UNPKG

@bsv/sdk

Version:

BSV Blockchain Software Development Kit

481 lines 19.8 kB
import BigNumber from './BigNumber.js'; import PublicKey from './PublicKey.js'; import Curve from './Curve.js'; import { sign, verify } from './ECDSA.js'; import { sha256, sha256hmac, sha512hmac } from './Hash.js'; import Random from './Random.js'; import { fromBase58Check, toArray, toBase58Check } from './utils.js'; import Polynomial, { PointInFiniteField } from './Polynomial.js'; /** * @class KeyShares * * This class is used to store the shares of a private key. * * @param shares - An array of shares * @param threshold - The number of shares required to recombine the private key * * @returns KeyShares * * @example * const key = PrivateKey.fromShares(shares) * */ export class KeyShares { points; threshold; integrity; constructor(points, threshold, integrity) { this.points = points; this.threshold = threshold; this.integrity = integrity; } static fromBackupFormat(shares) { let threshold = 0; let integrity = ''; const points = shares.map((share, idx) => { const shareParts = share.split('.'); if (shareParts.length !== 4) { throw new Error('Invalid share format in share ' + idx.toString() + '. Expected format: "x.y.t.i" - received ' + share); } const [x, y, t, i] = shareParts; if (t === undefined) throw new Error('Threshold not found in share ' + idx.toString()); if (i === undefined) throw new Error('Integrity not found in share ' + idx.toString()); const tInt = parseInt(t); if (idx !== 0 && threshold !== tInt) { throw new Error('Threshold mismatch in share ' + idx.toString()); } if (idx !== 0 && integrity !== i) { throw new Error('Integrity mismatch in share ' + idx.toString()); } threshold = tInt; integrity = i; return PointInFiniteField.fromString([x, y].join('.')); }); return new KeyShares(points, threshold, integrity); } toBackupFormat() { return this.points.map((share) => share.toString() + '.' + this.threshold.toString() + '.' + this.integrity); } } /** * Represents a Private Key, which is a secret that can be used to generate signatures in a cryptographic system. * * The `PrivateKey` class extends from the `BigNumber` class. It offers methods to create signatures, verify them, * create a corresponding public key and derive a shared secret from a public key. * * @extends {BigNumber} * @see {@link BigNumber} for more information on BigNumber. */ export default class PrivateKey extends BigNumber { /** * Generates a private key randomly. * * @method fromRandom * @static * @returns The newly generated Private Key. * * @example * const privateKey = PrivateKey.fromRandom(); */ static fromRandom() { return new PrivateKey(Random(32)); } /** * Generates a private key from a string. * * @method fromString * @static * @param str - The string to generate the private key from. * @param base - The base of the string. * @returns The generated Private Key. * @throws Will throw an error if the string is not valid. **/ static fromString(str, base = 'hex') { return new PrivateKey(super.fromString(str, base).toArray()); } /** * Generates a private key from a hexadecimal string. * * @method fromHex * @static * @param {string} str - The hexadecimal string representing the private key. The string must represent a valid private key in big-endian format. * @returns {PrivateKey} The generated Private Key instance. * @throws {Error} If the string is not a valid hexadecimal or represents an invalid private key. **/ static fromHex(str) { return new PrivateKey(super.fromHex(str, 'big')); } /** * Generates a private key from a WIF (Wallet Import Format) string. * * @method fromWif * @static * @param wif - The WIF string to generate the private key from. * @param base - The base of the string. * @returns The generated Private Key. * @throws Will throw an error if the string is not a valid WIF. **/ static fromWif(wif, prefixLength = 1) { const decoded = fromBase58Check(wif, undefined, prefixLength); if (decoded.data.length !== 33) { throw new Error('Invalid WIF length'); } if (decoded.data[32] !== 1) { throw new Error('Invalid WIF padding'); } return new PrivateKey(decoded.data.slice(0, 32)); } /** * @constructor * * @param number - The number (various types accepted) to construct a BigNumber from. Default is 0. * * @param base - The base of number provided. By default is 10. Ignored if number is BigNumber. * * @param endian - The endianness provided. By default is 'big endian'. Ignored if number is BigNumber. * * @param modN - Optional. Default 'apply. If 'apply', apply modN to input to guarantee a valid PrivateKey. If 'error', if input is out of field throw new Error('Input is out of field'). If 'nocheck', assumes input is in field. * * @example * import PrivateKey from './PrivateKey'; * import BigNumber from './BigNumber'; * const privKey = new PrivateKey(new BigNumber('123456', 10, 'be')); */ constructor(number = 0, base = 10, endian = 'be', modN = 'apply') { if (number instanceof BigNumber) { super(); number.copy(this); } else { super(number, base, endian); } if (modN !== 'nocheck') { const check = this.checkInField(); if (!check.inField) { if (modN === 'error') { throw new Error('Input is out of field'); } // Force the PrivateKey BigNumber value to lie in the field limited by curve.n BigNumber.move(this, check.modN); } } } /** * A utility function to check that the value of this PrivateKey lies in the field limited by curve.n * @returns { inField, modN } where modN is this PrivateKey's current BigNumber value mod curve.n, and inField is true only if modN equals current BigNumber value. */ checkInField() { const curve = new Curve(); const modN = this.mod(curve.n); const inField = this.cmp(modN) === 0; return { inField, modN }; } /** * @returns true if the PrivateKey's current BigNumber value lies in the field limited by curve.n */ isValid() { return this.checkInField().inField; } /** * Signs a message using the private key. * * @method sign * @param msg - The message (array of numbers or string) to be signed. * @param enc - If 'hex' the string will be treated as hex, utf8 otherwise. * @param forceLowS - If true (the default), the signature will be forced to have a low S value. * @param customK — If provided, uses a custom K-value for the signature. Provie a function that returns a BigNumber, or the BigNumber itself. * @returns A digital signature generated from the hash of the message and the private key. * * @example * const privateKey = PrivateKey.fromRandom(); * const signature = privateKey.sign('Hello, World!'); */ sign(msg, enc, forceLowS = true, customK) { const msgHash = new BigNumber(sha256(msg, enc), 16); return sign(msgHash, this, forceLowS, customK); } /** * Verifies a message's signature using the public key associated with this private key. * * @method verify * @param msg - The original message which has been signed. * @param sig - The signature to be verified. * @param enc - The data encoding method. * @returns Whether or not the signature is valid. * * @example * const privateKey = PrivateKey.fromRandom(); * const signature = privateKey.sign('Hello, World!'); * const isSignatureValid = privateKey.verify('Hello, World!', signature); */ verify(msg, sig, enc) { const msgHash = new BigNumber(sha256(msg, enc), 16); return verify(msgHash, sig, this.toPublicKey()); } /** * Converts the private key to its corresponding public key. * * The public key is generated by multiplying the base point G of the curve and the private key. * * @method toPublicKey * @returns The generated PublicKey. * * @example * const privateKey = PrivateKey.fromRandom(); * const publicKey = privateKey.toPublicKey(); */ toPublicKey() { const c = new Curve(); const p = c.g.mul(this); return new PublicKey(p.x, p.y); } /** * Converts the private key to a Wallet Import Format (WIF) string. * * Base58Check encoding is used for encoding the private key. * The prefix * * @method toWif * @returns The WIF string. * * @param prefix defaults to [0x80] for mainnet, set it to [0xef] for testnet. * * @throws Error('Value is out of field') if current BigNumber value is out of field limited by curve.n * * @example * const privateKey = PrivateKey.fromRandom(); * const wif = privateKey.toWif(); * const testnetWif = privateKey.toWif([0xef]); */ toWif(prefix = [0x80]) { if (!this.isValid()) { throw new Error('Value is out of field'); } return toBase58Check([...this.toArray('be', 32), 1], prefix); } /** * Base58Check encodes the hash of the public key associated with this private key with a prefix to indicate locking script type. * Defaults to P2PKH for mainnet, otherwise known as a "Bitcoin Address". * * @param prefix defaults to [0x00] for mainnet, set to [0x6f] for testnet or use the strings 'testnet' or 'mainnet' * * @returns Returns the address encoding associated with the hash of the public key associated with this private key. * * @example * const address = privkey.toAddress() * const address = privkey.toAddress('mainnet') * const testnetAddress = privkey.toAddress([0x6f]) * const testnetAddress = privkey.toAddress('testnet') */ toAddress(prefix = [0x00]) { return this.toPublicKey().toAddress(prefix); } /** * Converts this PrivateKey to a hexadecimal string. * * @method toHex * @param length - The minimum length of the hex string * @returns Returns a string representing the hexadecimal value of this BigNumber. * * @example * const bigNumber = new BigNumber(255); * const hex = bigNumber.toHex(); */ toHex() { return super.toHex(32); } /** * Converts this PrivateKey to a string representation. * * @method toString * @param {number | 'hex'} [base='hex'] - The base for representing the number. Default is hexadecimal ('hex'). * @param {number} [padding=64] - The minimum number of digits for the output string. Default is 64, ensuring a 256-bit representation in hexadecimal. * @returns {string} A string representation of the PrivateKey in the specified base, padded to the specified length. * **/ toString(base = 'hex', padding = 64) { return super.toString(base, padding); } /** * Derives a shared secret from the public key. * * @method deriveSharedSecret * @param key - The public key to derive the shared secret from. * @returns The derived shared secret (a point on the curve). * @throws Will throw an error if the public key is not valid. * * @example * const privateKey = PrivateKey.fromRandom(); * const publicKey = privateKey.toPublicKey(); * const sharedSecret = privateKey.deriveSharedSecret(publicKey); */ deriveSharedSecret(key) { if (!key.validate()) { throw new Error('Public key not valid for ECDH secret derivation'); } return key.mul(this); } /** * Derives a child key with BRC-42. * @param publicKey The public key of the other party * @param invoiceNumber The invoice number used to derive the child key * @param cacheSharedSecret Optional function to cache shared secrets * @param retrieveCachedSharedSecret Optional function to retrieve shared secrets from the cache * @returns The derived child key. */ deriveChild(publicKey, invoiceNumber, cacheSharedSecret, retrieveCachedSharedSecret) { let sharedSecret; if (typeof retrieveCachedSharedSecret === 'function') { const retrieved = retrieveCachedSharedSecret(this, publicKey); if (typeof retrieved !== 'undefined') { sharedSecret = retrieved; } else { sharedSecret = this.deriveSharedSecret(publicKey); if (typeof cacheSharedSecret === 'function') { cacheSharedSecret(this, publicKey, sharedSecret); } } } else { sharedSecret = this.deriveSharedSecret(publicKey); } const invoiceNumberBin = toArray(invoiceNumber, 'utf8'); const hmac = sha256hmac(sharedSecret.encode(true), invoiceNumberBin); const curve = new Curve(); return new PrivateKey(this.add(new BigNumber(hmac)).mod(curve.n).toArray()); } /** * Splits the private key into shares using Shamir's Secret Sharing Scheme. * * @param threshold The minimum number of shares required to reconstruct the private key. * @param totalShares The total number of shares to generate. * @param prime The prime number to be used in Shamir's Secret Sharing Scheme. * @returns An array of shares. * * @example * const key = PrivateKey.fromRandom() * const shares = key.toKeyShares(2, 5) */ toKeyShares(threshold, totalShares) { if (typeof threshold !== 'number' || typeof totalShares !== 'number') { throw new Error('threshold and totalShares must be numbers'); } if (threshold < 2) throw new Error('threshold must be at least 2'); if (totalShares < 2) throw new Error('totalShares must be at least 2'); if (threshold > totalShares) { throw new Error('threshold should be less than or equal to totalShares'); } const poly = Polynomial.fromPrivateKey(this, threshold); const points = []; const usedXCoordinates = new Set(); const curve = new Curve(); /** * Cryptographically secure x-coordinate generation for Shamir's Secret Sharing (toKeyShares) * * - Each x-coordinate is derived using a master seed (Random(64)) as the HMAC key and a per-attempt counter array as the message. * - The counter array includes the share index, the attempt number (to handle rare collisions), and 32 bytes of fresh randomness for each attempt. * - This ensures: * 1. **Non-determinism**: Each split is unique, even for the same key and parameters, due to the per-attempt randomness. * 2. **Uniqueness**: x-coordinates are checked for zero and duplication; retry logic ensures no repeats or invalid values. * 3. **Cryptographic strength**: HMAC-SHA-512 is robust, and combining deterministic and random values protects against RNG compromise or bias. * 4. **Defensive programming**: Attempts are capped (5 per share) to prevent infinite loops in pathological cases. * * This approach is robust against all practical attacks and is suitable for high-security environments where deterministic splits are not desired. */ const seed = Random(64); for (let i = 0; i < totalShares; i++) { let x; let attempts = 0; do { // To ensure no two points are ever the same, even if the system RNG is compromised, // we'll use a different counter value for each point and use SHA-512 HMAC. const counter = [i, attempts, ...Random(32)]; const h = sha512hmac(seed, counter); x = new BigNumber(h).umod(curve.p); // repeat generation if x is zero or has already been used (insanely unlikely) attempts++; if (attempts > 5) { throw new Error('Failed to generate unique x coordinate after 5 attempts'); } } while (x.isZero() || usedXCoordinates.has(x.toString())); usedXCoordinates.add(x.toString()); const y = poly.valueAt(x); points.push(new PointInFiniteField(x, y)); } const integrity = this.toPublicKey().toHash('hex').slice(0, 8); return new KeyShares(points, threshold, integrity); } /** * @method toBackupShares * * Creates a backup of the private key by splitting it into shares. * * * @param threshold The number of shares which will be required to reconstruct the private key. * @param totalShares The number of shares to generate for distribution. * @returns */ toBackupShares(threshold, totalShares) { return this.toKeyShares(threshold, totalShares).toBackupFormat(); } /** * * @method fromBackupShares * * Creates a private key from backup shares. * * @param shares * @returns PrivateKey * * @example * * const share1 = '3znuzt7DZp8HzZTfTh5MF9YQKNX3oSxTbSYmSRGrH2ev.2Nm17qoocmoAhBTCs8TEBxNXCskV9N41rB2PckcgYeqV.2.35449bb9' * const share2 = 'Cm5fuUc39X5xgdedao8Pr1kvCSm8Gk7Cfenc7xUKcfLX.2juyK9BxCWn2DiY5JUAgj9NsQ77cc9bWksFyW45haXZm.2.35449bb9' * * const recoveredKey = PrivateKey.fromBackupShares([share1, share2]) */ static fromBackupShares(shares) { return PrivateKey.fromKeyShares(KeyShares.fromBackupFormat(shares)); } /** * Combines shares to reconstruct the private key. * * @param shares An array of points (shares) to be used to reconstruct the private key. * @param threshold The minimum number of shares required to reconstruct the private key. * * @returns The reconstructed private key. * **/ static fromKeyShares(keyShares) { const { points, threshold, integrity } = keyShares; if (threshold < 2) throw new Error('threshold must be at least 2'); if (points.length < threshold) { throw new Error(`At least ${threshold} shares are required to reconstruct the private key`); } // check to see if two points have the same x value for (let i = 0; i < threshold; i++) { for (let j = i + 1; j < threshold; j++) { if (points[i].x.eq(points[j].x)) { throw new Error('Duplicate share detected, each must be unique.'); } } } const poly = new Polynomial(points, threshold); const privateKey = new PrivateKey(poly.valueAt(new BigNumber(0)).toArray()); const integrityHash = privateKey.toPublicKey().toHash('hex').slice(0, 8); if (integrityHash !== integrity) { throw new Error('Integrity hash mismatch'); } return privateKey; } } //# sourceMappingURL=PrivateKey.js.map