Skip to content

Commit 6cc0975

Browse files
committed
pull in anti nonce covert siechan upstream PR
bitcoin-core/secp256k1#637
1 parent 4937b8c commit 6cc0975

File tree

10 files changed

+925
-19
lines changed

10 files changed

+925
-19
lines changed

configure.ac

+1-1
Original file line numberDiff line numberDiff line change
@@ -396,7 +396,7 @@ export AR_FLAGS
396396
export LD
397397
export LDFLAGS
398398
# Shift: --with-ecmult-window=2 to reduce memory consumption
399-
ac_configure_args="${ac_configure_args} --disable-shared ${secp_jni} --with-pic --with-bignum=no --enable-experimental --enable-module-recovery --enable-module-ecdh --enable-module-rangeproof --enable-module-surjectionproof --enable-module-whitelist --enable-module-generator --enable-openssl-tests=no --enable-tests=no --enable-exhaustive-tests=no --enable-benchmark=no --disable-dependency-tracking --with-ecmult-window=2"
399+
ac_configure_args="${ac_configure_args} --disable-shared ${secp_jni} --with-pic --with-bignum=no --enable-experimental --enable-module-ecdsa-sign-to-contract --enable-module-ecdh --enable-module-rangeproof --enable-module-surjectionproof --enable-module-whitelist --enable-module-generator --enable-openssl-tests=no --enable-tests=no --enable-exhaustive-tests=no --enable-benchmark=no --disable-dependency-tracking --with-ecmult-window=2"
400400
AC_CONFIG_SUBDIRS([src/secp256k1])
401401

402402

src/secp256k1/Makefile.am

+4
Original file line numberDiff line numberDiff line change
@@ -197,3 +197,7 @@ endif
197197
if ENABLE_MODULE_SURJECTIONPROOF
198198
include src/modules/surjection/Makefile.am.include
199199
endif
200+
201+
if ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT
202+
include src/modules/ecdsa_sign_to_contract/Makefile.am.include
203+
endif

src/secp256k1/configure.ac

+32-17
Original file line numberDiff line numberDiff line change
@@ -159,6 +159,11 @@ AC_ARG_ENABLE(module_whitelist,
159159
[enable_module_whitelist=$enableval],
160160
[enable_module_whitelist=no])
161161

162+
AC_ARG_ENABLE(module_ecdsa_sign_to_contract,
163+
AS_HELP_STRING([--enable-module-ecdsa-sign-to-contract],[enable ECDSA sign-to-contract module [default=no]]),
164+
[enable_module_ecdsa_sign_to_contract=$enableval],
165+
[enable_module_ecdsa_sign_to_contract=no])
166+
162167
AC_ARG_ENABLE(external_default_callbacks,
163168
AS_HELP_STRING([--enable-external-default-callbacks],[enable external default callback functions [default=no]]),
164169
[use_external_default_callbacks=$enableval],
@@ -561,6 +566,10 @@ if test x"$enable_module_surjectionproof" = x"yes"; then
561566
AC_DEFINE(ENABLE_MODULE_SURJECTIONPROOF, 1, [Define this symbol to enable the surjection proof module])
562567
fi
563568

569+
if test x"$enable_module_ecdsa_sign_to_contract" = x"yes"; then
570+
AC_DEFINE(ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT, 1, [Define this symbol to enable the ECDSA sign-to-contract module])
571+
fi
572+
564573
AC_C_BIGENDIAN()
565574

566575
if test x"$use_external_asm" = x"yes"; then
@@ -576,6 +585,7 @@ if test x"$enable_experimental" = x"yes"; then
576585
AC_MSG_NOTICE([WARNING: experimental build])
577586
AC_MSG_NOTICE([Experimental features do not have stable APIs or properties, and may not be safe for production use.])
578587
AC_MSG_NOTICE([Building ECDH module: $enable_module_ecdh])
588+
AC_MSG_NOTICE([Building ECDSA sign-to-contract module: $enable_module_ecdsa_sign_to_contract])
579589
AC_MSG_NOTICE([Building NUMS generator module: $enable_module_generator])
580590
AC_MSG_NOTICE([Building range proof module: $enable_module_rangeproof])
581591
AC_MSG_NOTICE([Building key whitelisting module: $enable_module_whitelist])
@@ -609,6 +619,9 @@ else
609619
if test x"$enable_module_ecdh" = x"yes"; then
610620
AC_MSG_ERROR([ECDH module is experimental. Use --enable-experimental to allow.])
611621
fi
622+
if test x"$enable_module_ecdsa_sign_to_contract" = x"yes"; then
623+
AC_MSG_ERROR([ECDA sign-to-contract module module is experimental. Use --enable-experimental to allow.])
624+
fi
612625
if test x"$enable_module_schnorrsig" = x"yes"; then
613626
AC_MSG_ERROR([schnorrsig module is experimental. Use --enable-experimental to allow.])
614627
fi
@@ -648,6 +661,7 @@ AM_CONDITIONAL([ENABLE_MODULE_ECDH], [test x"$enable_module_ecdh" = x"yes"])
648661
AM_CONDITIONAL([ENABLE_MODULE_SCHNORRSIG], [test x"$enable_module_schnorrsig" = x"yes"])
649662
AM_CONDITIONAL([ENABLE_MODULE_MUSIG], [test x"$enable_module_musig" = x"yes"])
650663
AM_CONDITIONAL([ENABLE_MODULE_RECOVERY], [test x"$enable_module_recovery" = x"yes"])
664+
AM_CONDITIONAL([ENABLE_MODULE_ECDSA_SIGN_TO_CONTRACT], [test x"$enable_module_ecdsa_sign_to_contract" = x"yes"])
651665
AM_CONDITIONAL([ENABLE_MODULE_GENERATOR], [test x"$enable_module_generator" = x"yes"])
652666
AM_CONDITIONAL([ENABLE_MODULE_RANGEPROOF], [test x"$enable_module_rangeproof" = x"yes"])
653667
AM_CONDITIONAL([ENABLE_MODULE_WHITELIST], [test x"$enable_module_whitelist" = x"yes"])
@@ -665,23 +679,24 @@ AC_OUTPUT
665679

666680
echo
667681
echo "Build Options:"
668-
echo " with endomorphism = $use_endomorphism"
669-
echo " with ecmult precomp = $set_precomp"
670-
echo " with external callbacks = $use_external_default_callbacks"
671-
echo " with jni = $use_jni"
672-
echo " with benchmarks = $use_benchmark"
673-
echo " with coverage = $enable_coverage"
674-
echo " module ecdh = $enable_module_ecdh"
675-
echo " module recovery = $enable_module_recovery"
682+
echo " with endomorphism = $use_endomorphism"
683+
echo " with ecmult precomp = $set_precomp"
684+
echo " with external callbacks = $use_external_default_callbacks"
685+
echo " with jni = $use_jni"
686+
echo " with benchmarks = $use_benchmark"
687+
echo " with coverage = $enable_coverage"
688+
echo " module ecdh = $enable_module_ecdh"
689+
echo " module recovery = $enable_module_recovery"
690+
echo " module ecdsa sign-to-contract = $enable_module_ecdsa_sign_to_contract"
676691
echo
677-
echo " asm = $set_asm"
678-
echo " bignum = $set_bignum"
679-
echo " field = $set_field"
680-
echo " scalar = $set_scalar"
681-
echo " ecmult window size = $set_ecmult_window"
692+
echo " asm = $set_asm"
693+
echo " bignum = $set_bignum"
694+
echo " field = $set_field"
695+
echo " scalar = $set_scalar"
696+
echo " ecmult window size = $set_ecmult_window"
682697
echo
683-
echo " CC = $CC"
684-
echo " CFLAGS = $CFLAGS"
685-
echo " CPPFLAGS = $CPPFLAGS"
686-
echo " LDFLAGS = $LDFLAGS"
698+
echo " CC = $CC"
699+
echo " CFLAGS = $CFLAGS"
700+
echo " CPPFLAGS = $CPPFLAGS"
701+
echo " LDFLAGS = $LDFLAGS"
687702
echo

src/secp256k1/include/secp256k1.h

+55
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,7 @@ extern "C" {
66
#endif
77

88
#include <stddef.h>
9+
#include <stdint.h>
910

1011
/* These rules specify the order of arguments in API calls:
1112
*
@@ -81,6 +82,29 @@ typedef struct {
8182
unsigned char data[64];
8283
} secp256k1_ecdsa_signature;
8384

85+
/** Data structure that holds a sign-to-contract ("s2c") opening information.
86+
* Sign-to-contract allows a signer to commit to some data as part of a signature. It
87+
* can be used as an Out-argument in certain signing functions.
88+
*
89+
* This structure is not opaque, but it is strongly discouraged to read or write to
90+
* it directly.
91+
*
92+
* The exact representation of data inside is implementation defined and not
93+
* guaranteed to be portable between different platforms or versions. It can
94+
* be safely copied/moved.
95+
*/
96+
typedef struct {
97+
/* magic is set during initialization */
98+
uint64_t magic;
99+
/* Public nonce before applying the sign-to-contract commitment */
100+
secp256k1_pubkey original_pubnonce;
101+
/* Byte indicating if signing algorithm negated the nonce. Alternatively when
102+
* verifying we could compute the EC commitment of original_pubnonce and the
103+
* data and negate if this would not be a valid nonce. But this would prevent
104+
* batch verification of sign-to-contract commitments. */
105+
int nonce_is_negated;
106+
} secp256k1_s2c_opening;
107+
84108
/** A pointer to a function to deterministically generate a nonce.
85109
*
86110
* Returns: 1 if a nonce was successfully generated. 0 will cause signing to fail.
@@ -444,6 +468,37 @@ SECP256K1_API int secp256k1_ecdsa_signature_serialize_compact(
444468
const secp256k1_ecdsa_signature* sig
445469
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);
446470

471+
/** Parse a sign-to-contract opening.
472+
*
473+
* Returns: 1 if the opening was fully valid.
474+
* 0 if the opening could not be parsed or is invalid.
475+
* Args: ctx: a secp256k1 context object.
476+
* Out: opening: pointer to an opening object. If 1 is returned, it is set to a
477+
* parsed version of input. If not, its value is undefined.
478+
* In: input34: pointer to 34-byte array with a serialized opening
479+
*
480+
*/
481+
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_s2c_opening_parse(
482+
const secp256k1_context* ctx,
483+
secp256k1_s2c_opening* opening,
484+
const unsigned char *input34
485+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);
486+
487+
/** Serialize a sign-to-contract opening into a byte sequence.
488+
*
489+
* Returns: 1 if the opening was successfully serialized.
490+
* 0 if the opening was not initializaed.
491+
* Args: ctx: a secp256k1 context object.
492+
* Out: output34: pointer to a 34-byte array to place the serialized opening
493+
* in.
494+
* In: opening: a pointer to an initialized `secp256k1_s2c_opening`.
495+
*/
496+
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_s2c_opening_serialize(
497+
const secp256k1_context* ctx,
498+
unsigned char *output34,
499+
const secp256k1_s2c_opening* opening
500+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);
501+
447502
/** Verify an ECDSA signature.
448503
*
449504
* Returns: 1: correct signature
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,129 @@
1+
#ifndef SECP256K1_ECDSA_ANTI_COVERT_CHANNEL_H
2+
#define SECP256K1_ECDSA_ANTI_COVERT_CHANNEL_H
3+
4+
#include "secp256k1.h"
5+
6+
#ifdef __cplusplus
7+
extern "C" {
8+
#endif
9+
10+
/** Same as secp256k1_ecdsa_sign, but s2c_data32 is committed to by adding `hash(R1, s2c_data32)` to
11+
* the nonce generated by noncefp, with `ndata=hash(s2c_data32, ndata)`.
12+
* Returns: 1: signature created
13+
* 0: the nonce generation function failed, or the private key was invalid.
14+
* Args: ctx: pointer to a context object, initialized for signing (cannot be NULL)
15+
* Out: sig: pointer to an array where the signature will be placed (cannot be NULL)
16+
* s2c_opening: pointer to an secp256k1_s2c_opening structure which can be
17+
* NULL but is required to be not NULL if this signature creates
18+
* a sign-to-contract commitment (i.e. the `s2c_data` argument
19+
* is not NULL). nonce_is_negated is always 0 for ecdsa.
20+
* In:
21+
* msg32: the 32-byte message hash being signed (cannot be NULL)
22+
* seckey: pointer to a 32-byte secret key (cannot be NULL)
23+
* s2c_data32: pointer to a 32-byte data to create an optional
24+
* sign-to-contract commitment to if not NULL (can be NULL).
25+
* noncefp: pointer to a nonce generation function.
26+
* If NULL, secp256k1_nonce_function_default is used.
27+
* Must be the default if s2c_data32 is not NULL.
28+
* ndata: pointer to arbitrary data used by the nonce generation function (can be NULL)
29+
*/
30+
SECP256K1_API int secp256k1_ecdsa_s2c_sign(
31+
const secp256k1_context* ctx,
32+
secp256k1_ecdsa_signature *sig,
33+
secp256k1_s2c_opening *s2c_opening,
34+
const unsigned char *msg32,
35+
const unsigned char *seckey,
36+
const unsigned char* s2c_data32,
37+
secp256k1_nonce_function noncefp,
38+
const void *ndata
39+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);
40+
41+
/** Verify a sign-to-contract commitment.
42+
*
43+
* Returns: 1: the signature contains a commitment to data32
44+
* 0: incorrect opening
45+
* Args: ctx: a secp256k1 context object, initialized for verification.
46+
* In: sig: the signature containing the sign-to-contract commitment (cannot be NULL)
47+
* data32: the 32-byte data that was committed to (cannot be NULL)
48+
* opening: pointer to the opening created during signing (cannot be NULL)
49+
*/
50+
SECP256K1_API int secp256k1_ecdsa_s2c_verify_commit(
51+
const secp256k1_context* ctx,
52+
const secp256k1_ecdsa_signature *sig,
53+
const unsigned char *data32,
54+
const secp256k1_s2c_opening *opening
55+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4);
56+
57+
/** Compute commitment on the client as part of the ECDSA Anti Nonce Covert Channel Protocol.
58+
*
59+
* ECDSA Anti Nonce Covert Channel Protocol:
60+
* 1. The host draws randomness `k2`, commits to it with sha256 and sends the commitment to the client.
61+
* 2. The client commits to its original nonce `k1` using the host commitment by calling
62+
* `secp256k1_ecdsa_anti_covert_channel_client_commit`. The client sends the resulting commitment
63+
* `R1` to the host.
64+
* 3. The host replies with `k2` generated in step 1.
65+
* 4. The client signs with `secp256k1_ecdsa_s2c_sign`, using the `k2` as `s2c_data` and
66+
* sends the signature and opening to the host.
67+
* 5. The host verifies that `R_x = (R1 + H(R1, k2)*G)_x`, where R_x is the `r` part of the signature by using
68+
* `secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify` with the client's
69+
* commitment from step 2 and the signature and opening received in step 4. If verification does
70+
* not succeed, the protocol failed and can be restarted.
71+
*
72+
* Returns 1 on success, 0 on failure.
73+
* Args: ctx: pointer to a context object (cannot be NULL)
74+
* Out: client_commit: pointer to a pubkey where the clients public nonce will be
75+
* placed. (cannot be NULL)
76+
* In: msg32: the 32-byte message hash to be signed (cannot be NULL)
77+
* seckey32: the 32-byte secret key used for signing (cannot be NULL)
78+
* noncefp: pointer to a nonce generation function. If NULL, secp256k1_nonce_function_default is used
79+
* rand_commitment32: the 32-byte randomness commitment from the host (cannot be NULL)
80+
*/
81+
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit(
82+
const secp256k1_context* ctx,
83+
secp256k1_pubkey *client_commit,
84+
const unsigned char *msg32,
85+
const unsigned char *seckey32,
86+
const unsigned char *rand_commitment32
87+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);
88+
89+
/** Create a randomness commitment on the host as part of the ECDSA Anti Nonce Covert Channel Protocol.
90+
*
91+
* Returns 1 on success, 0 on failure.
92+
* Args: ctx: pointer to a context object (cannot be NULL)
93+
* Out: rand_commitment32: pointer to 32-byte array to store the returned commitment (cannot be NULL)
94+
* In: rand32: the 32-byte randomness to commit to (cannot be NULL)
95+
*/
96+
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_commit(
97+
secp256k1_context *ctx,
98+
unsigned char *rand_commitment32,
99+
const unsigned char *rand32
100+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3);
101+
102+
/** Verify that a clients signature contains the hosts randomness as part of the Anti
103+
* Nonce Covert Channel Protocol. Does not verify the signature itself.
104+
*
105+
* Returns 1 on success, 0 on failure.
106+
* Args: ctx: pointer to a context object (cannot be NULL)
107+
* In: sig: pointer to the signature whose randomness should be verified
108+
* (cannot be NULL)
109+
* rand32: pointer to the 32-byte randomness from the host which should
110+
* be included by the signature (cannot be NULL)
111+
* opening: pointer to the opening produced by the client when signing
112+
* with `rand32` as `s2c_data` (cannot be NULL)
113+
* client_commit: pointer to the client's commitment created in
114+
* `secp256k1_ecdsa_s2c_anti_nonce_covert_channel_client_commit`
115+
* (cannot be NULL)
116+
*/
117+
SECP256K1_API int secp256k1_ecdsa_s2c_anti_nonce_covert_channel_host_verify(
118+
secp256k1_context *ctx,
119+
const secp256k1_ecdsa_signature *sig,
120+
const unsigned char *rand32,
121+
const secp256k1_s2c_opening *opening,
122+
const secp256k1_pubkey *client_commit
123+
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5);
124+
125+
#ifdef __cplusplus
126+
}
127+
#endif
128+
129+
#endif /* SECP256K1_RECOVERY_H */
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
include_HEADERS += include/secp256k1_ecdsa_sign_to_contract.h
2+
noinst_HEADERS += src/modules/ecdsa_sign_to_contract/main_impl.h
3+
noinst_HEADERS += src/modules/ecdsa_sign_to_contract/tests_impl.h

0 commit comments

Comments
 (0)