@bsv/sdk
Version:
BSV Blockchain Software Development Kit
509 lines • 21.5 kB
JavaScript
;
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
__setModuleDefault(result, mod);
return result;
};
var __importDefault = (this && this.__importDefault) || function (mod) {
return (mod && mod.__esModule) ? mod : { "default": mod };
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.KeyShares = void 0;
const BigNumber_js_1 = __importDefault(require("./BigNumber.js"));
const PublicKey_js_1 = __importDefault(require("./PublicKey.js"));
const Curve_js_1 = __importDefault(require("./Curve.js"));
const ECDSA_js_1 = require("./ECDSA.js");
const Hash_js_1 = require("./Hash.js");
const Random_js_1 = __importDefault(require("./Random.js"));
const utils_js_1 = require("./utils.js");
const Polynomial_js_1 = __importStar(require("./Polynomial.js"));
/**
* @class KeyShares
*
* This class is used to store the shares of a private key.
*
* @param shares - An array of shares
* @param threshold - The number of shares required to recombine the private key
*
* @returns KeyShares
*
* @example
* const key = PrivateKey.fromShares(shares)
*
*/
class KeyShares {
constructor(points, threshold, integrity) {
this.points = points;
this.threshold = threshold;
this.integrity = integrity;
}
static fromBackupFormat(shares) {
let threshold = 0;
let integrity = '';
const points = shares.map((share, idx) => {
const shareParts = share.split('.');
if (shareParts.length !== 4) {
throw new Error('Invalid share format in share ' +
idx.toString() +
'. Expected format: "x.y.t.i" - received ' +
share);
}
const [x, y, t, i] = shareParts;
if (t === undefined)
throw new Error('Threshold not found in share ' + idx.toString());
if (i === undefined)
throw new Error('Integrity not found in share ' + idx.toString());
const tInt = parseInt(t);
if (idx !== 0 && threshold !== tInt) {
throw new Error('Threshold mismatch in share ' + idx.toString());
}
if (idx !== 0 && integrity !== i) {
throw new Error('Integrity mismatch in share ' + idx.toString());
}
threshold = tInt;
integrity = i;
return Polynomial_js_1.PointInFiniteField.fromString([x, y].join('.'));
});
return new KeyShares(points, threshold, integrity);
}
toBackupFormat() {
return this.points.map((share) => share.toString() + '.' + this.threshold.toString() + '.' + this.integrity);
}
}
exports.KeyShares = KeyShares;
/**
* Represents a Private Key, which is a secret that can be used to generate signatures in a cryptographic system.
*
* The `PrivateKey` class extends from the `BigNumber` class. It offers methods to create signatures, verify them,
* create a corresponding public key and derive a shared secret from a public key.
*
* @extends {BigNumber}
* @see {@link BigNumber} for more information on BigNumber.
*/
class PrivateKey extends BigNumber_js_1.default {
/**
* Generates a private key randomly.
*
* @method fromRandom
* @static
* @returns The newly generated Private Key.
*
* @example
* const privateKey = PrivateKey.fromRandom();
*/
static fromRandom() {
return new PrivateKey((0, Random_js_1.default)(32));
}
/**
* Generates a private key from a string.
*
* @method fromString
* @static
* @param str - The string to generate the private key from.
* @param base - The base of the string.
* @returns The generated Private Key.
* @throws Will throw an error if the string is not valid.
**/
static fromString(str, base = 'hex') {
return new PrivateKey(super.fromString(str, base).toArray());
}
/**
* Generates a private key from a hexadecimal string.
*
* @method fromHex
* @static
* @param {string} str - The hexadecimal string representing the private key. The string must represent a valid private key in big-endian format.
* @returns {PrivateKey} The generated Private Key instance.
* @throws {Error} If the string is not a valid hexadecimal or represents an invalid private key.
**/
static fromHex(str) {
return new PrivateKey(super.fromHex(str, 'big'));
}
/**
* Generates a private key from a WIF (Wallet Import Format) string.
*
* @method fromWif
* @static
* @param wif - The WIF string to generate the private key from.
* @param base - The base of the string.
* @returns The generated Private Key.
* @throws Will throw an error if the string is not a valid WIF.
**/
static fromWif(wif, prefixLength = 1) {
const decoded = (0, utils_js_1.fromBase58Check)(wif, undefined, prefixLength);
if (decoded.data.length !== 33) {
throw new Error('Invalid WIF length');
}
if (decoded.data[32] !== 1) {
throw new Error('Invalid WIF padding');
}
return new PrivateKey(decoded.data.slice(0, 32));
}
/**
* @constructor
*
* @param number - The number (various types accepted) to construct a BigNumber from. Default is 0.
*
* @param base - The base of number provided. By default is 10. Ignored if number is BigNumber.
*
* @param endian - The endianness provided. By default is 'big endian'. Ignored if number is BigNumber.
*
* @param modN - Optional. Default 'apply. If 'apply', apply modN to input to guarantee a valid PrivateKey. If 'error', if input is out of field throw new Error('Input is out of field'). If 'nocheck', assumes input is in field.
*
* @example
* import PrivateKey from './PrivateKey';
* import BigNumber from './BigNumber';
* const privKey = new PrivateKey(new BigNumber('123456', 10, 'be'));
*/
constructor(number = 0, base = 10, endian = 'be', modN = 'apply') {
if (number instanceof BigNumber_js_1.default) {
super();
number.copy(this);
}
else {
super(number, base, endian);
}
if (modN !== 'nocheck') {
const check = this.checkInField();
if (!check.inField) {
if (modN === 'error') {
throw new Error('Input is out of field');
}
// Force the PrivateKey BigNumber value to lie in the field limited by curve.n
BigNumber_js_1.default.move(this, check.modN);
}
}
}
/**
* A utility function to check that the value of this PrivateKey lies in the field limited by curve.n
* @returns { inField, modN } where modN is this PrivateKey's current BigNumber value mod curve.n, and inField is true only if modN equals current BigNumber value.
*/
checkInField() {
const curve = new Curve_js_1.default();
const modN = this.mod(curve.n);
const inField = this.cmp(modN) === 0;
return { inField, modN };
}
/**
* @returns true if the PrivateKey's current BigNumber value lies in the field limited by curve.n
*/
isValid() {
return this.checkInField().inField;
}
/**
* Signs a message using the private key.
*
* @method sign
* @param msg - The message (array of numbers or string) to be signed.
* @param enc - If 'hex' the string will be treated as hex, utf8 otherwise.
* @param forceLowS - If true (the default), the signature will be forced to have a low S value.
* @param customK — If provided, uses a custom K-value for the signature. Provie a function that returns a BigNumber, or the BigNumber itself.
* @returns A digital signature generated from the hash of the message and the private key.
*
* @example
* const privateKey = PrivateKey.fromRandom();
* const signature = privateKey.sign('Hello, World!');
*/
sign(msg, enc, forceLowS = true, customK) {
const msgHash = new BigNumber_js_1.default((0, Hash_js_1.sha256)(msg, enc), 16);
return (0, ECDSA_js_1.sign)(msgHash, this, forceLowS, customK);
}
/**
* Verifies a message's signature using the public key associated with this private key.
*
* @method verify
* @param msg - The original message which has been signed.
* @param sig - The signature to be verified.
* @param enc - The data encoding method.
* @returns Whether or not the signature is valid.
*
* @example
* const privateKey = PrivateKey.fromRandom();
* const signature = privateKey.sign('Hello, World!');
* const isSignatureValid = privateKey.verify('Hello, World!', signature);
*/
verify(msg, sig, enc) {
const msgHash = new BigNumber_js_1.default((0, Hash_js_1.sha256)(msg, enc), 16);
return (0, ECDSA_js_1.verify)(msgHash, sig, this.toPublicKey());
}
/**
* Converts the private key to its corresponding public key.
*
* The public key is generated by multiplying the base point G of the curve and the private key.
*
* @method toPublicKey
* @returns The generated PublicKey.
*
* @example
* const privateKey = PrivateKey.fromRandom();
* const publicKey = privateKey.toPublicKey();
*/
toPublicKey() {
const c = new Curve_js_1.default();
const p = c.g.mul(this);
return new PublicKey_js_1.default(p.x, p.y);
}
/**
* Converts the private key to a Wallet Import Format (WIF) string.
*
* Base58Check encoding is used for encoding the private key.
* The prefix
*
* @method toWif
* @returns The WIF string.
*
* @param prefix defaults to [0x80] for mainnet, set it to [0xef] for testnet.
*
* @throws Error('Value is out of field') if current BigNumber value is out of field limited by curve.n
*
* @example
* const privateKey = PrivateKey.fromRandom();
* const wif = privateKey.toWif();
* const testnetWif = privateKey.toWif([0xef]);
*/
toWif(prefix = [0x80]) {
if (!this.isValid()) {
throw new Error('Value is out of field');
}
return (0, utils_js_1.toBase58Check)([...this.toArray('be', 32), 1], prefix);
}
/**
* Base58Check encodes the hash of the public key associated with this private key with a prefix to indicate locking script type.
* Defaults to P2PKH for mainnet, otherwise known as a "Bitcoin Address".
*
* @param prefix defaults to [0x00] for mainnet, set to [0x6f] for testnet or use the strings 'testnet' or 'mainnet'
*
* @returns Returns the address encoding associated with the hash of the public key associated with this private key.
*
* @example
* const address = privkey.toAddress()
* const address = privkey.toAddress('mainnet')
* const testnetAddress = privkey.toAddress([0x6f])
* const testnetAddress = privkey.toAddress('testnet')
*/
toAddress(prefix = [0x00]) {
return this.toPublicKey().toAddress(prefix);
}
/**
* Converts this PrivateKey to a hexadecimal string.
*
* @method toHex
* @param length - The minimum length of the hex string
* @returns Returns a string representing the hexadecimal value of this BigNumber.
*
* @example
* const bigNumber = new BigNumber(255);
* const hex = bigNumber.toHex();
*/
toHex() {
return super.toHex(32);
}
/**
* Converts this PrivateKey to a string representation.
*
* @method toString
* @param {number | 'hex'} [base='hex'] - The base for representing the number. Default is hexadecimal ('hex').
* @param {number} [padding=64] - The minimum number of digits for the output string. Default is 64, ensuring a 256-bit representation in hexadecimal.
* @returns {string} A string representation of the PrivateKey in the specified base, padded to the specified length.
*
**/
toString(base = 'hex', padding = 64) {
return super.toString(base, padding);
}
/**
* Derives a shared secret from the public key.
*
* @method deriveSharedSecret
* @param key - The public key to derive the shared secret from.
* @returns The derived shared secret (a point on the curve).
* @throws Will throw an error if the public key is not valid.
*
* @example
* const privateKey = PrivateKey.fromRandom();
* const publicKey = privateKey.toPublicKey();
* const sharedSecret = privateKey.deriveSharedSecret(publicKey);
*/
deriveSharedSecret(key) {
if (!key.validate()) {
throw new Error('Public key not valid for ECDH secret derivation');
}
return key.mul(this);
}
/**
* Derives a child key with BRC-42.
* @param publicKey The public key of the other party
* @param invoiceNumber The invoice number used to derive the child key
* @param cacheSharedSecret Optional function to cache shared secrets
* @param retrieveCachedSharedSecret Optional function to retrieve shared secrets from the cache
* @returns The derived child key.
*/
deriveChild(publicKey, invoiceNumber, cacheSharedSecret, retrieveCachedSharedSecret) {
let sharedSecret;
if (typeof retrieveCachedSharedSecret === 'function') {
const retrieved = retrieveCachedSharedSecret(this, publicKey);
if (typeof retrieved !== 'undefined') {
sharedSecret = retrieved;
}
else {
sharedSecret = this.deriveSharedSecret(publicKey);
if (typeof cacheSharedSecret === 'function') {
cacheSharedSecret(this, publicKey, sharedSecret);
}
}
}
else {
sharedSecret = this.deriveSharedSecret(publicKey);
}
const invoiceNumberBin = (0, utils_js_1.toArray)(invoiceNumber, 'utf8');
const hmac = (0, Hash_js_1.sha256hmac)(sharedSecret.encode(true), invoiceNumberBin);
const curve = new Curve_js_1.default();
return new PrivateKey(this.add(new BigNumber_js_1.default(hmac)).mod(curve.n).toArray());
}
/**
* Splits the private key into shares using Shamir's Secret Sharing Scheme.
*
* @param threshold The minimum number of shares required to reconstruct the private key.
* @param totalShares The total number of shares to generate.
* @param prime The prime number to be used in Shamir's Secret Sharing Scheme.
* @returns An array of shares.
*
* @example
* const key = PrivateKey.fromRandom()
* const shares = key.toKeyShares(2, 5)
*/
toKeyShares(threshold, totalShares) {
if (typeof threshold !== 'number' || typeof totalShares !== 'number') {
throw new Error('threshold and totalShares must be numbers');
}
if (threshold < 2)
throw new Error('threshold must be at least 2');
if (totalShares < 2)
throw new Error('totalShares must be at least 2');
if (threshold > totalShares) {
throw new Error('threshold should be less than or equal to totalShares');
}
const poly = Polynomial_js_1.default.fromPrivateKey(this, threshold);
const points = [];
const usedXCoordinates = new Set();
const curve = new Curve_js_1.default();
/**
* Cryptographically secure x-coordinate generation for Shamir's Secret Sharing (toKeyShares)
*
* - Each x-coordinate is derived using a master seed (Random(64)) as the HMAC key and a per-attempt counter array as the message.
* - The counter array includes the share index, the attempt number (to handle rare collisions), and 32 bytes of fresh randomness for each attempt.
* - This ensures:
* 1. **Non-determinism**: Each split is unique, even for the same key and parameters, due to the per-attempt randomness.
* 2. **Uniqueness**: x-coordinates are checked for zero and duplication; retry logic ensures no repeats or invalid values.
* 3. **Cryptographic strength**: HMAC-SHA-512 is robust, and combining deterministic and random values protects against RNG compromise or bias.
* 4. **Defensive programming**: Attempts are capped (5 per share) to prevent infinite loops in pathological cases.
*
* This approach is robust against all practical attacks and is suitable for high-security environments where deterministic splits are not desired.
*/
const seed = (0, Random_js_1.default)(64);
for (let i = 0; i < totalShares; i++) {
let x;
let attempts = 0;
do {
// To ensure no two points are ever the same, even if the system RNG is compromised,
// we'll use a different counter value for each point and use SHA-512 HMAC.
const counter = [i, attempts, ...(0, Random_js_1.default)(32)];
const h = (0, Hash_js_1.sha512hmac)(seed, counter);
x = new BigNumber_js_1.default(h).umod(curve.p);
// repeat generation if x is zero or has already been used (insanely unlikely)
attempts++;
if (attempts > 5) {
throw new Error('Failed to generate unique x coordinate after 5 attempts');
}
} while (x.isZero() || usedXCoordinates.has(x.toString()));
usedXCoordinates.add(x.toString());
const y = poly.valueAt(x);
points.push(new Polynomial_js_1.PointInFiniteField(x, y));
}
const integrity = this.toPublicKey().toHash('hex').slice(0, 8);
return new KeyShares(points, threshold, integrity);
}
/**
* @method toBackupShares
*
* Creates a backup of the private key by splitting it into shares.
*
*
* @param threshold The number of shares which will be required to reconstruct the private key.
* @param totalShares The number of shares to generate for distribution.
* @returns
*/
toBackupShares(threshold, totalShares) {
return this.toKeyShares(threshold, totalShares).toBackupFormat();
}
/**
*
* @method fromBackupShares
*
* Creates a private key from backup shares.
*
* @param shares
* @returns PrivateKey
*
* @example
*
* const share1 = '3znuzt7DZp8HzZTfTh5MF9YQKNX3oSxTbSYmSRGrH2ev.2Nm17qoocmoAhBTCs8TEBxNXCskV9N41rB2PckcgYeqV.2.35449bb9'
* const share2 = 'Cm5fuUc39X5xgdedao8Pr1kvCSm8Gk7Cfenc7xUKcfLX.2juyK9BxCWn2DiY5JUAgj9NsQ77cc9bWksFyW45haXZm.2.35449bb9'
*
* const recoveredKey = PrivateKey.fromBackupShares([share1, share2])
*/
static fromBackupShares(shares) {
return PrivateKey.fromKeyShares(KeyShares.fromBackupFormat(shares));
}
/**
* Combines shares to reconstruct the private key.
*
* @param shares An array of points (shares) to be used to reconstruct the private key.
* @param threshold The minimum number of shares required to reconstruct the private key.
*
* @returns The reconstructed private key.
*
**/
static fromKeyShares(keyShares) {
const { points, threshold, integrity } = keyShares;
if (threshold < 2)
throw new Error('threshold must be at least 2');
if (points.length < threshold) {
throw new Error(`At least ${threshold} shares are required to reconstruct the private key`);
}
// check to see if two points have the same x value
for (let i = 0; i < threshold; i++) {
for (let j = i + 1; j < threshold; j++) {
if (points[i].x.eq(points[j].x)) {
throw new Error('Duplicate share detected, each must be unique.');
}
}
}
const poly = new Polynomial_js_1.default(points, threshold);
const privateKey = new PrivateKey(poly.valueAt(new BigNumber_js_1.default(0)).toArray());
const integrityHash = privateKey.toPublicKey().toHash('hex').slice(0, 8);
if (integrityHash !== integrity) {
throw new Error('Integrity hash mismatch');
}
return privateKey;
}
}
exports.default = PrivateKey;
//# sourceMappingURL=PrivateKey.js.map