-
Notifications
You must be signed in to change notification settings - Fork 143
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
TSS Library: Define and create a Test Plan #14134
Comments
In the TSS-Library, the operations that rely on a source of randomness are:
As for the operations that rely on order:
In Pairings-Signature-Library, the creation of the private key depends on a random value. |
Here is the document: |
@mxtartaglia-sl It seems I cannot comment in the doc, so I will leave my comments here:
I would say we should have a JMH performance test at the top level. So generate shares, aggregate signatures and so on. What I have been doing with JMH results is just adding them to the class as a comment. I think these results should give us an idea about how long certain tasks take, how many shares can we practically support etc. |
I'm in favor of prioritizing the complex algorithmic tests and leaving the functionality tests of basic algebraic operations till the vary end. |
This task aims to define the testing plan for assuring the quality of the project's cryptographic components.
Goals:
Since cryptographic code is often difficult to test, we should design our test cases based on the cryptographic properties that these implementations should satisfy.
Proposed tests
Pairings Keys
What should the comparison check?
Pairings Signatures
Pairings
TSS
The private key can decrypt the intended recipient’s parts and no others.
-> Different polynomial commitment
-> Different PaticipantDictionary
-> Detection of invalid proof
-> An aggregated private share has the same length of its original source
-> An aggregated private share is different from its original source
-> Threshold number of messages can produce a valid public key
-> Public key does not change when rehasing
-> Unforgeability of group signature:
Less than threshold number of signatures cannot produce a valid aggregated signature
More than threshold number of signatures can produce a valid aggregated signature
-> Fixed length of threshold signature. Our scheme ensures that the size of a threshold signature is fixed (i.e., not depending on the number of signers).
Other tests mentioned in the bibliography that might apply for the TssMessage generation:
EVM
Material:
The text was updated successfully, but these errors were encountered: