Git Product home page Git Product logo

ice-frost's Introduction

ICE-FROST

codecov example workflow

A modular Rust implementation of ICE-FROST: Identifiable Cheating Entity Flexible Round-Optimised Schnorr Threshold signatures supporting static group keys.

Usage

Please see the documentation for usage examples.

Modular Backend

This library has a modular backend supporting

  • arbitrary curves defined with the arkworks library suite;
  • arbitrary hash functions for the internal random oracles of the ICE-FROST ciphersuite;
  • an arbitrary AEAD for the secret shares encryption part of the DKG / Key resharing phase.

Note however that two parameters are not modular, at least in the current version:

  • the hash function targeted security parameter: this crate assumes 128 bits of collision security for the ciphersuite's internal hashers. One MUST provide a hasher with at least 128 bits of collision security when instantiating an ICE-FROST ciphersuite.
  • the secret share encryption mechanism: this part of the distributed key generation currently relies on the ciphersuite's AEAD but with a fixed HKDF instantiated from SHA-256.

This library also provides by default an example instantiation over the Secp256k1 curve with SHA-256, to be used in tests and benchmarks.

Note on no_std usage

This crate can be made no_std compliant, by relying on the alloc crate instead.

Features

  • std: activated by-default, allowing use of the Rust standard library
  • asm: deactivated by-default, allowing x86-64 assembly optimization for finite field operations. This feature also activates the std one.

WARNING

This codebase is under development and is at an academic proof-of-concept prototype level. In particular, this implementation has not received careful code review yet, and hence is NOT ready for production use.

License

Licensed under either of

at your option.

ice-frost's People

Contributors

dvdplm avatar nashtare avatar sebastiendan avatar shuoer86 avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

ice-frost's Issues

Add support for submitting prehashed messages

Is your proposal related to a problem?

Yes, the SignatureAggregator takes the original message and handles the hashing at the finalization step.

Describe the solution you'd like

It should be possible to instantiate it if the message has been pre-hashed.

Refactor key generation module testing suite

Similarly to what is done on the signature module, a lot of code duplication could be alleviated across unit tests with some refactoring, that would ease reviewing / maintaining these.

Prepare for crates.io release

Checks to do before official release:

  • add a CHANGELOG.md
  • add a SECURITY.md
  • check rustdoc
  • check documentation/README
  • ...

Add additional sanity checks on the whole DKG process

Related to the item mentioned in #28, we would probably need additional sanity checks on the resharing phase.
There also needs to be a clear line drawn between what the protocol enforces, and what is expected to be done outside of this library (for instance the use of authenticated broadcast mechanism is explicitly required externally).

  • resharing from a single party (part of #29)
  • resharing to a single party (part of #29)
  • resharing from a non-ICE-FROST single individual (done in #36)
  • ...

[CI] Fix code coverage display in README

The README's coverage icon currently displays "unknown" for the code coverage report, although everything seems to be running fine on the CI, see below:

Screenshot 2023-05-01 at 1 26 21 PM

It's a relatively low-priority issue though.

Proposal for serialization support

We currently support two types of encoding:

  • CanonicalSerialize / CanonicalDeserialize -> those are easily derived as all our wrapper types rely on arkworks traits that do implement those;
  • custom to_bytes / from_bytes inherited from the old codebase, which are simply calling CanonicalSerialize / CanonicalDeserialize methods internally.

This issue concerns two points related to serialization:

  • addressing the code duplication induced by all the custom to_bytes / from_bytes methods through new traits, like Encode/ToBytes and Decode/FromBytes (names are arbitrary and not carved in marble), which would be supertraits of CanonicalSerialize and CanonicalDeserialize respectively.

  • We may want to additionally support serde behind some feature flag for all our public types. This could actually remove the need for a custom serialization mechanism, or be complementary to it (for users who would like to rely on as few extra dependencies as possible and stick to the custom Encode/Decode).

Any thoughts?

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.