@@ -34,19 +34,19 @@ uint8_t seed[] = {0, 50, 6, 244, 24, 199, 1, 25, 52, 88, 192,
34
34
19, 18, 12, 89, 6, 220, 18, 102, 58, 209,
35
35
82, 12, 62, 89, 110, 182, 9, 44, 20, 254, 22};
36
36
37
- BLSPrivateKey sk = BLSPrivateKey ::FromSeed(seed, sizeof(seed));
38
- BLSPublicKey pk = sk.GetPublicKey();
37
+ bls::PrivateKey sk = bls::PrivateKey ::FromSeed(seed, sizeof(seed));
38
+ bls::PublicKey pk = sk.GetPublicKey();
39
39
40
40
uint8_t msg[ ] = {100, 2, 254, 88, 90, 45, 23};
41
41
42
- BLSSignature sig = sk.Sign(msg, sizeof(msg));
42
+ bls::Signature sig = sk.Sign(msg, sizeof(msg));
43
43
```
44
44
45
45
#### Serializing keys and signatures to bytes
46
46
```c++
47
- uint8_t skBytes[BLSPrivateKey ::PRIVATE_KEY_SIZE]; // 32 byte array
48
- uint8_t pkBytes[BLSPublicKey ::PUBLIC_KEY_SIZE]; // 48 byte array
49
- uint8_t sigBytes[BLSSignature ::SIGNATURE_SIZE]; // 96 byte array
47
+ uint8_t skBytes[bls::PrivateKey ::PRIVATE_KEY_SIZE]; // 32 byte array
48
+ uint8_t pkBytes[bls::PublicKey ::PUBLIC_KEY_SIZE]; // 48 byte array
49
+ uint8_t sigBytes[bls::Signature ::SIGNATURE_SIZE]; // 96 byte array
50
50
51
51
sk.Serialize(skBytes); // 32 bytes
52
52
pk.Serialize(pkBytes); // 48 bytes
@@ -56,19 +56,19 @@ sig.Serialize(sigBytes); // 96 bytes
56
56
#### Loading keys and signatures from bytes
57
57
``` c++
58
58
// Takes array of 32 bytes
59
- sk = BLSPrivateKey ::FromBytes(skBytes);
59
+ sk = bls::PrivateKey ::FromBytes(skBytes);
60
60
61
61
// Takes array of 48 bytes
62
- pk = BLSPublicKey ::FromBytes(pkBytes);
62
+ pk = bls::PublicKey ::FromBytes(pkBytes);
63
63
64
64
// Takes array of 96 bytes
65
- sig = BLSSignature ::FromBytes(sigBytes);
65
+ sig = bls::Signature ::FromBytes(sigBytes);
66
66
```
67
67
68
68
#### Verifying signatures
69
69
``` c++
70
70
// Add information required for verification, to sig object
71
- sig.SetAggregationInfo(AggregationInfo::FromMsg(pk, msg, sizeof (msg)));
71
+ sig.SetAggregationInfo(bls:: AggregationInfo::FromMsg(pk, msg, sizeof (msg)));
72
72
73
73
bool ok = sig.Verify();
74
74
```
@@ -77,51 +77,51 @@ bool ok = sig.Verify();
77
77
``` c++
78
78
// Generate some more private keys
79
79
seed[0 ] = 1 ;
80
- BLSPrivateKey sk1 = BLSPrivateKey ::FromSeed(seed, sizeof (seed));
80
+ bls::PrivateKey sk1 = bls::PrivateKey ::FromSeed(seed, sizeof (seed));
81
81
seed[0 ] = 2 ;
82
- BLSPrivateKey sk2 = BLSPrivateKey ::FromSeed(seed, sizeof (seed));
82
+ bls::PrivateKey sk2 = bls::PrivateKey ::FromSeed(seed, sizeof (seed));
83
83
84
84
// Generate first sig
85
- BLSPublicKey pk1 = sk1.GetPublicKey();
86
- BLSSignature sig1 = sk1.Sign(msg, sizeof (msg));
85
+ bls::PublicKey pk1 = sk1.GetPublicKey();
86
+ bls::Signature sig1 = sk1.Sign(msg, sizeof (msg));
87
87
88
88
// Generate second sig
89
- BLSPublicKey pk2 = sk2.GetPublicKey();
90
- BLSSignature sig2 = sk2.Sign(msg, sizeof (msg));
89
+ bls::PublicKey pk2 = sk2.GetPublicKey();
90
+ bls::Signature sig2 = sk2.Sign(msg, sizeof (msg));
91
91
92
92
// Aggregate signatures together
93
- vector<BLSSignature > sigs = {sig1, sig2};
94
- BLSSignature aggSig = BLSSignature ::Aggregate(sigs);
93
+ vector<bls::Signature > sigs = {sig1, sig2};
94
+ bls::Signature aggSig = bls::Signature ::Aggregate(sigs);
95
95
96
96
// For same message, public keys can be aggregated into one.
97
97
// The signature can be verified the same as a single signature,
98
98
// using this public key.
99
- vector<BLSPublicKey > pubKeys = {pk1, pk2};
100
- BLSPublicKey aggPubKey = BLSSignature ::Aggregate(pubKeys);
99
+ vector< bls::PublicKey > pubKeys = {pk1, pk2};
100
+ bls::PublicKey aggPubKey = bls::Signature ::Aggregate(pubKeys);
101
101
```
102
102
103
103
#### Aggregate signatures for different messages
104
104
```c++
105
105
// Generate one more key and message
106
106
seed[0] = 3;
107
- BLSPrivateKey sk3 = BLSPrivateKey ::FromSeed(seed, sizeof(seed));
108
- BLSPublicKey pk3 = sk3.GetPublicKey();
107
+ bls::PrivateKey sk3 = bls::PrivateKey ::FromSeed(seed, sizeof(seed));
108
+ bls::PublicKey pk3 = sk3.GetPublicKey();
109
109
uint8_t msg2[] = {100, 2, 254, 88, 90, 45, 23};
110
110
111
111
// Generate the signatures, assuming we have 3 private keys
112
112
sig1 = sk1.Sign(msg, sizeof(msg));
113
113
sig2 = sk2.Sign(msg, sizeof(msg));
114
- BLSSignature sig3 = sk3.Sign(msg2, sizeof(msg2));
114
+ bls::Signature sig3 = sk3.Sign(msg2, sizeof(msg2));
115
115
116
116
// They can be noninteractively combined by anyone
117
117
// Aggregation below can also be done by the verifier, to
118
118
// make batch verification more efficient
119
- vector<BLSSignature > sigsL = {sig1, sig2};
120
- BLSSignature aggSigL = BLSSignature ::Aggregate(sigsL);
119
+ vector<bls::Signature > sigsL = {sig1, sig2};
120
+ bls::Signature aggSigL = bls::Signature ::Aggregate(sigsL);
121
121
122
122
// Arbitrary trees of aggregates
123
- vector<BLSSignature > sigsFinal = {aggSigL, sig3};
124
- BLSSignature aggSigFinal = BLSSignature ::Aggregate(sigsFinal);
123
+ vector<bls::Signature > sigsFinal = {aggSigL, sig3};
124
+ bls::Signature aggSigFinal = bls::Signature ::Aggregate(sigsFinal);
125
125
126
126
// Serialize the final signature
127
127
aggSigFinal.Serialize(sigBytes);
@@ -130,16 +130,16 @@ aggSigFinal.Serialize(sigBytes);
130
130
#### Verify aggregate signature for different messages
131
131
``` c++
132
132
// Deserialize aggregate signature
133
- aggSigFinal = BLSSignature ::FromBytes(sigBytes);
133
+ aggSigFinal = bls::Signature ::FromBytes(sigBytes);
134
134
135
135
// Create aggregation information (or deserialize it)
136
- AggregationInfo a1 = AggregationInfo::FromMsg(pk1, msg, sizeof (msg));
137
- AggregationInfo a2 = AggregationInfo::FromMsg(pk2, msg, sizeof (msg));
138
- AggregationInfo a3 = AggregationInfo::FromMsg(pk3, msg2, sizeof (msg2));
139
- vector<AggregationInfo> infos = {a1, a2};
140
- AggregationInfo a1a2 = AggregationInfo::MergeInfos(infos);
141
- vector<AggregationInfo > infos2 = {a1a2, a3};
142
- AggregationInfo aFinal = AggregationInfo::MergeInfos(infos2);
136
+ bls:: AggregationInfo a1 = bls:: AggregationInfo::FromMsg(pk1, msg, sizeof (msg));
137
+ bls:: AggregationInfo a2 = bls:: AggregationInfo::FromMsg(pk2, msg, sizeof (msg));
138
+ bls:: AggregationInfo a3 = bls:: AggregationInfo::FromMsg(pk3, msg2, sizeof (msg2));
139
+ vector<bls:: AggregationInfo> infos = {a1, a2};
140
+ bls:: AggregationInfo a1a2 = bls:: AggregationInfo::MergeInfos(infos);
141
+ vector< bls:: AggregationInfo> infos2 = {a1a2, a3};
142
+ bls:: AggregationInfo aFinal = bls:: AggregationInfo::MergeInfos(infos2);
143
143
144
144
// Verify final signature using the aggregation info
145
145
aggSigFinal.SetAggregationInfo(aFinal);
@@ -148,7 +148,7 @@ ok = aggSigFinal.Verify();
148
148
// If you previously verified a signature, you can also divide
149
149
// the aggregate signature by the signature you already verified.
150
150
ok = aggSigL.Verify();
151
- vector<BLSSignature > cache = {aggSigL};
151
+ vector< bls::Signature > cache = {aggSigL};
152
152
aggSigFinal = aggSigFinal.DivideBy(cache);
153
153
154
154
// Final verification is now more efficient
@@ -157,15 +157,15 @@ ok = aggSigFinal.Verify();
157
157
158
158
#### Aggregate private keys
159
159
```c++
160
- vector<BLSPrivateKey > privateKeysList = {sk1, sk2};
161
- vector<BLSPublicKey > pubKeysList = {pk1, pk2};
160
+ vector<bls::PrivateKey > privateKeysList = {sk1, sk2};
161
+ vector<bls::PublicKey > pubKeysList = {pk1, pk2};
162
162
163
163
// Create an aggregate private key, that can generate
164
164
// aggregate signatures
165
- const BLSPrivateKey aggSk = BLSPrivateKey ::Aggregate(
165
+ const bls::PrivateKey aggSk = bls::PrivateKey ::Aggregate(
166
166
privateKeys, pubKeys);
167
167
168
- BLSSignature aggSig3 = aggSk.Sign(msg, sizeof(msg));
168
+ bls::Signature aggSig3 = aggSk.Sign(msg, sizeof(msg));
169
169
```
170
170
171
171
#### HD keys
@@ -175,21 +175,21 @@ uint8_t seed[] = {1, 50, 6, 244, 24, 199, 1, 25, 52, 88, 192,
175
175
19, 18, 12, 89, 6, 220, 18, 102, 58, 209,
176
176
82, 12, 62, 89, 110, 182, 9, 44, 20, 254, 22};
177
177
178
- ExtendedPrivateKey esk = ExtendedPrivateKey::FromSeed(
178
+ bls:: ExtendedPrivateKey esk = bls:: ExtendedPrivateKey::FromSeed(
179
179
seed, sizeof(seed));
180
180
181
- ExtendedPublicKey epk = esk.GetExtendedPublicKey();
181
+ bls:: ExtendedPublicKey epk = esk.GetExtendedPublicKey();
182
182
183
183
// Use i >= 2^31 for hardened keys
184
- ExtendedPrivateKey skChild = esk.PrivateChild(0)
184
+ bls:: ExtendedPrivateKey skChild = esk.PrivateChild(0)
185
185
.PrivateChild(5);
186
186
187
- ExtendedPublicKey pkChild = epk.PublicChild(0)
187
+ bls:: ExtendedPublicKey pkChild = epk.PublicChild(0)
188
188
.PublicChild(5);
189
189
190
190
// Serialize extended keys
191
- uint8_t buffer1[ ExtendedPublicKey::ExtendedPublicKeySize] // 93 bytes
192
- uint8_t buffer2[ ExtendedPrivateKey::ExtendedPrivateKeySize] // 77 bytes
191
+ uint8_t buffer1[ bls:: ExtendedPublicKey::ExtendedPublicKeySize] // 93 bytes
192
+ uint8_t buffer2[ bls:: ExtendedPrivateKey::ExtendedPrivateKeySize] // 77 bytes
193
193
194
194
pkChild.Serialize(buffer1);
195
195
skChild.Serialize(buffer2);
@@ -207,12 +207,12 @@ cmake --build . -- -j 6
207
207
208
208
### Run tests
209
209
``` bash
210
- ./build/runtest
210
+ ./build/src/ runtest
211
211
```
212
212
213
213
### Run benchmarks
214
214
``` bash
215
- ./build/runbench
215
+ ./build/src/ runbench
216
216
```
217
217
218
218
### Link the library to use it
0 commit comments