Skip to content

Commit 6f02225

Browse files
committed
[❄] renaming to secret_share_receiver and keypair
1 parent 09247b5 commit 6f02225

File tree

1 file changed

+27
-28
lines changed

1 file changed

+27
-28
lines changed

schnorr_fun/src/frost/chilldkg.rs

Lines changed: 27 additions & 28 deletions
Original file line numberDiff line numberDiff line change
@@ -358,7 +358,7 @@ pub mod simplepedpop {
358358
/// [`collect_secret_inputs`] and getting the `AggKeygenInput` from the coordinator.
359359
///
360360
/// This also validates `agg_input`.
361-
pub fn receive_share<H, NG>(
361+
pub fn receive_secret_share<H, NG>(
362362
schnorr: &Schnorr<H, NG>,
363363
agg_input: &AggKeygenInput,
364364
secret_share: SecretShare,
@@ -444,7 +444,7 @@ pub mod simplepedpop {
444444
for receiver in share_receivers {
445445
let secret_share =
446446
collect_secret_inputs(receiver, secret_inputs.remove(&receiver).unwrap());
447-
let paired_share = receive_share(schnorr, &agg_input, secret_share).unwrap();
447+
let paired_share = receive_secret_share(schnorr, &agg_input, secret_share).unwrap();
448448
paired_shares.push(paired_share.non_zero().unwrap());
449449
}
450450

@@ -673,19 +673,19 @@ pub mod encpedpop {
673673
pub fn recover_share<H: Hash32>(
674674
&self,
675675
share_index: ShareIndex,
676-
encryption_keypair: &KeyPair,
676+
keypair: &KeyPair,
677677
) -> Result<PairedSecretShare, &'static str> {
678678
let (expected_public_key, agg_ciphertext) = self
679679
.encrypted_shares
680680
.get(&share_index)
681681
.ok_or("No party at party_index existed")?;
682682

683-
if *expected_public_key != encryption_keypair.public_key() {
683+
if *expected_public_key != keypair.public_key() {
684684
return Err("this isn't the right encryption keypair for this share");
685685
}
686686
let secret_share = decrypt::<H>(
687687
share_index,
688-
encryption_keypair,
688+
keypair,
689689
&self.encryption_nonces,
690690
*agg_ciphertext,
691691
);
@@ -897,10 +897,10 @@ pub mod encpedpop {
897897
/// Extract our secret share from the `AggKeygenInput`.
898898
///
899899
/// This also validates `agg_input`.
900-
pub fn receive_share<H, NG>(
900+
pub fn receive_secret_share<H, NG>(
901901
schnorr: &Schnorr<H, NG>,
902902
my_index: ShareIndex,
903-
encryption_keypair: &KeyPair,
903+
keypair: &KeyPair,
904904
agg_input: &AggKeygenInput,
905905
) -> Result<PairedSecretShare<Normal, Zero>, simplepedpop::ReceiveShareError>
906906
where
@@ -913,7 +913,7 @@ pub mod encpedpop {
913913
.unwrap_or_default();
914914
let share_scalar = decrypt::<H>(
915915
my_index,
916-
encryption_keypair,
916+
keypair,
917917
&agg_input.encryption_nonces,
918918
encrypted_share,
919919
);
@@ -922,7 +922,7 @@ pub mod encpedpop {
922922
share: share_scalar,
923923
};
924924
let paired_secret_share =
925-
simplepedpop::receive_share(schnorr, &agg_input.inner, secret_share)?;
925+
simplepedpop::receive_secret_share(schnorr, &agg_input.inner, secret_share)?;
926926

927927
Ok(paired_secret_share)
928928
}
@@ -945,16 +945,16 @@ pub mod encpedpop {
945945

946946
fn decrypt<H: Hash32>(
947947
my_index: ShareIndex,
948-
encryption_keypair: &KeyPair<Normal>,
948+
keypair: &KeyPair<Normal>,
949949
multi_nocnes: &[Point],
950950
mut agg_ciphertext: Scalar<Public, Zero>,
951951
) -> Scalar<Secret, Zero> {
952952
for nonce in multi_nocnes {
953-
let dh_key = g!(encryption_keypair.secret_key() * nonce).normalize();
953+
let dh_key = g!(keypair.secret_key() * nonce).normalize();
954954
let pad = Scalar::from_hash(
955955
H::default()
956956
.add(dh_key)
957-
.add(encryption_keypair.public_key())
957+
.add(keypair.public_key())
958958
.add(my_index),
959959
);
960960
agg_ciphertext -= pad;
@@ -1022,7 +1022,7 @@ pub mod encpedpop {
10221022
let mut paired_secret_shares = vec![];
10231023
for (party_index, enckey) in receiver_enckeys {
10241024
let paired_secret_share =
1025-
receive_share(schnorr, party_index, &enckey, &agg_input).unwrap();
1025+
receive_secret_share(schnorr, party_index, &enckey, &agg_input).unwrap();
10261026
paired_secret_shares.push(paired_secret_share.non_zero().unwrap());
10271027
}
10281028

@@ -1112,23 +1112,22 @@ pub mod certpedpop {
11121112
impl<S: CertificationScheme> CertifiedKeygen<S> {
11131113
/// Recover a share from a certified key generation with the decryption key.
11141114
///
1115-
/// This checks that the `encryption_keypair` has signed the key generation first.
1115+
/// This checks that the `keypair` has signed the key generation first.
11161116
pub fn recover_share<H: Hash32>(
11171117
&self,
11181118
cert_scheme: &S,
11191119
share_index: ShareIndex,
1120-
encryption_keypair: KeyPair,
1120+
keypair: KeyPair,
11211121
) -> Result<PairedSecretShare, &'static str> {
1122-
let cert_key = encryption_keypair.public_key();
1122+
let cert_key = keypair.public_key();
11231123
let my_cert = self
11241124
.certificate
11251125
.get(&cert_key)
11261126
.ok_or("I haven't certified this keygen")?;
11271127
if !cert_scheme.verify_cert(cert_key, &self.input, my_cert) {
11281128
return Err("my certification was invalid");
11291129
}
1130-
self.input
1131-
.recover_share::<H>(share_index, &encryption_keypair)
1130+
self.input.recover_share::<H>(share_index, &keypair)
11321131
}
11331132

11341133
/// Gets the inner `encpedpop::AggKeygenInput`.
@@ -1141,21 +1140,21 @@ pub mod certpedpop {
11411140

11421141
/// Stores the state of share recipient who first receives their share and then waits to get
11431142
/// signatures from all the certifying parties on the keygeneration before accepting it.
1144-
pub struct ShareReceiver {
1143+
pub struct SecretShareReceiver {
11451144
paired_secret_share: PairedSecretShare<Normal, Zero>,
11461145
agg_input: AggKeygenInput,
11471146
}
11481147

1149-
impl ShareReceiver {
1150-
/// Extract your `encryption_keypair` and certify the key generation. Before you actually
1148+
impl SecretShareReceiver {
1149+
/// Extract your `keypair` and certify the key generation. Before you actually
11511150
/// can use the share you must call [`finalize`] with a completed certificate.
11521151
///
11531152
/// [`finalize`]: Self::finalize
1154-
pub fn receive_share<H, NG, S>(
1153+
pub fn receive_secret_share<H, NG, S>(
11551154
schnorr: &Schnorr<H, NG>,
11561155
cert_scheme: &S,
11571156
my_index: ShareIndex,
1158-
encryption_keypair: &KeyPair,
1157+
keypair: &KeyPair,
11591158
agg_input: &AggKeygenInput,
11601159
) -> Result<(Self, S::Signature), simplepedpop::ReceiveShareError>
11611160
where
@@ -1164,8 +1163,8 @@ pub mod certpedpop {
11641163
S: CertificationScheme,
11651164
{
11661165
let paired_secret_share =
1167-
encpedpop::receive_share(schnorr, my_index, encryption_keypair, agg_input)?;
1168-
let sig = cert_scheme.certify(encryption_keypair, agg_input);
1166+
encpedpop::receive_secret_share(schnorr, my_index, keypair, agg_input)?;
1167+
let sig = cert_scheme.certify(keypair, agg_input);
11691168
let self_ = Self {
11701169
paired_secret_share,
11711170
agg_input: agg_input.clone(),
@@ -1282,7 +1281,7 @@ pub mod certpedpop {
12821281
let mut paired_secret_shares = vec![];
12831282
let mut share_receivers = vec![];
12841283
for (party_index, enckey) in &receiver_enckeys {
1285-
let (share_receiver, cert) = ShareReceiver::receive_share(
1284+
let (share_receiver, cert) = SecretShareReceiver::receive_secret_share(
12861285
schnorr,
12871286
cert_scheme,
12881287
*party_index,
@@ -1403,8 +1402,8 @@ mod test {
14031402
&mut rng
14041403
);
14051404

1406-
for (paired_secret_share, encryption_keypair) in paired_secret_shares_and_keys {
1407-
let recovered = certified_keygen.recover_share::<sha2::Sha256>(&schnorr, paired_secret_share.index(), encryption_keypair).unwrap();
1405+
for (paired_secret_share, keypair) in paired_secret_shares_and_keys {
1406+
let recovered = certified_keygen.recover_share::<sha2::Sha256>(&schnorr, paired_secret_share.index(), keypair).unwrap();
14081407
assert_eq!(paired_secret_share, recovered);
14091408
}
14101409
}

0 commit comments

Comments
 (0)