arnaucube 644e740875 | 3 years ago | |
---|---|---|
.github/workflows | 3 years ago | |
v0 | 3 years ago | |
wasm | 3 years ago | |
.gitignore | 4 years ago | |
.golangci.yml | 4 years ago | |
LICENSE | 4 years ago | |
README.md | 3 years ago | |
blindsecp256k1.go | 3 years ago | |
blindsecp256k1_test.go | 3 years ago | |
go.mod | 3 years ago | |
go.sum | 3 years ago | |
parsers.go | 3 years ago | |
parsers_test.go | 3 years ago | |
uncompressed.go | 3 years ago | |
uncompressed_test.go | 3 years ago |
Blind signature over secp256k1, based on "New Blind Signature Schemes Based on the (Elliptic Curve) Discrete Logarithm Problem" paper by Hamid Mala & Nafiseh Nezhadansari.
WARNING: this repo is experimental, do not use in production.
The implementation of this repo is compatible with https://github.com/arnaucube/blindsecp256k1-js
import (
[...]
"github.com/arnaucube/go-blindsecp256k1"
)
[...]
// errors are not handled for simplicity of the example
// signer: create new signer key pair
sk, _ := blindsecp256k1.NewPrivateKey()
signerPubK := sk.Public()
// signer: when user requests new R parameter to blind a new msg,
// create new signerR (public) with its secret k
k, signerR, _ := blindsecp256k1.NewRequestParameters()
// user: blinds the msg using signer's R
msg := new(big.Int).SetBytes([]byte("test"))
msgBlinded, userSecretData, _ := blindsecp256k1.Blind(msg, signerR)
// signer: signs the blinded message using its private key & secret k
sBlind, _ := sk.BlindSign(msgBlinded, k)
// user: unblinds the blinded signature
sig := blindsecp256k1.Unblind(sBlind, userSecretData)
// signature can be verified with signer PublicKey
verified := blindsecp256k1.Verify(msg, sig, signerPubK)
assert.True(t, verified)
Compression & decompression (allows to compress a point & public key (64 bytes) into 33 bytes, and a signature (96 bytes) into 65 bytes):
p := blindsecp256k1.G // take the generator point as an example
// also, instead from G, we can start from a PublicKey, which can be converted
// into a Point with
p = pk.Point()
// compress point
b := p.Compress()
fmt.Println(hex.EncodeToString(b[:]))
// decompress point (recovering the original point)
p2, _ := blindsecp256k1.DecompressPoint(b)
assert.Equal(t, p, p2)
// compress signature
b = sig.Compress()
fmt.Println(hex.EncodeToString(b[:])) // 65 bytes
// decompress signature
sig2, _ := DecompressSignature(b)
assert.Equal(t, sig, sig2)
WASM wrappers for browser usage can be found at the wasm directory with an example in html&js.