đMulti/Threshold/Aggregated signatures
Critical important component of KLYNTAR
BLS12-381
Let's move on to one of the most important concepts in KLYNTAR Cryptoland. We will talk about multi- and threshold signatures. We included this table for a reason. At first glance, it may seem that this is the same thing, and as we have already mentioned, due to work with the documentation of other projects, we often met that these concepts are confused. Separately, there are aggregated signatures, or rather, the aggregation mechanism as a whole (keys and signatures).
Since in KLYNTAR both multi-signatures and threshold signatures are built using the same curve (the aforementioned BLS12-381), you first need to get acquainted with it.
If you havenât heard anything about this curve and the presented mechanisms before, then donât worry - BLS is also used in such eminent projects as ZCash, Algorand, Chia, Harmony, Filecoin, Dfinity (ICP) and is also planned to be used in Ethereum 2.0
BLS(Barreto-Lynn-Scott) curve which is great for so-called pairing in pair-based cryptography. The BLS12-381 curve was developed by Sean Bow in early 2017 as the basis for an update to the Zcash protocol. It is useful for digital signing and for creating zkSNARKS.
The Bonet-Lynn-Shaham (BLS) signature method is considered reliable for signature generation. It uses a bilinear pair with an elliptic curve group and provides some protection against index calculus attacks. The BLS also produces short signatures and has proven to be secure. While Schnorr signatures require random numbers to generate multiple signers, BLS does not rely on them.
Curve pairing
We'll need a very special function that takes two points P and Q on a curve (or two different curves) and maps them to a number:
We also require one important property from this function. If we have some secret number x and two points P and Q, we should get the same result no matter which point we multiply by this number:
Essentially, we need to be able to swap point factors between two arguments without changing the result. More generally, all of these swaps should produce the same result:
If Alice wants to generate a BLS signature, she first generates a private key as a point on an elliptic curve
If Alice wants to generate a BLS signature, she first generates a private key as a point on an elliptic curve and calculates the public key using the publicly known base point using the formula
It takes the hash of the message and then maps the hash value to a point on the elliptic curve. If we use SHA-256, we can convert the message to a 256-bit x-point. If we can't get a point on the curve, we add an incremental value.
We get the signature of message using the formula
Thanks to the pairing, we get
Visualization
Signature verification
Aggregation
Now let's combine all the signatures in the block! Imagine that we have 1000 validators and each of them must vote for the inclusion of some block in the blockchain. For each validator, a signature Si is obtained, a public key Pi and a message M (block metadata-hash, index, etc.). Why store all signatures when they can be combined? In the end, we only care if all the signatures are valid. The aggregated signature will simply be the sum of all validator signatures:
To test the block, we need to check that the following equality holds:
Proof
Threshold Signatures (TBLS)
The next important component in KLYNTAR are threshold signatures (t of n or threshold signatures). Their importance and advantage over multi-signatures is that they serve a specific purpose - to ensure that T out of N participants who were established earlier and who own part of the group's private key can make a transaction.
Multi-signatures are versatile and can be useful in many places. For example, their advantage is that it is easy to achieve efficiency in generating N of N signatures - for this you need N members to sign the message M with their private keys, and then aggregate public keys and signatures and get the master key of the group PubN and signature SigN. Thanks to the properties of aggregation, it will not be necessary to store N signatures and N public keys in the blockchain (as happens in naive multi-signature implementations), and instead of N signatures, it will be enough to check only 1 aggregated one, which gives us super efficiency - you will learn more in the section below.
The problem arises when not all signers may agree with the signature decision, but it is enough just to reach a certain threshold T (that is, at least T of N participants agree to sign the transaction). In this case, when using multi-signature, we need to create some additional execution rules, and the size of the proof also grows.
Let me give you an example - let's say we have 10 people who decided to generate a signature using BLS multi-signature (for a transaction, staking, fixing an unobtanium or something else). Let 6 of them agree, and 4 others - against. At the same time, you set a threshold on your public aggregated key at 6/10 in advance.
It's no problem for 6 people to sign something and then aggregate their 6 public keys into a 48 byte single public BLS. With a signature, it's the same - everything comes down to one thing.
However, to prove to the network that the 6/10 threshold is met, you must provide 4 separate 48-byte addresses of those who disagree. This is because there is no other way for the network to find out how many of the keys are included in MasterPub1-6. This leads us to difficulties because there may be not 10, but 200 signers.
It would be nice if all the "magic" was performed outside the blockchain - the nodes will not know about any thresholds, they will not disclose the public keys of dissenters, and so on. All the blockchain needs to know is the fact that the required threshold has been reached and that we have a valid signature.
This can be achieved with threshold signatures. In KLYNTAR we use the TBLS implementation using the above curve
For the secure DKG (distributed key generation) procedure, Feldman's verifiable secret sharing scheme is used. It allows splitting a shared private key based on the Benalo scheme and generating a shared public key based on the verification vectors. In this case, T out of N members of the group will be able to sign messages on behalf of the group.
Demonstration
For a general understanding of the workflow, let's generate keys and test their capabilities. It will also be something of a helpful guide if you have any difficulty using them in the Apollo. Well, or if you didnât understand much from the information above, now you will get a more visual explanation.
Multisignatures
Go to Cryptoland
Select multisig from the drop-down menu and generate in the operations section. Now generate a pair
For the test, generate and save yourself a few pairs. Let's generate 3 pairs
Don't forget to save your pairs. Autosave will be added in future versions of Apollo
Here are the pairs we have
Now these 3 parties can sign some message. Let it be SEND 5 KLY TO BOB
You should have 3 signatures
You can take any of them and the corresponding public key and verify the signature
And then the cryptographic magic begins. Aggregation. To do this, three parties or any other person can take public signatures and addresses and aggregate them together
Public key aggregation
Signatures aggregation
Now we have a pair of master signature and master public key. Let's check
I think now the incredible properties have become more visible and obvious
Threshold signatures
In Cryptoland now choose thresholdsig
Let's simulate the situation - let you and 5 other friends want to create such an address, from which it will be possible to perform any action only by agreement of 4 friends. We have a 4/6 situation. Before you will be such fields
Let's enter our threshold 4, our ID (let it be 1) and the ID of other friends. You can choose anything as an ID, but it's easier to use numeric identifiers. Since the number of sides is 6, then there should be 6 identifiers (including yours)
You will get such a big output
The first is verification vector
This is a necessary component for threshold signatures that will help make sure the parties (in this case, your other 5 friends) that the sharing of the secret was secure, that the part they received is valid and that each party received no more than necessary (that is, everything will be safe and threshold in 4/6 will not be violated)
Verification vector is public. Send it to other friends
Next is shares
This is a component of the so-called distributed key generation(DKG). They are sent one to each friend and do not have to be published anywhere. This is your safety first and foremost. You keep the share with your ID (where For user with id 1, since you previously chose such an ID)
They are NOT public, but secretly sent to each friend
Last - your updated ID
Save it as well. It will be necessary to verify the share and generate a partial signature
What next?
Then your 5 friends repeat the same thing in their wallets. They only need to insert their ID and a similar set of IDs for your entire group (also 1,2,3,4,5,6 as generated by the first friend that you are in this example).
Friend with ID=2
Friend with ID=3
Friend with ID=4
Friend with ID=5
Friend with ID=6
Step 2
You send all your friends the resulting verification vector and the balls to each of your friends. At the same time, you get a verification vector and your share from them.
Upon completion of the procedure, you, as a friend with ID=1, should have the following set:
5 verification vectors from each friend + your own (total 6)
Your updated ID that you received in the first step
5 shares from each of your friends + your own which you generated at the first stage (where For user with id 1)
Stage 3 - share verification
Now you need to make sure that none of your friends cheated and sent a false share. Otherwise, you run the risk of losing your vote, because violators will be able to solve everything without you by providing the function with a valid share that they will keep for themselves earlier
To do this, select the verifyShare mode
Enter here your ID that you received when you generated shares from yourself, the share received from some friend and the verification vector that he sent
For example, we continue to play the role of a friend with ID=1. Let's check the share from a friend with ID=4. You can go up and check the verification vector and the share for a friend with ID=1, which was obtained by a friend with ID=4
Verify
Great, the friend with ID=4 didn't let us down or deceive us. Also go through the rest and do a similar check.
If somewhere you see false - the procedure can be stopped. This means that the corresponding friend is trying to deceive you. To make sure you are all storing balls for the same verification vector, compare the received vectors with other friends. You must all have the same vectors from each of your friends
Stage 4 - group key generation
To the rest of the network, your behind-the-scenes affairs are hidden. However, in order to accept payments to an address, you need to obtain a general (group) address that will identify your group.
To do this, select the option deriveGroupPub
Enter the verification vectors of all participants using a separator character. Enter the verification vectors of all participants using a separator character
Don't worry, in other wallets or Apollo modules the procedure will be easier and won't look so "scary"đ
The received key is your group key - distribute it and receive payments
Stage 5 - Waste Time
It's time to manage the resources at the address. According to the scenario, we set the threshold to 4/6. Also, consent can be expressed by 5/6 and even all 6 at the same time. And yet, for simplicity, let's imagine that 4 friends agreed.
Select signaShare mode. This will generate a partial signature for you
Insert the necessary and generate a signature. The same procedure is repeated by the other 3 friends (because you are the fourth in this company)
Friend with ID=1
Friend with ID=2
Friend with ID=3
Friend with ID=4
Great, now you can post your partial signatures or send them to someone who collects them and create a group signature. It will be verified by the group's public key that you created earlier.
To do this, select the option buildFullSignature
Paste all 4 partial signatures and IDs
Now, having such a signature, the network will be able to verify it using the group's public key. And you can do it too - in the Apollo interface. To do this, select the verify option and paste the required
Verification
Importance for KLYNTAR in the future
Multi-signatures and threshold signatures are extremely important both in the initial stages and for future developments. In addition to the cryptographic beauty that they already allow to use in KLYNTAR right now (voting, aggregation that gives speedups + reduces N proofs to a single proof, some third-party applications), they are also of great interest for future developments.
Here's couple of ideas
Quick state verification In the future, we plan to modify the state verification system so that for the block there is a single proof of its validity and the validity of transactions inside. This can be achieved by aggregating
Building in-memory hash-tables with different aggregaed pubkeys variants Due to the nature of blockchains that not all validators can be online at the same time, it would be necessary to make more rational use of aggregation capabilities. So we can, for example, create a mapping where the key is some public key of the current set of validators, and the value is the set of missing validators. Thus, it is possible to achieve minimization of communication rounds and at the same time each of the nodes will know for sure on which of the blocks which validators did not sign it (being offline, for example). This way you can keep checking rates per block using O(1) accessibility mapping
Various schemes that just come to mind This and homomorphic hiding, due to which some public key will actually be secretly controlled by several parties, these are various flexible options for staking, swaps, Unobtanium exchange, freezing rates for services and much more. Oh multi-signatures, thank you for being you đ
Links
Last updated