@@ -24,15 +24,14 @@ func TestBDN_HashPointToR_BN256(t *testing.T) {
24
24
p2 := suite .Point ().Mul (two , suite .Point ().Base ())
25
25
p3 := suite .Point ().Mul (three , suite .Point ().Base ())
26
26
27
- coefs , err := hashPointToR ([]kyber.Point {p1 , p2 , p3 })
27
+ coefs , err := hashPointToR (suite , []kyber.Point {p1 , p2 , p3 })
28
28
29
29
require .NoError (t , err )
30
30
require .Equal (t , "35b5b395f58aba3b192fb7e1e5f2abd3" , coefs [0 ].String ())
31
31
require .Equal (t , "14dcc79d46b09b93075266e47cd4b19e" , coefs [1 ].String ())
32
32
require .Equal (t , "933f6013eb3f654f9489d6d45ad04eaf" , coefs [2 ].String ())
33
- require .Equal (t , 16 , coefs [0 ].MarshalSize ())
34
33
35
- mask , _ := NewMask ([]kyber.Point {p1 , p2 , p3 }, nil )
34
+ mask , _ := NewMask (suite , []kyber.Point {p1 , p2 , p3 }, nil )
36
35
mask .SetBit (0 , true )
37
36
mask .SetBit (1 , true )
38
37
mask .SetBit (2 , true )
@@ -48,15 +47,14 @@ func TestBDN_HashPointToR_BN256(t *testing.T) {
48
47
49
48
func TestBDN_AggregateSignatures (t * testing.T ) {
50
49
msg := []byte ("Hello Boneh-Lynn-Shacham" )
51
- suite := bn256 .NewSuite ()
52
50
private1 , public1 := NewKeyPair (suite , random .New ())
53
51
private2 , public2 := NewKeyPair (suite , random .New ())
54
52
sig1 , err := Sign (suite , private1 , msg )
55
53
require .NoError (t , err )
56
54
sig2 , err := Sign (suite , private2 , msg )
57
55
require .NoError (t , err )
58
56
59
- mask , _ := NewMask ([]kyber.Point {public1 , public2 }, nil )
57
+ mask , _ := NewMask (suite , []kyber.Point {public1 , public2 }, nil )
60
58
mask .SetBit (0 , true )
61
59
mask .SetBit (1 , true )
62
60
@@ -85,7 +83,6 @@ func TestBDN_AggregateSignatures(t *testing.T) {
85
83
86
84
func TestBDN_SubsetSignature (t * testing.T ) {
87
85
msg := []byte ("Hello Boneh-Lynn-Shacham" )
88
- suite := bn256 .NewSuite ()
89
86
private1 , public1 := NewKeyPair (suite , random .New ())
90
87
private2 , public2 := NewKeyPair (suite , random .New ())
91
88
_ , public3 := NewKeyPair (suite , random .New ())
@@ -94,7 +91,7 @@ func TestBDN_SubsetSignature(t *testing.T) {
94
91
sig2 , err := Sign (suite , private2 , msg )
95
92
require .NoError (t , err )
96
93
97
- mask , _ := NewMask ([]kyber.Point {public1 , public3 , public2 }, nil )
94
+ mask , _ := NewMask (suite , []kyber.Point {public1 , public3 , public2 }, nil )
98
95
mask .SetBit (0 , true )
99
96
mask .SetBit (2 , true )
100
97
@@ -113,7 +110,6 @@ func TestBDN_SubsetSignature(t *testing.T) {
113
110
114
111
func TestBDN_RogueAttack (t * testing.T ) {
115
112
msg := []byte ("Hello Boneh-Lynn-Shacham" )
116
- suite := bn256 .NewSuite ()
117
113
scheme := bls .NewSchemeOnG1 (suite )
118
114
// honest
119
115
_ , public1 := scheme .NewKeyPair (random .New ())
@@ -133,7 +129,7 @@ func TestBDN_RogueAttack(t *testing.T) {
133
129
require .NoError (t , scheme .Verify (agg , msg , sig ))
134
130
135
131
// New scheme that should detect
136
- mask , _ := NewMask (pubs , nil )
132
+ mask , _ := NewMask (suite , pubs , nil )
137
133
mask .SetBit (0 , true )
138
134
mask .SetBit (1 , true )
139
135
agg , err = AggregatePublicKeys (suite , mask )
@@ -142,7 +138,6 @@ func TestBDN_RogueAttack(t *testing.T) {
142
138
}
143
139
144
140
func Benchmark_BDN_AggregateSigs (b * testing.B ) {
145
- suite := bn256 .NewSuite ()
146
141
private1 , public1 := NewKeyPair (suite , random .New ())
147
142
private2 , public2 := NewKeyPair (suite , random .New ())
148
143
msg := []byte ("Hello many times Boneh-Lynn-Shacham" )
@@ -151,7 +146,7 @@ func Benchmark_BDN_AggregateSigs(b *testing.B) {
151
146
sig2 , err := Sign (suite , private2 , msg )
152
147
require .Nil (b , err )
153
148
154
- mask , _ := NewMask ([]kyber.Point {public1 , public2 }, nil )
149
+ mask , _ := NewMask (suite , []kyber.Point {public1 , public2 }, nil )
155
150
mask .SetBit (0 , true )
156
151
mask .SetBit (1 , false )
157
152
@@ -172,7 +167,7 @@ func Benchmark_BDN_BLS12381_AggregateVerify(b *testing.B) {
172
167
privKeys [i ], pubKeys [i ] = schemeOnG2 .NewKeyPair (rng )
173
168
}
174
169
175
- mask , err := NewMask (pubKeys , nil )
170
+ mask , err := NewMask (suite . G1 (), pubKeys , nil )
176
171
require .NoError (b , err )
177
172
for i := range pubKeys {
178
173
require .NoError (b , mask .SetBit (i , true ))
@@ -210,7 +205,6 @@ func unmarshalHex[T encoding.BinaryUnmarshaler](t *testing.T, into T, s string)
210
205
// This tests exists to make sure we don't accidentally make breaking changes to signature
211
206
// aggregation by using checking against known aggregated signatures and keys.
212
207
func TestBDNFixtures (t * testing.T ) {
213
- suite := bn256 .NewSuite ()
214
208
schemeOnG1 := NewSchemeOnG1 (suite )
215
209
216
210
public1 := unmarshalHex (t , suite .G2 ().Point (), "1a30714035c7a161e286e54c191b8c68345bd8239c74925a26290e8e1ae97ed6657958a17dca12c943fadceb11b824402389ff427179e0f10194da3c1b771c6083797d2b5915ea78123cbdb99ea6389d6d6b67dcb512a2b552c373094ee5693524e3ebb4a176f7efa7285c25c80081d8cb598745978f1a63b886c09a316b1493" )
@@ -243,7 +237,7 @@ func TestBDNFixtures(t *testing.T) {
243
237
require .Nil (t , err )
244
238
require .Equal (t , sig3Exp , sig3 )
245
239
246
- mask , _ := NewMask ([]kyber.Point {public1 , public2 , public3 }, nil )
240
+ mask , _ := NewMask (suite , []kyber.Point {public1 , public2 , public3 }, nil )
247
241
mask .SetBit (0 , true )
248
242
mask .SetBit (1 , false )
249
243
mask .SetBit (2 , true )
0 commit comments