mirror of
https://source.quilibrium.com/quilibrium/ceremonyclient.git
synced 2024-12-30 18:35:18 +00:00
153 lines
3.8 KiB
Go
153 lines
3.8 KiB
Go
|
//
|
||
|
// Copyright Coinbase, Inc. All Rights Reserved.
|
||
|
//
|
||
|
// SPDX-License-Identifier: Apache-2.0
|
||
|
//
|
||
|
|
||
|
package camshoup
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"math/big"
|
||
|
|
||
|
"git.sr.ht/~sircmpwn/go-bare"
|
||
|
|
||
|
"source.quilibrium.com/quilibrium/monorepo/nekryptology/internal"
|
||
|
mod "source.quilibrium.com/quilibrium/monorepo/nekryptology/pkg/core"
|
||
|
)
|
||
|
|
||
|
type decryptionKeyMarshal struct {
|
||
|
X1 [][]byte `bare:"x1"`
|
||
|
X2 []byte `bare:"x2"`
|
||
|
X3 []byte `bare:"x3"`
|
||
|
Group []byte `bare:"group"`
|
||
|
}
|
||
|
|
||
|
// DecryptionKey decrypts verifiable ciphertext
|
||
|
// as described in section 3.2 in <https://shoup.net/papers/verenc.pdf>
|
||
|
type DecryptionKey struct {
|
||
|
x1 []*big.Int
|
||
|
x2, x3 *big.Int
|
||
|
group *PaillierGroup
|
||
|
}
|
||
|
|
||
|
// EncryptionKey returns the corresponding encryption key for this decryption key
|
||
|
func (dk DecryptionKey) EncryptionKey() *EncryptionKey {
|
||
|
y2 := dk.group.Gexp(dk.x2)
|
||
|
y3 := dk.group.Gexp(dk.x3)
|
||
|
y1 := make([]*big.Int, len(dk.x1))
|
||
|
for i, x := range dk.x1 {
|
||
|
y1[i] = dk.group.Gexp(x)
|
||
|
}
|
||
|
return &EncryptionKey{
|
||
|
y1, y2, y3, dk.group,
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// MarshalBinary serializes a key to bytes
|
||
|
func (dk DecryptionKey) MarshalBinary() ([]byte, error) {
|
||
|
tv := new(decryptionKeyMarshal)
|
||
|
var err error
|
||
|
tv.Group, err = dk.group.MarshalBinary()
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
tv.X3 = dk.x3.Bytes()
|
||
|
tv.X2 = dk.x2.Bytes()
|
||
|
tv.X1 = make([][]byte, len(dk.x1))
|
||
|
for i, y := range dk.x1 {
|
||
|
tv.X1[i] = y.Bytes()
|
||
|
}
|
||
|
return bare.Marshal(tv)
|
||
|
}
|
||
|
|
||
|
// UnmarshalBinary deserializes a key from bytes
|
||
|
func (dk *DecryptionKey) UnmarshalBinary(data []byte) error {
|
||
|
tv := new(decryptionKeyMarshal)
|
||
|
err := bare.Unmarshal(data, tv)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
dk.group = new(PaillierGroup)
|
||
|
err = dk.group.UnmarshalBinary(tv.Group)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
dk.x2 = new(big.Int).SetBytes(tv.X2)
|
||
|
dk.x3 = new(big.Int).SetBytes(tv.X3)
|
||
|
dk.x1 = make([]*big.Int, len(tv.X1))
|
||
|
for i, b := range tv.X1 {
|
||
|
dk.x1[i] = new(big.Int).SetBytes(b)
|
||
|
}
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
// Decrypt as described in section 3.2 in <https://shoup.net/papers/verenc.pdf>
|
||
|
func (dk DecryptionKey) Decrypt(domain []byte, cipherText *CipherText) ([]*big.Int, error) {
|
||
|
if cipherText == nil {
|
||
|
return nil, internal.ErrNilArguments
|
||
|
}
|
||
|
if cipherText.v == nil || cipherText.u == nil || cipherText.e == nil {
|
||
|
return nil, internal.ErrNilArguments
|
||
|
}
|
||
|
if len(cipherText.e) > len(dk.x1) {
|
||
|
return nil, fmt.Errorf("number of messages %d is more than supported by this key %d", len(cipherText.e), len(dk.x1))
|
||
|
}
|
||
|
if cipherText.u.Cmp(mod.Zero) == 0 || cipherText.v.Cmp(mod.Zero) == 0 {
|
||
|
return nil, internal.ErrZeroValue
|
||
|
}
|
||
|
for _, e := range cipherText.e {
|
||
|
if e.Cmp(mod.Zero) == 0 {
|
||
|
return nil, internal.ErrZeroValue
|
||
|
}
|
||
|
}
|
||
|
|
||
|
// Check if abs(v) == v
|
||
|
if cipherText.v.Cmp(dk.group.Abs(cipherText.v)) != 0 {
|
||
|
return nil, fmt.Errorf("absolute check failed")
|
||
|
}
|
||
|
|
||
|
// h(u, e, L)
|
||
|
hs, err := dk.group.Hash(cipherText.u, cipherText.e, domain)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
// h(u, e, L) * x3
|
||
|
hsX3 := new(big.Int).Mul(hs, dk.x3)
|
||
|
twoHsX3PlusX2 := new(big.Int).Add(hsX3, dk.x2)
|
||
|
// 2 * (h(u, e, L) * x3 + x2)
|
||
|
twoHsX3PlusX2.Lsh(twoHsX3PlusX2, 1)
|
||
|
|
||
|
uSqr := dk.group.Exp(cipherText.u, twoHsX3PlusX2)
|
||
|
vSqr := dk.group.Exp(cipherText.v, big.NewInt(2))
|
||
|
|
||
|
if uSqr.Cmp(vSqr) != 0 {
|
||
|
return nil, fmt.Errorf("u^2 != v^2")
|
||
|
}
|
||
|
|
||
|
msgs := make([]*big.Int, len(cipherText.e))
|
||
|
for i, ee := range cipherText.e {
|
||
|
// u^{x_1}
|
||
|
uX1 := dk.group.Exp(cipherText.u, dk.x1[i])
|
||
|
// 1/u^{x_1}
|
||
|
uX1Inv := dk.group.Inv(uX1)
|
||
|
// e/u^{x_1}
|
||
|
eUX1Inv := dk.group.Mul(ee, uX1Inv)
|
||
|
|
||
|
// m_hat = (e/u^{x_1})^2t
|
||
|
mHat := dk.group.Exp(eUX1Inv, dk.group.twoInvTwo)
|
||
|
test := new(big.Int).Mod(mHat, dk.group.n)
|
||
|
if test.Cmp(big.NewInt(1)) != 0 {
|
||
|
return nil, fmt.Errorf("decryption failed for message %d", i)
|
||
|
}
|
||
|
|
||
|
m := new(big.Int).Mod(mHat, dk.group.n2)
|
||
|
m.Sub(m, big.NewInt(1))
|
||
|
m.Div(m, dk.group.n)
|
||
|
msgs[i] = m
|
||
|
}
|
||
|
|
||
|
return msgs, nil
|
||
|
}
|