9 @@
1
- export * from './tss';
2
1
  export * from './curves';
2
+ export * from './openssl';
3
+ export * from './shamir';
4
+ export * from './tss';
5
+ export * as HashCommitment from './hashCommitment';
6
+ export * as Schnorr from './schnorrProof';
7
+ export * from './types';
3
8
  export * from './util';
4
9
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,OAAO,CAAC;AACtB,cAAc,UAAU,CAAC;AACzB,cAAc,QAAQ,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../src/index.ts"],"names":[],"mappings":"AAAA,cAAc,UAAU,CAAC;AACzB,cAAc,WAAW,CAAC;AAC1B,cAAc,UAAU,CAAC;AACzB,cAAc,OAAO,CAAC;AAEtB,OAAO,KAAK,cAAc,MAAM,kBAAkB,CAAC;AACnD,OAAO,KAAK,OAAO,MAAM,gBAAgB,CAAC;AAC1C,cAAc,SAAS,CAAC;AACxB,cAAc,QAAQ,CAAC"}
package/dist/src/index.js CHANGED
@@ -6,11 +6,29 @@ var __createBinding = (this && this.__createBinding) || (Object.create ? (functi
6
6
  if (k2 === undefined) k2 = k;
7
7
  o[k2] = m[k];
8
8
  }));
9
+ var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
10
+ Object.defineProperty(o, "default", { enumerable: true, value: v });
11
+ }) : function(o, v) {
12
+ o["default"] = v;
13
+ });
9
14
  var __exportStar = (this && this.__exportStar) || function(m, exports) {
10
15
  for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
11
16
  };
17
+ var __importStar = (this && this.__importStar) || function (mod) {
18
+ if (mod && mod.__esModule) return mod;
19
+ var result = {};
20
+ if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
21
+ __setModuleDefault(result, mod);
22
+ return result;
23
+ };
12
24
  Object.defineProperty(exports, "__esModule", { value: true });
13
- __exportStar(require("./tss"), exports);
25
+ exports.Schnorr = exports.HashCommitment = void 0;
14
26
  __exportStar(require("./curves"), exports);
27
+ __exportStar(require("./openssl"), exports);
28
+ __exportStar(require("./shamir"), exports);
29
+ __exportStar(require("./tss"), exports);
30
+ exports.HashCommitment = __importStar(require("./hashCommitment"));
31
+ exports.Schnorr = __importStar(require("./schnorrProof"));
32
+ __exportStar(require("./types"), exports);
15
33
  __exportStar(require("./util"), exports);
16
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi9zcmMvaW5kZXgudHMiXSwibmFtZXMiOltdLCJtYXBwaW5ncyI6Ijs7Ozs7Ozs7Ozs7O0FBQUEsd0NBQXNCO0FBQ3RCLDJDQUF5QjtBQUN6Qix5Q0FBdUIiLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgKiBmcm9tICcuL3Rzcyc7XG5leHBvcnQgKiBmcm9tICcuL2N1cnZlcyc7XG5leHBvcnQgKiBmcm9tICcuL3V0aWwnO1xuIl19
34
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,22 @@
1
+ /// <reference types="node" />
2
+ import { BaseCurve as Curve } from './curves';
3
+ import { SchnorrProof } from './types';
4
+ /**
5
+ * Create a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
6
+ * @param A The curve point.
7
+ * @param a The discrete log of the curve point.
8
+ * @param curve The elliptic curve.
9
+ * @param additionalCtx Additional contextual information to associate with the proof.
10
+ * @returns The created proof.
11
+ */
12
+ export declare function createSchnorrProof(A: bigint, a: bigint, curve: Curve, additionalCtx?: Buffer): SchnorrProof;
13
+ /**
14
+ * Verify a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
15
+ * @param A The curve point.
16
+ * @param proof The schnorr proof.
17
+ * @param curve The elliptic curve.
18
+ * @param additionalCtx Additional contextual information that is supposed to associate with the proof.
19
+ * @returns True if the proof checks out.
20
+ */
21
+ export declare function verifySchnorrProof(A: bigint, proof: SchnorrProof, curve: Curve, additionalCtx?: Buffer): boolean;
22
+ //# sourceMappingURL=schnorrProof.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"schnorrProof.d.ts","sourceRoot":"","sources":["../../src/schnorrProof.ts"],"names":[],"mappings":";AAKA,OAAO,EAAE,SAAS,IAAI,KAAK,EAAE,MAAM,UAAU,CAAC;AAC9C,OAAO,EAAE,YAAY,EAAE,MAAM,SAAS,CAAC;AAGvC;;;;;;;GAOG;AACH,wBAAgB,kBAAkB,CAChC,CAAC,EAAE,MAAM,EACT,CAAC,EAAE,MAAM,EACT,KAAK,EAAE,KAAK,EACZ,aAAa,GAAE,MAAwB,GACtC,YAAY,CAYd;AAuBD;;;;;;;GAOG;AACH,wBAAgB,kBAAkB,CAChC,CAAC,EAAE,MAAM,EACT,KAAK,EAAE,YAAY,EACnB,KAAK,EAAE,KAAK,EACZ,aAAa,GAAE,MAAwB,GACtC,OAAO,CAQT"}
@@ -0,0 +1,62 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ exports.verifySchnorrProof = exports.createSchnorrProof = void 0;
4
+ /**
5
+ * Implementation of Schnorr Non-interactive Zero-Knowledge Proof.
6
+ * @see {@link https://datatracker.ietf.org/doc/rfc8235/}
7
+ */
8
+ const crypto_1 = require("crypto");
9
+ const util_1 = require("./util");
10
+ /**
11
+ * Create a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
12
+ * @param A The curve point.
13
+ * @param a The discrete log of the curve point.
14
+ * @param curve The elliptic curve.
15
+ * @param additionalCtx Additional contextual information to associate with the proof.
16
+ * @returns The created proof.
17
+ */
18
+ function createSchnorrProof(A, a, curve, additionalCtx = Buffer.from('')) {
19
+ const v = curve.scalarRandom();
20
+ const V = curve.basePointMult(v);
21
+ const c = nonInteractiveChallenge(V, A, curve, additionalCtx);
22
+ const r = curve.scalarSub(v, curve.scalarMult(a, c));
23
+ return {
24
+ vPoint: V,
25
+ r: r,
26
+ };
27
+ }
28
+ exports.createSchnorrProof = createSchnorrProof;
29
+ /**
30
+ * Calculate challenge for NIZK schnorr proof using Fiat-Shamir transform.
31
+ *
32
+ * @param V The point/public value corresponding to the random scalar value v chosen by the prover.
33
+ * @param A The point to be proved.
34
+ * @param curve The elliptic curve.
35
+ * @param additionalCtx Additional contextual information to associate with the proof.
36
+ * @returns The calculated challenge.
37
+ */
38
+ function nonInteractiveChallenge(V, A, curve, additionalCtx) {
39
+ const G = curve.basePointMult(BigInt(1));
40
+ const hash = crypto_1.createHash('sha256');
41
+ hash.update(util_1.bigIntToBufferBE(G, 32));
42
+ hash.update(util_1.bigIntToBufferBE(V, 32));
43
+ hash.update(util_1.bigIntToBufferBE(A, 32));
44
+ hash.update(additionalCtx);
45
+ return util_1.bigIntFromBufferBE(hash.digest());
46
+ }
47
+ /**
48
+ * Verify a Schnorr Proof of knowledge of the discrete log of an Elliptic-curve point.
49
+ * @param A The curve point.
50
+ * @param proof The schnorr proof.
51
+ * @param curve The elliptic curve.
52
+ * @param additionalCtx Additional contextual information that is supposed to associate with the proof.
53
+ * @returns True if the proof checks out.
54
+ */
55
+ function verifySchnorrProof(A, proof, curve, additionalCtx = Buffer.from('')) {
56
+ const c = nonInteractiveChallenge(proof.vPoint, A, curve, additionalCtx);
57
+ const rG = curve.basePointMult(proof.r);
58
+ const cA = curve.pointMultiply(A, curve.scalarReduce(c));
59
+ return proof.vPoint === curve.pointAdd(rG, cA);
60
+ }
61
+ exports.verifySchnorrProof = verifySchnorrProof;
62
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,3 @@
1
+ export * from './types';
2
+ export * from './shamir';
3
+ //# sourceMappingURL=index.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../src/shamir/index.ts"],"names":[],"mappings":"AAAA,cAAc,SAAS,CAAC;AACxB,cAAc,UAAU,CAAC"}
@@ -0,0 +1,15 @@
1
+ "use strict";
2
+ var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
3
+ if (k2 === undefined) k2 = k;
4
+ Object.defineProperty(o, k2, { enumerable: true, get: function() { return m[k]; } });
5
+ }) : (function(o, m, k, k2) {
6
+ if (k2 === undefined) k2 = k;
7
+ o[k2] = m[k];
8
+ }));
9
+ var __exportStar = (this && this.__exportStar) || function(m, exports) {
10
+ for (var p in m) if (p !== "default" && !Object.prototype.hasOwnProperty.call(exports, p)) __createBinding(exports, m, p);
11
+ };
12
+ Object.defineProperty(exports, "__esModule", { value: true });
13
+ __exportStar(require("./types"), exports);
14
+ __exportStar(require("./shamir"), exports);
15
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvc2hhbWlyL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7OztBQUFBLDBDQUF3QjtBQUN4QiwyQ0FBeUIiLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgKiBmcm9tICcuL3R5cGVzJztcbmV4cG9ydCAqIGZyb20gJy4vc2hhbWlyJztcbiJdfQ==
@@ -0,0 +1,38 @@
1
+ import { BaseCurve } from '../curves';
2
+ import { SplitSecret } from './types';
3
+ export declare class Shamir {
4
+ curve: BaseCurve;
5
+ constructor(curve: BaseCurve);
6
+ /**
7
+ * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
8
+ * ways. The split secret requires `threshold` shares to be reconstructed.
9
+ *
10
+ * @param secret secret to split
11
+ * @param threshold share threshold required to reconstruct secret
12
+ * @param numShares total number of shares to split secret into
13
+ * @param indices optional indices which can be used while generating the shares
14
+ * @param salt optional salt which could be used while generating the shares
15
+ * @returns Dictionary containing `shares`, a dictionary where each key is an int
16
+ * in the range 1<=x<=numShares representing that share's free term, and `v`, an
17
+ * array of proofs to be shared with all participants.
18
+ */
19
+ split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt?: bigint): SplitSecret;
20
+ /**
21
+ * Verify a VSS share.
22
+ *
23
+ * @param u Secret share received from other party.
24
+ * @param v Verification values received from other party.
25
+ * @param index Verifier's index.
26
+ * @returns True on success; otherwise throws Error.
27
+ */
28
+ verify(u: bigint, v: Array<bigint>, index: number): boolean;
29
+ /**
30
+ * Reconstitute a secret from a dictionary of shares. The number of shares must
31
+ * be equal to `t` to reconstitute the original secret.
32
+ *
33
+ * @param shares dictionary of shares. each key is the free term of the share
34
+ * @returns secret
35
+ */
36
+ combine(shares: Record<number, bigint>): bigint;
37
+ }
38
+ //# sourceMappingURL=shamir.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"shamir.d.ts","sourceRoot":"","sources":["../../../src/shamir/shamir.ts"],"names":[],"mappings":"AACA,OAAO,EAAE,SAAS,EAAE,MAAM,WAAW,CAAC;AACtC,OAAO,EAAE,WAAW,EAAE,MAAM,SAAS,CAAC;AAGtC,qBAAa,MAAM;IACjB,KAAK,EAAE,SAAS,CAAC;gBAEL,KAAK,EAAE,SAAS;IAI5B;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,MAAM,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,SAAS,EAAE,MAAM,EAAE,OAAO,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,IAAI,SAAY,GAAG,WAAW;IA8CnH;;;;;;;OAOG;IACH,MAAM,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,KAAK,EAAE,MAAM,GAAG,OAAO;IAsB3D;;;;;;OAMG;IACH,OAAO,CAAC,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,GAAG,MAAM;CA+BhD"}
@@ -0,0 +1,136 @@
1
+ "use strict";
2
+ var __importDefault = (this && this.__importDefault) || function (mod) {
3
+ return (mod && mod.__esModule) ? mod : { "default": mod };
4
+ };
5
+ Object.defineProperty(exports, "__esModule", { value: true });
6
+ exports.Shamir = void 0;
7
+ const crypto_1 = __importDefault(require("crypto"));
8
+ const util_1 = require("../util");
9
+ class Shamir {
10
+ constructor(curve) {
11
+ this.curve = curve;
12
+ }
13
+ /**
14
+ * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`
15
+ * ways. The split secret requires `threshold` shares to be reconstructed.
16
+ *
17
+ * @param secret secret to split
18
+ * @param threshold share threshold required to reconstruct secret
19
+ * @param numShares total number of shares to split secret into
20
+ * @param indices optional indices which can be used while generating the shares
21
+ * @param salt optional salt which could be used while generating the shares
22
+ * @returns Dictionary containing `shares`, a dictionary where each key is an int
23
+ * in the range 1<=x<=numShares representing that share's free term, and `v`, an
24
+ * array of proofs to be shared with all participants.
25
+ */
26
+ split(secret, threshold, numShares, indices, salt = BigInt(0)) {
27
+ let bigIndices;
28
+ if (indices) {
29
+ bigIndices = indices.map((i) => {
30
+ if (i < 1) {
31
+ throw new Error('Invalid value supplied for indices');
32
+ }
33
+ return BigInt(i);
34
+ });
35
+ }
36
+ else {
37
+ // make range(1, n + 1)
38
+ bigIndices = Array(numShares)
39
+ .fill(null)
40
+ .map((_, i) => BigInt(i + 1));
41
+ }
42
+ if (threshold < 2) {
43
+ throw new Error('Threshold cannot be less than two');
44
+ }
45
+ if (threshold > numShares) {
46
+ throw new Error('Threshold cannot be greater than the total number of shares');
47
+ }
48
+ const coefs = [];
49
+ const v = [];
50
+ for (let ind = 0; ind < threshold - 1; ind++) {
51
+ const coeff = util_1.clamp(util_1.bigIntFromBufferLE(crypto_1.default.createHmac('sha256', ind.toString(10)).update(util_1.bigIntToBufferLE(secret, 32)).digest()));
52
+ coefs.push(coeff);
53
+ v.unshift(this.curve.basePointMult(coeff));
54
+ }
55
+ coefs.push(secret);
56
+ const shares = {};
57
+ for (let ind = 0; ind < bigIndices.length; ind++) {
58
+ const x = bigIndices[ind];
59
+ let partial = coefs[0];
60
+ for (let other = 1; other < coefs.length; other++) {
61
+ partial = this.curve.scalarAdd(coefs[other], this.curve.scalarMult(partial, x));
62
+ }
63
+ shares[parseInt(x.toString(), 10)] = partial;
64
+ }
65
+ return { shares, v };
66
+ }
67
+ /**
68
+ * Verify a VSS share.
69
+ *
70
+ * @param u Secret share received from other party.
71
+ * @param v Verification values received from other party.
72
+ * @param index Verifier's index.
73
+ * @returns True on success; otherwise throws Error.
74
+ */
75
+ verify(u, v, index) {
76
+ if (v.length < 2) {
77
+ throw new Error('Threshold cannot be less than two');
78
+ }
79
+ if (index < 1) {
80
+ throw new Error('Invalid value supplied for index');
81
+ }
82
+ const i = BigInt(index);
83
+ let x = v[0];
84
+ let t = BigInt(1);
85
+ for (const vsj of v.slice(1)) {
86
+ t = this.curve.scalarMult(t, i);
87
+ const vjt = this.curve.pointMultiply(vsj, t);
88
+ x = this.curve.pointAdd(x, vjt);
89
+ }
90
+ const sigmaG = this.curve.basePointMult(u);
91
+ if (x !== sigmaG) {
92
+ throw new Error('Could not verify share');
93
+ }
94
+ return true;
95
+ }
96
+ /**
97
+ * Reconstitute a secret from a dictionary of shares. The number of shares must
98
+ * be equal to `t` to reconstitute the original secret.
99
+ *
100
+ * @param shares dictionary of shares. each key is the free term of the share
101
+ * @returns secret
102
+ */
103
+ combine(shares) {
104
+ try {
105
+ let s = BigInt(0);
106
+ for (const i in shares) {
107
+ const yi = shares[i];
108
+ const xi = BigInt(i);
109
+ let num = BigInt(1);
110
+ let denum = BigInt(1);
111
+ for (const j in shares) {
112
+ const xj = BigInt(j);
113
+ if (xi !== xj) {
114
+ num = this.curve.scalarMult(num, xj);
115
+ }
116
+ }
117
+ for (const j in shares) {
118
+ const xj = BigInt(j);
119
+ if (xi !== xj) {
120
+ denum = this.curve.scalarMult(denum, this.curve.scalarSub(xj, xi));
121
+ }
122
+ }
123
+ const inverted = this.curve.scalarInvert(denum);
124
+ const innerMultiplied = this.curve.scalarMult(num, inverted);
125
+ const multiplied = this.curve.scalarMult(innerMultiplied, yi);
126
+ s = this.curve.scalarAdd(multiplied, s);
127
+ }
128
+ return s;
129
+ }
130
+ catch (error) {
131
+ throw new Error('Failed to combine Shamir shares , ' + error);
132
+ }
133
+ }
134
+ }
135
+ exports.Shamir = Shamir;
136
+ //# sourceMappingURL=data:application/json;base64,{"version":3,"file":"shamir.js","sourceRoot":"","sources":["../../../src/shamir/shamir.ts"],"names":[],"mappings":";;;;;;AAAA,oDAA4B;AAG5B,kCAAsE;AAEtE,MAAa,MAAM;IAGjB,YAAY,KAAgB;QAC1B,IAAI,CAAC,KAAK,GAAG,KAAK,CAAC;IACrB,CAAC;IAED;;;;;;;;;;;;OAYG;IACH,KAAK,CAAC,MAAc,EAAE,SAAiB,EAAE,SAAiB,EAAE,OAAuB,EAAE,IAAI,GAAG,MAAM,CAAC,CAAC,CAAC;QACnG,IAAI,UAAyB,CAAC;QAC9B,IAAI,OAAO,EAAE;YACX,UAAU,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,EAAE,EAAE;gBAC7B,IAAI,CAAC,GAAG,CAAC,EAAE;oBACT,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;iBACvD;gBACD,OAAO,MAAM,CAAC,CAAC,CAAC,CAAC;YACnB,CAAC,CAAC,CAAC;SACJ;aAAM;YACL,uBAAuB;YACvB,UAAU,GAAG,KAAK,CAAC,SAAS,CAAC;iBAC1B,IAAI,CAAC,IAAI,CAAC;iBACV,GAAG,CAAC,CAAC,CAAC,EAAE,CAAC,EAAE,EAAE,CAAC,MAAM,CAAC,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;SACjC;QACD,IAAI,SAAS,GAAG,CAAC,EAAE;YACjB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;SACtD;QAED,IAAI,SAAS,GAAG,SAAS,EAAE;YACzB,MAAM,IAAI,KAAK,CAAC,6DAA6D,CAAC,CAAC;SAChF;QAED,MAAM,KAAK,GAAa,EAAE,CAAC;QAC3B,MAAM,CAAC,GAAkB,EAAE,CAAC;QAC5B,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,SAAS,GAAG,CAAC,EAAE,GAAG,EAAE,EAAE;YAC5C,MAAM,KAAK,GAAG,YAAK,CACjB,yBAAkB,CAAC,gBAAM,CAAC,UAAU,CAAC,QAAQ,EAAE,GAAG,CAAC,QAAQ,CAAC,EAAE,CAAC,CAAC,CAAC,MAAM,CAAC,uBAAgB,CAAC,MAAM,EAAE,EAAE,CAAC,CAAC,CAAC,MAAM,EAAE,CAAC,CAChH,CAAC;YACF,KAAK,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC;YAClB,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,KAAK,CAAC,CAAC,CAAC;SAC5C;QACD,KAAK,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC;QAEnB,MAAM,MAAM,GAA2B,EAAE,CAAC;QAC1C,KAAK,IAAI,GAAG,GAAG,CAAC,EAAE,GAAG,GAAG,UAAU,CAAC,MAAM,EAAE,GAAG,EAAE,EAAE;YAChD,MAAM,CAAC,GAAG,UAAU,CAAC,GAAG,CAAC,CAAC;YAC1B,IAAI,OAAO,GAAG,KAAK,CAAC,CAAC,CAAC,CAAC;YACvB,KAAK,IAAI,KAAK,GAAG,CAAC,EAAE,KAAK,GAAG,KAAK,CAAC,MAAM,EAAE,KAAK,EAAE,EAAE;gBACjD,OAAO,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,KAAK,CAAC,KAAK,CAAC,EAAE,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,OAAO,EAAE,CAAC,CAAC,CAAC,CAAC;aACjF;YACD,MAAM,CAAC,QAAQ,CAAC,CAAC,CAAC,QAAQ,EAAE,EAAE,EAAE,CAAC,CAAC,GAAG,OAAO,CAAC;SAC9C;QACD,OAAO,EAAE,MAAM,EAAE,CAAC,EAAE,CAAC;IACvB,CAAC;IAED;;;;;;;OAOG;IACH,MAAM,CAAC,CAAS,EAAE,CAAgB,EAAE,KAAa;QAC/C,IAAI,CAAC,CAAC,MAAM,GAAG,CAAC,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;SACtD;QACD,IAAI,KAAK,GAAG,CAAC,EAAE;YACb,MAAM,IAAI,KAAK,CAAC,kCAAkC,CAAC,CAAC;SACrD;QACD,MAAM,CAAC,GAAG,MAAM,CAAC,KAAK,CAAC,CAAC;QACxB,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC,CAAC;QACb,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;QAClB,KAAK,MAAM,GAAG,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE;YAC5B,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,EAAE,CAAC,CAAC,CAAC;YAChC,MAAM,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,GAAG,EAAE,CAAC,CAAC,CAAC;YAC7C,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,EAAE,GAAG,CAAC,CAAC;SACjC;QACD,MAAM,MAAM,GAAG,IAAI,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,CAAC;QAC3C,IAAI,CAAC,KAAK,MAAM,EAAE;YAChB,MAAM,IAAI,KAAK,CAAC,wBAAwB,CAAC,CAAC;SAC3C;QACD,OAAO,IAAI,CAAC;IACd,CAAC;IAED;;;;;;OAMG;IACH,OAAO,CAAC,MAA8B;QACpC,IAAI;YACF,IAAI,CAAC,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;YAClB,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;gBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACrB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACrB,IAAI,GAAG,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBACpB,IAAI,KAAK,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;gBAEtB,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;oBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;oBACrB,IAAI,EAAE,KAAK,EAAE,EAAE;wBACb,GAAG,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,EAAE,EAAE,CAAC,CAAC;qBACtC;iBACF;gBACD,KAAK,MAAM,CAAC,IAAI,MAAM,EAAE;oBACtB,MAAM,EAAE,GAAG,MAAM,CAAC,CAAC,CAAC,CAAC;oBACrB,IAAI,EAAE,KAAK,EAAE,EAAE;wBACb,KAAK,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,KAAK,EAAE,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,EAAE,EAAE,EAAE,CAAC,CAAC,CAAC;qBACpE;iBACF;gBACD,MAAM,QAAQ,GAAG,IAAI,CAAC,KAAK,CAAC,YAAY,CAAC,KAAK,CAAC,CAAC;gBAChD,MAAM,eAAe,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,GAAG,EAAE,QAAQ,CAAC,CAAC;gBAC7D,MAAM,UAAU,GAAG,IAAI,CAAC,KAAK,CAAC,UAAU,CAAC,eAAe,EAAE,EAAE,CAAC,CAAC;gBAC9D,CAAC,GAAG,IAAI,CAAC,KAAK,CAAC,SAAS,CAAC,UAAU,EAAE,CAAC,CAAC,CAAC;aACzC;YACD,OAAO,CAAC,CAAC;SACV;QAAC,OAAO,KAAK,EAAE;YACd,MAAM,IAAI,KAAK,CAAC,oCAAoC,GAAG,KAAK,CAAC,CAAC;SAC/D;IACH,CAAC;CACF;AAtID,wBAsIC","sourcesContent":["import crypto from 'crypto';\nimport { BaseCurve } from '../curves';\nimport { SplitSecret } from './types';\nimport { bigIntFromBufferLE, bigIntToBufferLE, clamp } from '../util';\n\nexport class Shamir {\n  curve: BaseCurve;\n\n  constructor(curve: BaseCurve) {\n    this.curve = curve;\n  }\n\n  /**\n   * Perform Shamir sharing on the secret `secret` to the degree `threshold - 1` split `numShares`\n   * ways. The split secret requires `threshold` shares to be reconstructed.\n   *\n   * @param secret secret to split\n   * @param threshold share threshold required to reconstruct secret\n   * @param numShares total number of shares to split secret into\n   * @param indices optional indices which can be used while generating the shares\n   * @param salt optional salt which could be used while generating the shares\n   * @returns Dictionary containing `shares`, a dictionary where each key is an int\n   * in the range 1<=x<=numShares representing that share's free term, and `v`, an\n   * array of proofs to be shared with all participants.\n   */\n  split(secret: bigint, threshold: number, numShares: number, indices?: Array<number>, salt = BigInt(0)): SplitSecret {\n    let bigIndices: Array<bigint>;\n    if (indices) {\n      bigIndices = indices.map((i) => {\n        if (i < 1) {\n          throw new Error('Invalid value supplied for indices');\n        }\n        return BigInt(i);\n      });\n    } else {\n      // make range(1, n + 1)\n      bigIndices = Array(numShares)\n        .fill(null)\n        .map((_, i) => BigInt(i + 1));\n    }\n    if (threshold < 2) {\n      throw new Error('Threshold cannot be less than two');\n    }\n\n    if (threshold > numShares) {\n      throw new Error('Threshold cannot be greater than the total number of shares');\n    }\n\n    const coefs: bigint[] = [];\n    const v: Array<bigint> = [];\n    for (let ind = 0; ind < threshold - 1; ind++) {\n      const coeff = clamp(\n        bigIntFromBufferLE(crypto.createHmac('sha256', ind.toString(10)).update(bigIntToBufferLE(secret, 32)).digest())\n      );\n      coefs.push(coeff);\n      v.unshift(this.curve.basePointMult(coeff));\n    }\n    coefs.push(secret);\n\n    const shares: Record<number, bigint> = {};\n    for (let ind = 0; ind < bigIndices.length; ind++) {\n      const x = bigIndices[ind];\n      let partial = coefs[0];\n      for (let other = 1; other < coefs.length; other++) {\n        partial = this.curve.scalarAdd(coefs[other], this.curve.scalarMult(partial, x));\n      }\n      shares[parseInt(x.toString(), 10)] = partial;\n    }\n    return { shares, v };\n  }\n\n  /**\n   * Verify a VSS share.\n   *\n   * @param u Secret share received from other party.\n   * @param v Verification values received from other party.\n   * @param index Verifier's index.\n   * @returns True on success; otherwise throws Error.\n   */\n  verify(u: bigint, v: Array<bigint>, index: number): boolean {\n    if (v.length < 2) {\n      throw new Error('Threshold cannot be less than two');\n    }\n    if (index < 1) {\n      throw new Error('Invalid value supplied for index');\n    }\n    const i = BigInt(index);\n    let x = v[0];\n    let t = BigInt(1);\n    for (const vsj of v.slice(1)) {\n      t = this.curve.scalarMult(t, i);\n      const vjt = this.curve.pointMultiply(vsj, t);\n      x = this.curve.pointAdd(x, vjt);\n    }\n    const sigmaG = this.curve.basePointMult(u);\n    if (x !== sigmaG) {\n      throw new Error('Could not verify share');\n    }\n    return true;\n  }\n\n  /**\n   * Reconstitute a secret from a dictionary of shares. The number of shares must\n   * be equal to `t` to reconstitute the original secret.\n   *\n   * @param shares dictionary of shares. each key is the free term of the share\n   * @returns secret\n   */\n  combine(shares: Record<number, bigint>): bigint {\n    try {\n      let s = BigInt(0);\n      for (const i in shares) {\n        const yi = shares[i];\n        const xi = BigInt(i);\n        let num = BigInt(1);\n        let denum = BigInt(1);\n\n        for (const j in shares) {\n          const xj = BigInt(j);\n          if (xi !== xj) {\n            num = this.curve.scalarMult(num, xj);\n          }\n        }\n        for (const j in shares) {\n          const xj = BigInt(j);\n          if (xi !== xj) {\n            denum = this.curve.scalarMult(denum, this.curve.scalarSub(xj, xi));\n          }\n        }\n        const inverted = this.curve.scalarInvert(denum);\n        const innerMultiplied = this.curve.scalarMult(num, inverted);\n        const multiplied = this.curve.scalarMult(innerMultiplied, yi);\n        s = this.curve.scalarAdd(multiplied, s);\n      }\n      return s;\n    } catch (error) {\n      throw new Error('Failed to combine Shamir shares , ' + error);\n    }\n  }\n}\n"]}
@@ -0,0 +1,5 @@
1
+ export declare type SplitSecret = {
2
+ shares: Record<number, bigint>;
3
+ v: bigint[];
4
+ };
5
+ //# sourceMappingURL=types.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"types.d.ts","sourceRoot":"","sources":["../../../src/shamir/types.ts"],"names":[],"mappings":"AAAA,oBAAY,WAAW,GAAG;IACxB,MAAM,EAAE,MAAM,CAAC,MAAM,EAAE,MAAM,CAAC,CAAC;IAC/B,CAAC,EAAE,MAAM,EAAE,CAAC;CACb,CAAC"}
@@ -0,0 +1,3 @@
1
+ "use strict";
2
+ Object.defineProperty(exports, "__esModule", { value: true });
3
+ //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoidHlwZXMuanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi9zcmMvc2hhbWlyL3R5cGVzLnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiIiLCJzb3VyY2VzQ29udGVudCI6WyJleHBvcnQgdHlwZSBTcGxpdFNlY3JldCA9IHtcbiAgc2hhcmVzOiBSZWNvcmQ8bnVtYmVyLCBiaWdpbnQ+O1xuICB2OiBiaWdpbnRbXTtcbn07XG4iXX0=
@@ -1,3 +1,6 @@
1
1
  export * as EcdsaTypes from './types';
2
2
  export * as EcdsaRangeProof from './rangeproof';
3
+ export * as EcdsaPaillierProof from './paillierproof';
4
+ export * as EcdsaZkVProof from './zkVProof';
5
+ export declare const minModulusBitLength = 3072;
3
6
  //# sourceMappingURL=index.d.ts.map
@@ -1 +1 @@
1
- {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/tss/ecdsa/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,UAAU,MAAM,SAAS,CAAC;AACtC,OAAO,KAAK,eAAe,MAAM,cAAc,CAAC"}
1
+ {"version":3,"file":"index.d.ts","sourceRoot":"","sources":["../../../../src/tss/ecdsa/index.ts"],"names":[],"mappings":"AAAA,OAAO,KAAK,UAAU,MAAM,SAAS,CAAC;AACtC,OAAO,KAAK,eAAe,MAAM,cAAc,CAAC;AAChD,OAAO,KAAK,kBAAkB,MAAM,iBAAiB,CAAC;AACtD,OAAO,KAAK,aAAa,MAAM,YAAY,CAAC;AAE5C,eAAO,MAAM,mBAAmB,OAAO,CAAC"}
@@ -19,7 +19,10 @@ var __importStar = (this && this.__importStar) || function (mod) {
19
19
  return result;
20
20
  };
21
21
  Object.defineProperty(exports, "__esModule", { value: true });
22
- exports.EcdsaRangeProof = exports.EcdsaTypes = void 0;
22
+ exports.minModulusBitLength = exports.EcdsaZkVProof = exports.EcdsaPaillierProof = exports.EcdsaRangeProof = exports.EcdsaTypes = void 0;
23
23
  exports.EcdsaTypes = __importStar(require("./types"));
24
24
  exports.EcdsaRangeProof = __importStar(require("./rangeproof"));
25
- //# sourceMappingURL=data:application/json;base64,eyJ2ZXJzaW9uIjozLCJmaWxlIjoiaW5kZXguanMiLCJzb3VyY2VSb290IjoiIiwic291cmNlcyI6WyIuLi8uLi8uLi8uLi9zcmMvdHNzL2VjZHNhL2luZGV4LnRzIl0sIm5hbWVzIjpbXSwibWFwcGluZ3MiOiI7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7Ozs7QUFBQSxzREFBc0M7QUFDdEMsZ0VBQWdEIiwic291cmNlc0NvbnRlbnQiOlsiZXhwb3J0ICogYXMgRWNkc2FUeXBlcyBmcm9tICcuL3R5cGVzJztcbmV4cG9ydCAqIGFzIEVjZHNhUmFuZ2VQcm9vZiBmcm9tICcuL3JhbmdlcHJvb2YnO1xuIl19
25
+ exports.EcdsaPaillierProof = __importStar(require("./paillierproof"));
26
+ exports.EcdsaZkVProof = __importStar(require("./zkVProof"));
27
+ exports.minModulusBitLength = 3072;
28
+ //# sourceMappingURL=data:application/json;base64,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
@@ -0,0 +1,24 @@
1
+ export declare const alpha = 319567;
2
+ export declare const m: number;
3
+ /**
4
+ * Generate a set of challenges $p$ for a given paillier public key modulus $n$.
5
+ * @param n - paillier public key modulus
6
+ * @returns {Promise<Array<bigint>>} - array of challenges $p_i$
7
+ */
8
+ export declare function generateP(n: bigint): Promise<Array<bigint>>;
9
+ /**
10
+ * Generate a set of proofs $sigma$ for a given set of challenges $p$ using the paillier public key modulus $n$ and the private key $\lambda$.
11
+ * @param n - paillier public key modulus $n$
12
+ * @param lambda - private key $\lambda, which is the $\euler(N) = (p-1)(q-1)$
13
+ * @param p - array of challenges $p$
14
+ * @returns {Promise<Array<bigint>>} - array of proofs $\sigma$
15
+ */
16
+ export declare function prove(n: bigint, lambda: bigint, p: Array<bigint>): bigint[];
17
+ /**
18
+ * Verify a set of proofs $\sigma$ on the modulus $n$ using the challenges $p$ that were provided to the prover to generate the proofs.
19
+ * @param n - paillier public key modulus $n$
20
+ * @param p - array of challenges $p$
21
+ * @param sigma - array of proofs $\sigma$
22
+ */
23
+ export declare function verify(n: bigint, p: Array<bigint>, sigma: Array<bigint>): boolean;
24
+ //# sourceMappingURL=paillierproof.d.ts.map
@@ -0,0 +1 @@
1
+ {"version":3,"file":"paillierproof.d.ts","sourceRoot":"","sources":["../../../../src/tss/ecdsa/paillierproof.ts"],"names":[],"mappings":"AAWA,eAAO,MAAM,KAAK,SAAS,CAAC;AAC5B,eAAO,MAAM,CAAC,QAAkC,CAAC;AAEjD;;;;GAIG;AACH,wBAAsB,SAAS,CAAC,CAAC,EAAE,MAAM,GAAG,OAAO,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CASjE;AAED;;;;;;GAMG;AACH,wBAAgB,KAAK,CAAC,CAAC,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,MAAM,EAAE,CAM3E;AAED;;;;;GAKG;AACH,wBAAgB,MAAM,CAAC,CAAC,EAAE,MAAM,EAAE,CAAC,EAAE,KAAK,CAAC,MAAM,CAAC,EAAE,KAAK,EAAE,KAAK,CAAC,MAAM,CAAC,GAAG,OAAO,CAkCjF"}