Support performant and cheap verification of Ed25519 cryptographic signatures in smart contracts in general by adding a precompiled contract for Ed25519 signature verification to the EVM.
Abstract
Verification of Ed25519 cryptographic signatures is obviously possible in EVM bytecode. However, the gas cost will be very high, and computationally expensive, as such tight, wide word operations intensive code as required for Ed25519 is not a good fit for the EVM bytecode model.
The addition of a native compiled function, in a precompiled contract, to the EVM solves both cost and performance problems.
Motivation
Ed25519 and Ed448 (that is, EdDSA using Curve25519 or Curve448) are IETF recommendations (RFC7748) with some attractive properties:
Ed25519 is intended to operate at around the 128-bit security level and Ed448 at around the 224-bit security level
EdDSA uses small public keys (32 or 57 octets) and signatures (64 or 114 octets) for Ed25519 and Ed448, respectively
Ed25519/Ed448 are designed so that fast, constant-time (timing attack resistant) and generally side-channel resistant implementations are easier to produce
Despite being around only for some years, post-Snowden, these curves have gained wide use quickly in various protocols and systems:
TLS / ECDH(E) (session keys)
TLS / x.509 (client and server certificates)
DNSSEC (zone signing)
OpenSSH (user keys)
GNUPG/OpenPGP (user keys)
OpenBSD Signify (software signing)
One motivation for Ed25519 signature verification in smart contracts is to associate existing off-chain systems, records or accounts that use Ed25519 (like above) with blockchain addresses or delegate by allowing to sign data with Ed25519 (only), and then submit this Ed25519-signed data anonymously (via any Eth sender address) to the blockchain, having the contract check the Ed25519 signature of the transaction.
Another motivation is the processing of external, Ed25519 proof-of-stake based blockchains within Ethereum smart contracts.
When a transactions contains data that comes with an Ed25519 signature, that proves that the sender of the Ethereum transaction was also in control of the private key (and the data), and this allows the contract to establish an association between the blockchain and the external system or account, and the external system establish the reverse relation.
For example, a contract might check a Ed25519 signed piece of data submitted to the Ethereum transaction like the current block number. That proves to the contract, that the sender is in possession of both the Ethereum private key and the Ed25519 private key, and hence the contract will accept an association between both. This again can be the root anchor for various powerful applications, as now a potentially crypto holding key owner has proven to be in control of some external off-chain system or account, like e.g. a DNS server, a DNS domain, a cluster node and so on.
Specification
If block.number >= CONSTANTINOPLE_FORK_BLKNUM, add a precompiled contract for Ed25519 signature verification (ED25519VFY).
The proposal adds a new precompiled function ED25519VFY with the following input and output.
ED25519VFY takes as input 128 octets:
message: the 32-octet message that was signed
public key: the 32-octet Ed25519 public key of the signer
signature: the 64-octet Ed25519 signature
ED25519VFY returns as output 4 octets:
0x00000000 if signature is valid
any non-zero value indicates a signature verification failure
Address
The address of ED25519VFY is 0x9.
Gas costs
Gas cost for ED25519VFY is 2000.
Rationale
The proposed ED25519VFY function takes the signer public key as a call parameter, as with Ed25519, I donβt believe it is possible to derive the signers public key from the signature and message alone.
The proposed ED25519VFY function uses a zero return value to indicate success, since this allows for different errors to be distinguished by return value, as all non-zero return values signal a verification failure.
ECRECOVER has a gas cost of 3000. Since Ed25519 is computationally cheaper, the gas price should be less.
Backwards Compatibility
As the proposed precompiled contract is deployed at a reserved (<255) and previously unused address, an implementation of the proposal should not introduce any backward compatibility issues.
Test Cases
Test vectors for Ed25519 can be found in this IETF ID https://tools.ietf.org/html/draft-josefsson-eddsa-ed25519-03#section-6.
More test vectors can be found in the regression tests of NaCl (see references).
Implementation
libsodium
libsodium is a mature, high-quality C implementation of Ed25519, with bindings for many languages.
Further, libsodium is (to my knowledge, and as of today 2018/04) the only Ed25519 implementation that has gone through a Security Assessment.
To minimize consensus failure risks, the proposal recommends to use libsodium for adding the precompile in all Ethereum client implementations.
Note: as an alternative to libsodium, I looked into HACL, an implementation of Ed25519 in F* (a ML dialect) that can be transpiled to C, and that was formally verified for functional correctness and memory safety of the resulting C code. However, this is new and compared to libsodium which is a βknow thingβ seems risky nevertheless.
libsodium bindings
Here is an overview of the language bindings to libsodium for four Ethereum clients this proposal recommends:
| Client | Language | libsodium binding |
βββββ|βββ-|βββββββ|
| Geth | Go | use cgo with C libsodium|
| Parity | Rust | sodiumoxide|
| PyEthereum | Python | PyNaCl|
| cpp-ethereum | C++ | libsodium|
βββββββββββββββββββββββββ-
Test vectors for Ed25519: https://tools.ietf.org/html/draft-josefsson-eddsa-ed25519-03#section-6
NaCl regression tests: https://ed25519.cr.yp.to/python/sign.py and https://ed25519.cr.yp.to/python/sign.input
On the recoverability of public keys from signature+message (alone): https://crypto.stackexchange.com/questions/9936/what-signature-schemes-allow-recovering-the-public-key-from-a-signature
Bernstein, D., βCurve25519: new Diffie-Hellman speed recordsβ, DOI 10.1007/11745853_14, February 2006, https://cr.yp.to/ecdh.html
Hamburg, M., βEd448-Goldilocks, a new elliptic curveβ, June 2015, https://eprint.iacr.org/2015/625>
RFC8080: Edwards-Curve Digital Security Algorithm (EdDSA) for DNSSEC (https://tools.ietf.org/html/rfc8080)