Crates.io | w3f-bls |
lib.rs | w3f-bls |
version | 0.1.8 |
source | src |
created_at | 2023-04-16 11:11:11.689608 |
updated_at | 2024-10-30 07:13:25.113603 |
description | Aggregate BLS-like signatures |
homepage | https://github.com/w3f/bls |
repository | https://github.com/w3f/bls |
max_upload_size | |
id | 840480 |
size | 232,000 |
Boneh-Lynn-Shacham (BLS) signatures have slow signing, very slow verification, require slow and much less secure pairing friendly curves, and tend towards dangerous malleability. Yet, BLS permits a diverse array of signature aggregation options far beyond any other known signature scheme, which makes BLS a preferred scheme for voting in consensus algorithms and for threshold signatures.
In this crate, we take a largely unified approach to aggregation techniques and verifier optimisations for BLS signature: We support the BLS12-381 and BLS12-377 (Barreto-Lynn-Scott) curves via Arkworks traits, but abstract the pairing so that developers can choose their preferred orientation for BLS signatures. We provide aggregation techniques based on messages being distinct, on proofs-of-possession, and on delinearization, although we do not provide all known optimisations for delinearization.
We provide implementation of generation and verification proof-of-possession based on Schnorr Signature which is faster than using BLS Signature itself for this task.
We cannot claim these abstractions provide miss-use resistance, but they at least structure the problem, provide some guidlines, and maximize the relevance of warnings present in the documentation.
You first bring the bls
crate into your project just as you normally would.
use w3f_bls::{Keypair,ZBLS,Message,Signed};
let mut keypair = Keypair::<ZBLS>::generate(::rand::thread_rng());
let message = Message::new(b"Some context",b"Some message");
let sig = keypair.sign(&message);
assert!( sig.verify(&message,&keypair.public) );
In this example, sig
is a Signature<ZBLS>
which only contains signature. One can use Keypair::signed_message
method which returns a SignedMessage
struct that contains the message hash, the signer's public key, and of course the signature, but one should usually detach these constituents for wire formats.
Aggregated and blind signatures are almost the only reasons anyone would consider using BLS signatures, so we focus on aggregation here. We assume for brevity that sigs
is an array of SignedMessage
s, as one might construct like
As a rule, aggregation that requires distinct messages still requires one miller loop step per message, so aggregate signatures have rather slow verification times. You can nevertheless achieve quite small signature sizes like
#[cfg(feature = "experimental")]
use w3f_bls::{distinct::DistinctMessages, Keypair, Message, Signed, ZBLS};
#[cfg(feature = "experimental")]
{
let mut keypairs = [
Keypair::<ZBLS>::generate(::rand::thread_rng()),
Keypair::<ZBLS>::generate(::rand::thread_rng()),
];
let msgs = [
"The ships",
"hung in the sky",
"in much the same way",
"that bricks don’t.",
]
.iter()
.map(|m| Message::new(b"Some context", m.as_bytes()))
.collect::<Vec<_>>();
let sigs = msgs
.iter()
.zip(keypairs.iter_mut())
.map(|(m, k)| k.signed_message(m))
.collect::<Vec<_>>();
let dms = sigs
.iter()
.try_fold(DistinctMessages::<ZBLS>::new(), |dm, sig| dm.add(sig))
.unwrap();
let signature = <&DistinctMessages<ZBLS> as Signed>::signature(&&dms);
let publickeys = keypairs.iter().map(|k| k.public).collect::<Vec<_>>();
let mut dms = msgs
.into_iter()
.zip(publickeys)
.try_fold(
DistinctMessages::<ZBLS>::new(),
|dm, (message, publickey)| dm.add_message_n_publickey(message, publickey),
)
.unwrap();
dms.add_signature(&signature);
assert!(dms.verify())
}
Anyone who receives the already aggregated signature along with a list of messages and public keys might reconstruct the signature as shown in the above example.
We recommend distinct message aggregation like this primarily for verifying proofs-of-possession, meaning checking the self certificates for numerous keys.
Assuming you already have proofs-of-possession, then you'll want to do aggregation with BitPoPSignedMessage
or some variant tuned to your use case. We recommend more care when using SignatureAggregatorAssumingPoP
because it provides no mechanism for checking a proof-of-possession table.
The library offers method for generating and verifying proof of positions both based on BLS and Schnorr Signature which is faster to verify than when using BLS signature itself as proof of position. The following example demonstrate how to generate and verify proof of positions and then using SignatureAggregatorAssumingPoP
to batch and verify multiple BLS signatures.
use w3f_bls::{Keypair,PublicKey,ZBLS,Message,Signed, ProofOfPossessionGenerator, ProofOfPossession, schnorr_pop::{SchnorrPoP}, multi_pop_aggregator::MultiMessageSignatureAggregatorAssumingPoP};
use sha2::Sha256;
let mut keypairs = [Keypair::<ZBLS>::generate(::rand::thread_rng()), Keypair::<ZBLS>::generate(::rand::thread_rng())];
let msgs = ["The ships", "hung in the sky", "in much the same way", "that bricks don’t."].iter().map(|m| Message::new(b"Some context", m.as_bytes())).collect::<Vec<_>>();
let sigs = msgs.iter().zip(keypairs.iter_mut()).map(|(m,k)| k.sign(m)).collect::<Vec<_>>();
let publickeys = keypairs.iter().map(|k|k.public.clone()).collect::<Vec<_>>();
let pops = keypairs.iter_mut().map(|k|(ProofOfPossessionGenerator::<ZBLS, Sha256, PublicKey<ZBLS>, SchnorrPoP<ZBLS>>::generate_pok(k))).collect::<Vec<_>>();
//first make sure public keys have valid pop
let publickeys = publickeys.iter().zip(pops.iter()).map(|(publickey, pop) | {assert!(ProofOfPossession::<ZBLS, Sha256, PublicKey<ZBLS>>::verify(pop,publickey)); publickey}).collect::<Vec<_>>();
let batch_poped = msgs.iter().zip(publickeys).zip(sigs).fold(
MultiMessageSignatureAggregatorAssumingPoP::<ZBLS>::new(),
|mut bpop,((message, publickey),sig)| { bpop.add_message_n_publickey(message, &publickey); bpop.add_signature(&sig); bpop }
);
assert!(batch_poped.verify())
If you lack proofs-of-possesion, then delinearized approaches are provided in the delinear
module, but such schemes might require a more customised approach. However, note that currently only aggeration assuming proof of possession is maintained and the other strategies are experimental.
The scheme introduced in our recent paper
is implemented in chaum_pederson_signature.rs
using ChaumPedersonSigner
and ChaumPedersonVerifier
traits and in pop.rs
using add_auxiliary_public_key
and verify_using_aggregated_auxiliary_public_keys
functions which is demonestrated in the following example:
use sha2::Sha256;
use ark_bls12_377::Bls12_377;
use ark_ff::Zero;
use rand::thread_rng;
use w3f_bls::{
single_pop_aggregator::SignatureAggregatorAssumingPoP, DoublePublicKeyScheme, EngineBLS, Keypair, Message, PublicKey, PublicKeyInSignatureGroup, Signed, TinyBLS, TinyBLS377,
};
let message = Message::new(b"ctx", b"I'd far rather be happy than right any day.");
let mut keypairs: Vec<_> = (0..3)
.into_iter()
.map(|_| Keypair::<TinyBLS<Bls12_377, ark_bls12_377::Config>>::generate(thread_rng()))
.collect();
let pub_keys_in_sig_grp: Vec<PublicKeyInSignatureGroup<TinyBLS377>> = keypairs
.iter()
.map(|k| k.into_public_key_in_signature_group())
.collect();
let mut prover_aggregator =
SignatureAggregatorAssumingPoP::<TinyBLS377>::new(message.clone());
let mut aggregated_public_key =
PublicKey::<TinyBLS377>(<TinyBLS377 as EngineBLS>::PublicKeyGroup::zero());
//sign and aggegate
let _ = keypairs
.iter_mut()
.map(|k| {
prover_aggregator.add_signature(&k.sign(&message));
aggregated_public_key.0 += k.public.0;
})
.count();
let mut verifier_aggregator = SignatureAggregatorAssumingPoP::<TinyBLS377>::new(message);
verifier_aggregator.add_signature(&(&prover_aggregator).signature());
//aggregate public keys in signature group
verifier_aggregator.add_publickey(&aggregated_public_key);
pub_keys_in_sig_grp.iter().for_each(|pk| {verifier_aggregator.add_auxiliary_public_key(pk);});
assert!(
verifier_aggregator.verify_using_aggregated_auxiliary_public_keys::<Sha256>(),
"verifying with honest auxilary public key should pass"
);
In order to sign a message, the library needs to hash the message as a point on the signature curve. While BLSEngine
trait is agnostic about MapToSignatureCurve
method, our implementation of BLS12-381 (ZBLS
) and BLS12-377(BLS377
) specifically uses Wahby and Boneh hash to curve method described in Section of 6.6.3 of https://datatracker.ietf.org/doc/draft-irtf-cfrg-hash-to-curve/.
This library does not make any guarantees about constant-time operations, memory access patterns, or resistance to side-channel attacks.
Licensed under either of
at your option.
Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.