@@ -358,7 +358,7 @@ pub mod simplepedpop {
358358 /// [`collect_secret_inputs`] and getting the `AggKeygenInput` from the coordinator.
359359 ///
360360 /// This also validates `agg_input`.
361- pub fn receive_share < H , NG > (
361+ pub fn receive_secret_share < H , NG > (
362362 schnorr : & Schnorr < H , NG > ,
363363 agg_input : & AggKeygenInput ,
364364 secret_share : SecretShare ,
@@ -444,7 +444,7 @@ pub mod simplepedpop {
444444 for receiver in share_receivers {
445445 let secret_share =
446446 collect_secret_inputs ( receiver, secret_inputs. remove ( & receiver) . unwrap ( ) ) ;
447- let paired_share = receive_share ( schnorr, & agg_input, secret_share) . unwrap ( ) ;
447+ let paired_share = receive_secret_share ( schnorr, & agg_input, secret_share) . unwrap ( ) ;
448448 paired_shares. push ( paired_share. non_zero ( ) . unwrap ( ) ) ;
449449 }
450450
@@ -673,19 +673,19 @@ pub mod encpedpop {
673673 pub fn recover_share < H : Hash32 > (
674674 & self ,
675675 share_index : ShareIndex ,
676- encryption_keypair : & KeyPair ,
676+ keypair : & KeyPair ,
677677 ) -> Result < PairedSecretShare , & ' static str > {
678678 let ( expected_public_key, agg_ciphertext) = self
679679 . encrypted_shares
680680 . get ( & share_index)
681681 . ok_or ( "No party at party_index existed" ) ?;
682682
683- if * expected_public_key != encryption_keypair . public_key ( ) {
683+ if * expected_public_key != keypair . public_key ( ) {
684684 return Err ( "this isn't the right encryption keypair for this share" ) ;
685685 }
686686 let secret_share = decrypt :: < H > (
687687 share_index,
688- encryption_keypair ,
688+ keypair ,
689689 & self . encryption_nonces ,
690690 * agg_ciphertext,
691691 ) ;
@@ -897,10 +897,10 @@ pub mod encpedpop {
897897 /// Extract our secret share from the `AggKeygenInput`.
898898 ///
899899 /// This also validates `agg_input`.
900- pub fn receive_share < H , NG > (
900+ pub fn receive_secret_share < H , NG > (
901901 schnorr : & Schnorr < H , NG > ,
902902 my_index : ShareIndex ,
903- encryption_keypair : & KeyPair ,
903+ keypair : & KeyPair ,
904904 agg_input : & AggKeygenInput ,
905905 ) -> Result < PairedSecretShare < Normal , Zero > , simplepedpop:: ReceiveShareError >
906906 where
@@ -913,7 +913,7 @@ pub mod encpedpop {
913913 . unwrap_or_default ( ) ;
914914 let share_scalar = decrypt :: < H > (
915915 my_index,
916- encryption_keypair ,
916+ keypair ,
917917 & agg_input. encryption_nonces ,
918918 encrypted_share,
919919 ) ;
@@ -922,7 +922,7 @@ pub mod encpedpop {
922922 share : share_scalar,
923923 } ;
924924 let paired_secret_share =
925- simplepedpop:: receive_share ( schnorr, & agg_input. inner , secret_share) ?;
925+ simplepedpop:: receive_secret_share ( schnorr, & agg_input. inner , secret_share) ?;
926926
927927 Ok ( paired_secret_share)
928928 }
@@ -945,16 +945,16 @@ pub mod encpedpop {
945945
946946 fn decrypt < H : Hash32 > (
947947 my_index : ShareIndex ,
948- encryption_keypair : & KeyPair < Normal > ,
948+ keypair : & KeyPair < Normal > ,
949949 multi_nocnes : & [ Point ] ,
950950 mut agg_ciphertext : Scalar < Public , Zero > ,
951951 ) -> Scalar < Secret , Zero > {
952952 for nonce in multi_nocnes {
953- let dh_key = g ! ( encryption_keypair . secret_key( ) * nonce) . normalize ( ) ;
953+ let dh_key = g ! ( keypair . secret_key( ) * nonce) . normalize ( ) ;
954954 let pad = Scalar :: from_hash (
955955 H :: default ( )
956956 . add ( dh_key)
957- . add ( encryption_keypair . public_key ( ) )
957+ . add ( keypair . public_key ( ) )
958958 . add ( my_index) ,
959959 ) ;
960960 agg_ciphertext -= pad;
@@ -1022,7 +1022,7 @@ pub mod encpedpop {
10221022 let mut paired_secret_shares = vec ! [ ] ;
10231023 for ( party_index, enckey) in receiver_enckeys {
10241024 let paired_secret_share =
1025- receive_share ( schnorr, party_index, & enckey, & agg_input) . unwrap ( ) ;
1025+ receive_secret_share ( schnorr, party_index, & enckey, & agg_input) . unwrap ( ) ;
10261026 paired_secret_shares. push ( paired_secret_share. non_zero ( ) . unwrap ( ) ) ;
10271027 }
10281028
@@ -1112,23 +1112,22 @@ pub mod certpedpop {
11121112 impl < S : CertificationScheme > CertifiedKeygen < S > {
11131113 /// Recover a share from a certified key generation with the decryption key.
11141114 ///
1115- /// This checks that the `encryption_keypair ` has signed the key generation first.
1115+ /// This checks that the `keypair ` has signed the key generation first.
11161116 pub fn recover_share < H : Hash32 > (
11171117 & self ,
11181118 cert_scheme : & S ,
11191119 share_index : ShareIndex ,
1120- encryption_keypair : KeyPair ,
1120+ keypair : KeyPair ,
11211121 ) -> Result < PairedSecretShare , & ' static str > {
1122- let cert_key = encryption_keypair . public_key ( ) ;
1122+ let cert_key = keypair . public_key ( ) ;
11231123 let my_cert = self
11241124 . certificate
11251125 . get ( & cert_key)
11261126 . ok_or ( "I haven't certified this keygen" ) ?;
11271127 if !cert_scheme. verify_cert ( cert_key, & self . input , my_cert) {
11281128 return Err ( "my certification was invalid" ) ;
11291129 }
1130- self . input
1131- . recover_share :: < H > ( share_index, & encryption_keypair)
1130+ self . input . recover_share :: < H > ( share_index, & keypair)
11321131 }
11331132
11341133 /// Gets the inner `encpedpop::AggKeygenInput`.
@@ -1141,21 +1140,21 @@ pub mod certpedpop {
11411140
11421141 /// Stores the state of share recipient who first receives their share and then waits to get
11431142 /// signatures from all the certifying parties on the keygeneration before accepting it.
1144- pub struct ShareReceiver {
1143+ pub struct SecretShareReceiver {
11451144 paired_secret_share : PairedSecretShare < Normal , Zero > ,
11461145 agg_input : AggKeygenInput ,
11471146 }
11481147
1149- impl ShareReceiver {
1150- /// Extract your `encryption_keypair ` and certify the key generation. Before you actually
1148+ impl SecretShareReceiver {
1149+ /// Extract your `keypair ` and certify the key generation. Before you actually
11511150 /// can use the share you must call [`finalize`] with a completed certificate.
11521151 ///
11531152 /// [`finalize`]: Self::finalize
1154- pub fn receive_share < H , NG , S > (
1153+ pub fn receive_secret_share < H , NG , S > (
11551154 schnorr : & Schnorr < H , NG > ,
11561155 cert_scheme : & S ,
11571156 my_index : ShareIndex ,
1158- encryption_keypair : & KeyPair ,
1157+ keypair : & KeyPair ,
11591158 agg_input : & AggKeygenInput ,
11601159 ) -> Result < ( Self , S :: Signature ) , simplepedpop:: ReceiveShareError >
11611160 where
@@ -1164,8 +1163,8 @@ pub mod certpedpop {
11641163 S : CertificationScheme ,
11651164 {
11661165 let paired_secret_share =
1167- encpedpop:: receive_share ( schnorr, my_index, encryption_keypair , agg_input) ?;
1168- let sig = cert_scheme. certify ( encryption_keypair , agg_input) ;
1166+ encpedpop:: receive_secret_share ( schnorr, my_index, keypair , agg_input) ?;
1167+ let sig = cert_scheme. certify ( keypair , agg_input) ;
11691168 let self_ = Self {
11701169 paired_secret_share,
11711170 agg_input : agg_input. clone ( ) ,
@@ -1282,7 +1281,7 @@ pub mod certpedpop {
12821281 let mut paired_secret_shares = vec ! [ ] ;
12831282 let mut share_receivers = vec ! [ ] ;
12841283 for ( party_index, enckey) in & receiver_enckeys {
1285- let ( share_receiver, cert) = ShareReceiver :: receive_share (
1284+ let ( share_receiver, cert) = SecretShareReceiver :: receive_secret_share (
12861285 schnorr,
12871286 cert_scheme,
12881287 * party_index,
@@ -1403,8 +1402,8 @@ mod test {
14031402 & mut rng
14041403 ) ;
14051404
1406- for ( paired_secret_share, encryption_keypair ) in paired_secret_shares_and_keys {
1407- let recovered = certified_keygen. recover_share:: <sha2:: Sha256 >( & schnorr, paired_secret_share. index( ) , encryption_keypair ) . unwrap( ) ;
1405+ for ( paired_secret_share, keypair ) in paired_secret_shares_and_keys {
1406+ let recovered = certified_keygen. recover_share:: <sha2:: Sha256 >( & schnorr, paired_secret_share. index( ) , keypair ) . unwrap( ) ;
14081407 assert_eq!( paired_secret_share, recovered) ;
14091408 }
14101409 }
0 commit comments