Signatures are cryptographic functions that attest to the origin of a particular message.
It is infeasible for Alice to generate a signed message that appears to have been generated by Bob.
- Aggregating signatures: have multiple signatures signed by various people and then you can aggregate it into a single signature, which makes it more efficient in terms of size
- Thresholding signatures: multiple people split a key into multiple parts, and you require some fixed number of people to agree to sign a message to be able to actually sign it with the full key
- In a -threshold signature scheme, there is a single public key held by all replicas, and each of the replicas holds a distinct private key.
- Jaclyn implemented Proactive Refresh for BLS Threshold Signatures during TreeHacks which was super cool. “It’s a way to renew signature shares every 30 seconds. Think of it as Google Authenticator for threshold signatures.”
Signatures Schemes
Require 3 algorithms
- Key generation algorithm:
seed -> public_key, private_key
- Signing algorithm:
msg, private_key -> msg, signature
- Verification algorithm:
msg, signature, public_key -> boolean
Signed Blobs
Blobs are cryptographically signed so that it cannot be tampered with
The structure that holds this data is called a Signed Blob, and it contains three properties:
body
- the JSON object that the user wants to storemerkleRoot
- the hashed body (should be renamed to hash)signature
- the signed hash
Signing
- Construct the JSON object with the properties in the exact order as specified.
- Convert the object to a string to make it hashable.
- Hash the string using keccak256 and store this value as the merkleRoot
- Sign the merkleRoot with the user’s Ethereum wallet, creating a recoverable ECDSA signature and store this in the signature property.
Verifying
- Convert the body to a string to make it hashable.
- Hash the string using keccak256 and check that it matches the merkle root
- Perform an ecRecover on the signature with the merkle root to retrieve the address.
- Check that the recovered address matches the expected address.
Signed Message Digests
- Signature of long messages is computationally expensive
- We can compute a fixed-length “fingerprint”
- Apply hash function to message , giving a fixed size message digest,
- Signed message digest
- Bob sends message and signed digest
- Alice receives and computes
- Alice receives signed digest and computes
- If , the message is considered signed (and untampered)
- Alternatively, MACs