Beispiel #1
0
        public ServerCommitment[] SignHashes(SignaturesRequest sigRequest)
        {
            if (sigRequest == null)
            {
                throw new ArgumentNullException(nameof(sigRequest));
            }
            if (sigRequest.Hashes.Length != Parameters.GetTotalTransactionsCount())
            {
                throw new ArgumentException("Incorrect number of hashes, expected " + sigRequest.Hashes.Length);
            }
            AssertState(PromiseServerStates.WaitingHashes);
            List <ServerCommitment>   promises            = new List <ServerCommitment>();
            List <EncryptedSignature> encryptedSignatures = new List <EncryptedSignature>();

            foreach (var hash in sigRequest.Hashes)
            {
                var            ecdsa    = InternalState.EscrowKey.Sign(hash);
                var            ecdsaDER = ecdsa.ToDER();
                var            key      = new XORKey(Parameters.ServerKey);
                var            promise  = key.XOR(ecdsaDER);
                PuzzleSolution solution = new PuzzleSolution(key.ToBytes());
                var            puzzle   = Parameters.ServerKey.GeneratePuzzle(ref solution);
                promises.Add(new ServerCommitment(puzzle.PuzzleValue, promise));
                encryptedSignatures.Add(new EncryptedSignature(ecdsa, hash, solution));
            }
            InternalState.Status = PromiseServerStates.WaitingRevelation;
            InternalState.EncryptedSignatures = encryptedSignatures.ToArray();
            InternalState.FakeIndexesHash     = sigRequest.FakeIndexesHash;
            return(promises.ToArray());
        }
Beispiel #2
0
        public ServerCommitment[][] SignHashes(SignaturesRequest sigRequest)
        {
            // Almost done, just need to confirm a typo and a function.
            // Step 5

            if (sigRequest == null)
            {
                throw new ArgumentNullException(nameof(sigRequest));
            }

            var hashesCount = sigRequest.Hashes.Select(a => a.Length).Sum();

            if (hashesCount != Parameters.GetTotalTransactionsCount())
            {
                throw new ArgumentException($"Incorrect number of hashes, expected {Parameters.GetTotalTransactionsCount()}");
            }

            AssertState(PromiseServerStates.WaitingHashes);
            // 2D array of pairs of puzzles and promises (z_i, c_i).
            var promises = new ServerCommitment[Parameters.PaymentsCount][];
            // 2D array of encrypted signatures with their solutions.
            var encryptedSignatures = new EncryptedSignature[Parameters.PaymentsCount][];
            // 1-D array is used to store the epsilons for each column to be used when Hashing.
            var previousSolutions = new byte[Parameters.GetTotalTransactionsCountPerLevel()][];

            previousSolutions = previousSolutions.Select(a => new byte[0]).ToArray(); // Initialize to empty array of bytes
            for (int i = 0; i < Parameters.PaymentsCount; i++)
            {
                promises[i]            = new ServerCommitment[sigRequest.Hashes[i].Length]; // Initialization
                encryptedSignatures[i] = new EncryptedSignature[promises[i].Length];        // Initialization
                for (int j = 0; j < promises[i].Length; j++)
                {
                    var hash = sigRequest.Hashes[i][j];
                    // Sign the hash value
                    var ecdsa = InternalState.EscrowKey.Sign(hash);
                    // Convert Signature to Bytes.
                    var ecdsaDER = ecdsa.ToDER();
                    // This can be replaced by "Utils.GenerateEncryptableInteger(Key)" if padding when XORing is not important.
                    var key = (new XORKey(Parameters.ServerKey)).ToBytes(); // This just generates a random epsilon.
                    // Append the new epsilon to the list of epsilons we have for that column to create "epsilon_{i-1,j}|| . . . , epsilon_{0,j}".
                    previousSolutions[j] = Utils.Combine(key, previousSolutions[j]);
                    // Create the padded solution with the following format "i||j||epsilon_{i,j}||epsilon_{i-1,j}|| . . . , epsilon_{0,j}"
                    var paddedSolutions = new PuzzleSolution(Utils.Combine(NBitcoin.Utils.ToBytes((uint)i, true), NBitcoin.Utils.ToBytes((uint)j, true), previousSolutions[j]));
                    // Hash and XOR the padded solution with the signature we have.
                    var            promise  = XORKey.XOR(paddedSolutions._Value.ToByteArrayUnsigned(), ecdsaDER); // This function needs to be approved "XOR".
                    PuzzleSolution solution = new PuzzleSolution(key);                                            // Epsilon
                    // Encrypt the epsilon value using RSA
                    var puzzle = Parameters.ServerKey.GeneratePuzzle(ref solution);
                    promises[i][j]            = new ServerCommitment(puzzle.PuzzleValue, promise);
                    encryptedSignatures[i][j] = new EncryptedSignature(ecdsa, hash, solution);
                }
            }

            InternalState.Status = PromiseServerStates.WaitingRevelation;
            InternalState.EncryptedSignatures = encryptedSignatures;
            InternalState.FakeIndexesHash     = sigRequest.FakeIndexesHash;
            return(promises);
        }
        private bool IsValidSignature(PuzzleSolution solution, HashBase hash, out ECDSASignature signature)
        {
            signature = null;
            var escrow = EscrowScriptPubKeyParameters.GetFromCoin(InternalState.EscrowedCoin);

            try
            {
                var key = new XORKey(solution);
                signature = new ECDSASignature(key.XOR(hash.Commitment.Promise));
                var ok = escrow.Initiator.Verify(hash.GetHash(), signature);
                if (!ok)
                {
                    signature = null;
                }
                return(ok);
            }
            catch
            {
            }
            return(false);
        }
Beispiel #4
0
 private bool IsValidSignature(PuzzleSolution solution, HashBase hash, out PubKey signer, out ECDSASignature signature)
 {
     signer    = null;
     signature = null;
     try
     {
         var key = new XORKey(solution);
         signature = new ECDSASignature(key.XOR(hash.Commitment.Promise));
         foreach (var sig in GetExpectedSigners())
         {
             if (sig.Verify(hash.GetHash(), signature))
             {
                 signer = sig;
                 return(true);
             }
         }
         return(false);
     }
     catch
     {
     }
     return(false);
 }