multisig HMAC
Project description
multisig-hmac-python-version
Multisig scheme for HMAC authentication
Work in progress
Usage
Key management can happen in either of two modes, either by storing every of the component keys, or by storing a single master seed and using that to derive keys ad hoc.
Using stored keys:
m = MultisigHMAC()
# generate keys which need to be stored securely and need to be shared securely with each party
k1 = m.keygen()
k2 = m.keygen()
k3 = m.keygen()
# sign by each client with 2-of-3
data = b'Hello world'
s1 = m.sign(k1, data)
s3 = m.sign(k3, data)
out = m.combine([s1, s3])
sent = (out[0], base64.urlsafe_b64encode(out[1]))
# --- network ---
received = (sent[0], base64.urlsafe_b64decode(sent[1]))
# verify on the server
threshold = 2
keys = [k1, k2, k3]
signature = received
m.verify(keys, signature, data, threshold)
Using a derived master key:
m = MultisigHMAC()
# generate a master seed which needs to be stored securely
# this seed must NOT be shared with any other party
seed = m.seedgen()
k1 = m.keygen()
k2 = m.keygen()
k3 = m.keygen()
# sign by each client with 2-of-3
data = b'Hello world'
s1 = m.sign(k1, data)
s3 = m.sign(k3, data)
out = m.combine([s1, s3])
sent = (out[0], base64.urlsafe_b64encode(out[1]))
# --- network ---
received = (sent[0], base64.urlsafe_b64decode(sent[1]))
# verify on the server, but now keys are dynamically derived
threshold = 2
keys = [k1, k2, k3]
signature = received
m.verifyDerived(keys, signature, data, threshold)
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
multisig-hmac-0.0.4.tar.gz
(3.4 kB
view hashes)
Built Distribution
Close
Hashes for multisig_hmac-0.0.4-py3-none-any.whl
Algorithm | Hash digest | |
---|---|---|
SHA256 | 7faf07b884e7f4325eda0b2e15fa8ea18b79bda8c69d0b8ab00f4bf66ce4508a |
|
MD5 | edfde13a3a2cf6e526628593e631f4fc |
|
BLAKE2b-256 | 5c95f13e6feca39c2f9f93727ae955cb3f07cca7ae39c925429d1ce8c07826d8 |