Add CL sigs variant (by Pointcheval-Sanders) and debugging code for ffi to py

This commit is contained in:
J. Ayo Akinyele 2019-06-08 14:22:20 -04:00
parent a9c3d7a833
commit bd8571e23f
7 changed files with 348 additions and 10 deletions

View File

@ -1,6 +1,6 @@
[package]
name = "bolt"
version = "0.2.0"
version = "0.3.0"
authors = ["J. Ayo Akinyele <ayo@yeletech.org>"]
description = "library for Blind Off-chain Lightweight Transactions (BOLT)"
keywords = ["zcash", "payment channels", "bolt"]

View File

@ -12,7 +12,6 @@ use debug_elem_in_hex;
use debug_g1_in_hex;
use debug_g2_in_hex;
use debug_gt_in_hex;
use concat_to_vector;
use bincode::SizeLimit::Infinite;
use bincode::rustc_serialize::encode;
use clsigs::{PublicParams, SignatureD, PublicKeyD, SecretKeyD, hash_g2_to_fr, hash_gt_to_fr};

View File

@ -9,7 +9,7 @@ use debug_elem_in_hex;
use debug_g1_in_hex;
use debug_g2_in_hex;
use debug_gt_in_hex;
use concat_to_vector;
use concat_g2_to_vector;
use bincode::SizeLimit::Infinite;
use bincode::rustc_serialize::encode;
use sodiumoxide::crypto::hash::sha512;
@ -238,13 +238,13 @@ impl SignatureD {
pub fn hash(&self, prefix: &str) -> Fr {
let mut output_buf: Vec<u8> = Vec::new();
output_buf.extend_from_slice(prefix.as_bytes());
concat_to_vector(&mut output_buf, &self.a);
concat_to_vector(&mut output_buf, &self.b);
concat_to_vector(&mut output_buf, &self.c);
concat_g2_to_vector(&mut output_buf, &self.a);
concat_g2_to_vector(&mut output_buf, &self.b);
concat_g2_to_vector(&mut output_buf, &self.c);
assert_eq!(self.A.len(), self.B.len());
for i in 0 .. self.A.len() {
concat_to_vector(&mut output_buf, &self.A[i]);
concat_to_vector(&mut output_buf, &self.B[i]);
concat_g2_to_vector(&mut output_buf, &self.A[i]);
concat_g2_to_vector(&mut output_buf, &self.B[i]);
}
// println!("DEBUG: signature len => {}", output_buf.len());

321
src/clsigs_ps.rs Normal file
View File

@ -0,0 +1,321 @@
// clsigs_ps.rs
// CL Sigs - Pointcheval Sanders ('06)
extern crate serde;
use std::fmt;
use std::str;
use rand::{thread_rng, Rng};
use bn::{Group, Fr, G1, G2, Gt, pairing};
use debug_elem_in_hex;
use debug_g1_in_hex;
use debug_g2_in_hex;
use debug_gt_in_hex;
use concat_g1_to_vector;
use bincode::SizeLimit::Infinite;
use bincode::rustc_serialize::encode;
use sodiumoxide::crypto::hash::sha512;
use sodiumoxide::randombytes;
use serialization_wrappers;
use serde_with;
use serde::{Serialize, Deserialize};
#[derive(Serialize, Deserialize)]
pub struct PublicParamsPS {
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_one")]
pub g1: G1,
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_two")]
pub g2: G2
}
//#[derive(Copy, Clone, Serialize, Deserialize)]
//pub struct PublicKey {
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_one")]
// X: G1,
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_one")]
// Y: G1
//}
//
//impl PublicKey {
// pub fn encode(&self) -> Vec<u8> {
// let mut output_buf = Vec::new();
// let x_vec: Vec<u8> = encode(&self.X, Infinite).unwrap();
// let y_vec: Vec<u8> = encode(&self.Y, Infinite).unwrap();
// output_buf.extend(x_vec);
// output_buf.extend(y_vec);
// return output_buf;
// }
//}
//
//
//impl fmt::Display for PublicKey {
// fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
// let x_vec: Vec<u8> = encode(&self.X, Infinite).unwrap();
// let y_vec: Vec<u8> = encode(&self.Y, Infinite).unwrap();
// let mut x_s = String::new();
// for x in x_vec.iter() {
// x_s = format!("{}{:x}", x_s, x);
// }
//
// let mut y_s = String::new();
// for y in y_vec.iter() {
// y_s = format!("{}{:x}", y_s, y);
// }
//
// write!(f, "PK : (X=0x{}, Y=0x{})", x_s, y_s)
// }
//}
//
//#[derive(Copy, Clone, Serialize)]
//pub struct SecretKey {
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_fr")]
// x: Fr,
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_fr")]
// y: Fr
//}
//
//impl SecretKey {
// pub fn encode(&self) -> Vec<u8> {
// let mut output_buf = Vec::new();
// let x_vec: Vec<u8> = encode(&self.x, Infinite).unwrap();
// let y_vec: Vec<u8> = encode(&self.y, Infinite).unwrap();
// output_buf.extend(x_vec);
// output_buf.extend(y_vec);
// return output_buf;
// }
//}
//
//#[derive(Clone, Serialize)]
//pub struct KeyPair {
// pub sk: SecretKey,
// pub pk: PublicKey
//}
//
//#[derive(Serialize)]
//pub struct Signature {
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable")]
// a: G2,
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable")]
// b: G2,
// #[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable")]
// c: G2
//}
// CL PS scheme - for a vector of messages
#[derive(Clone, Serialize, Deserialize)]
pub struct PublicKeyPS {
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_two")]
pub X: G2,
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable_vec", deserialize_with = "serialization_wrappers::deserialize_g_two_vec")]
pub Y: Vec<G2>,
}
impl PublicKeyPS {
pub fn encode(&self) -> Vec<u8> {
let mut output_buf = Vec::new();
let x_vec: Vec<u8> = encode(&self.X, Infinite).unwrap();
output_buf.extend(x_vec);
for i in 0 .. self.Y.len() {
let yi_vec: Vec<u8> = encode(&self.Y[i], Infinite).unwrap();
output_buf.extend(yi_vec);
}
return output_buf;
}
}
#[derive(Clone, Serialize, Deserialize)]
pub struct SecretKeyPS {
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_fr")]
pub x: Fr,
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable_vec", deserialize_with = "serialization_wrappers::deserialize_fr_vec")]
pub y: Vec<Fr>
}
#[derive(Clone, Serialize, Deserialize)]
pub struct KeyPairPS {
pub sk: SecretKeyPS,
pub pk: PublicKeyPS
}
#[derive(Clone, Serialize, Deserialize)]
pub struct SignaturePS {
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_one")]
pub h: G1,
#[serde(serialize_with = "serialization_wrappers::serialize_generic_encodable", deserialize_with = "serialization_wrappers::deserialize_g_one")]
pub H: G1
}
impl SignaturePS {
pub fn new(_h: G1, _H: G1) -> SignaturePS {
SignaturePS {
h: _h, H: _H
}
}
pub fn hash(&self, prefix: &str) -> Fr {
let mut output_buf: Vec<u8> = Vec::new();
output_buf.extend_from_slice(prefix.as_bytes());
concat_g1_to_vector(&mut output_buf, &self.h);
concat_g1_to_vector(&mut output_buf, &self.H);
// println!("DEBUG: signature len => {}", output_buf.len());
// let's hash the final output_buf
let sha2_digest = sha512::hash(output_buf.as_slice());
let mut hash_buf: [u8; 64] = [0; 64];
hash_buf.copy_from_slice(&sha2_digest[0..64]);
return Fr::interpret(&hash_buf);
}
}
// display CL signature (PS)
impl fmt::Display for SignaturePS {
fn fmt(&self, f: &mut fmt::Formatter) -> fmt::Result {
let a_vec: Vec<u8> = encode(&self.h, Infinite).unwrap();
let b_vec: Vec<u8> = encode(&self.H, Infinite).unwrap();
let mut a_s = String::new();
for x in a_vec.iter() {
a_s = format!("{}{:x}", a_s, x);
}
let mut b_s = String::new();
for y in b_vec.iter() {
b_s = format!("{}{:x}", b_s, y);
}
write!(f, "SignaturePS : (\nh = 0x{},\nH = 0x{}\n)", a_s, b_s)
}
}
/////
pub fn setup_ps() -> PublicParamsPS {
let rng = &mut thread_rng();
let g1 = G1::random(rng);
let g2 = G2::random(rng);
let mpk = PublicParamsPS { g1: g1, g2: g2 };
return mpk;
}
pub fn keygen_ps(mpk : &PublicParamsPS, l: usize) -> KeyPairPS {
let rng = &mut thread_rng();
let x = Fr::random(rng);
let X = mpk.g2 * x;
let mut y: Vec<Fr> = Vec::new();
let mut Y: Vec<G2> = Vec::new();
for i in 0 .. l {
let _y = Fr::random(rng);
let _Y = mpk.g2 * _y;
y.push(_y);
Y.push(_Y);
}
let sk = SecretKeyPS { x: x, y: y };
let pk = PublicKeyPS { X: X, Y: Y };
return KeyPairPS { sk: sk, pk: pk }
}
pub fn sign_ps(mpk: &PublicParamsPS, sk: &SecretKeyPS, m: &Vec<Fr>) -> SignaturePS {
assert!(m.len() <= sk.y.len()+1);
let l = m.len();
let rng = &mut thread_rng();
let h = G1::random(rng);
let mut s = Fr::from_str("0").unwrap();
for i in 0 .. sk.y.len() {
s = s + (sk.y[i] * m[i]);
}
let H = h * (sk.x + s);
let sig = SignaturePS { h: h, H: H };
println!("SigPS => {}", sig);
return sig;
}
pub fn verify_ps(mpk: &PublicParamsPS, pk: &PublicKeyPS, m: &Vec<Fr>, sig: &SignaturePS) -> bool {
let l = m.len();
// sig_1 != 1 and e(sig_1, X * \prod{i=1}^\ell Y_i * m_i) =?= e(sig_2, g)
let mut L = G2::zero();
for i in 0 .. l {
L = L + (pk.Y[i] * m[i]);
}
let lhs = pairing(sig.h, pk.X + L);
let rhs = pairing(sig.H, mpk.g2);
return sig.h != G1::one() && lhs == rhs;
}
//// NIZK protocol for proving knowledge of a signature
//pub fn hash_g2_to_fr(x: &G2) -> Fr {
// // TODO: change to serde (instead of rustc_serialize)
// let x_vec: Vec<u8> = encode(&x, Infinite).unwrap();
// let sha2_digest = sha512::hash(x_vec.as_slice());
//
// let mut hash_buf: [u8; 64] = [0; 64];
// hash_buf.copy_from_slice(&sha2_digest[0..64]);
// return Fr::interpret(&hash_buf);
//}
//
//pub fn hash_gt_to_fr(x: &Gt) -> Fr {
// // TODO: change to serde (instead of rustc_serialize)
// let x_vec: Vec<u8> = encode(&x, Infinite).unwrap();
// let sha2_digest = sha512::hash(x_vec.as_slice());
//
// let mut hash_buf: [u8; 64] = [0; 64];
// hash_buf.copy_from_slice(&sha2_digest[0..64]);
// return Fr::interpret(&hash_buf);
//}
#[cfg(test)]
mod tests {
use super::*;
use bn::{Fr, Group};
// #[test]
// fn scheme_ps_sign_and_verify_works() {
// // test ability to sign/verify a single message
// let rng = &mut thread_rng();
//
// let mpk = setup_ps();
// let keypair = keygen_ps(&mpk);
//
// let mut m1 = Fr::random(rng);
// let mut m2 = Fr::random(rng);
//
// let signature = sign_ps(&keypair.sk, m1);
//
// assert!(verify_ps(&mpk, &keypair.pk, m1, &signature) == true);
// assert!(verify_ps(&mpk, &keypair.pk, m2, &signature) == false);
// }
#[test]
fn scheme_ps_sign_and_verify_works() {
// test ability to sign/verify a vector of messages
let rng = &mut thread_rng();
let mpk = setup_ps();
let l = 5;
let keypair = keygen_ps(&mpk, l);
let mut m1 : Vec<Fr> = Vec::new();
let mut m2 : Vec<Fr> = Vec::new();
for i in 0 .. l {
m1.push(Fr::random(rng));
m2.push(Fr::random(rng));
}
let signature = sign_ps(&mpk, &keypair.sk, &m1);
assert!(verify_ps(&mpk, &keypair.pk, &m1, &signature) == true);
assert!(verify_ps(&mpk, &keypair.pk, &m2, &signature) == false);
}
}

View File

@ -158,7 +158,7 @@ pub fn commit(csp: &CSParams, x: &Vec<Fr>, r: Fr) -> Commitment {
//let r = R.unwrap_or(Fr::random(rng));
// c = g1^m1 * ... * gn^mn * h^r
//println!("(commit) index: 0");
let mut c = (csp.pub_bases[0] * r);
let mut c = csp.pub_bases[0] * r;
for i in 1 .. x.len() {
//println!("(commit) index: {}", i);
c = c + (csp.pub_bases[i] * x[i]);

View File

@ -8,6 +8,11 @@
//! [`bn module`](https://github.com/zcash-hackworks/bn).
//!
#![allow(non_snake_case)]
#![allow(non_camel_case_types)]
#![allow(unused_parens)]
#![allow(non_upper_case_globals)]
#![allow(unused_results)]
#![allow(missing_docs)]
#![feature(extern_prelude)]
#![cfg_attr(all(test, feature = "unstable"), feature(test))]
@ -52,6 +57,7 @@ pub mod prf;
pub mod sym;
pub mod ote;
pub mod clsigs;
pub mod clsigs_ps;
pub mod commit_scheme;
pub mod clproto;
pub mod serialization_wrappers;
@ -239,7 +245,12 @@ impl Message {
////////////////////////////////// Utilities //////////////////////////////////
pub fn concat_to_vector(output: &mut Vec<u8>, t: &G2) {
pub fn concat_g1_to_vector(output: &mut Vec<u8>, t: &G1) {
let t_vec: Vec<u8> = encode(t, Infinite).unwrap();
output.extend(t_vec);
}
pub fn concat_g2_to_vector(output: &mut Vec<u8>, t: &G2) {
let t_vec: Vec<u8> = encode(t, Infinite).unwrap();
output.extend(t_vec);
}
@ -1662,21 +1673,27 @@ pub mod ffishim {
cser.into_raw()
}
// TODO: ADD DEBUG TO SEE WHICH ARG FAILS TO PARSE
#[no_mangle]
pub extern fn ffishim_bidirectional_establish_merchant_phase2(serialized_pp: *mut c_char, serialized_channel: *mut c_char, serialized_merchant_data: *mut c_char, serialized_proof1: *mut c_char) -> *mut c_char {
// Deserialize the pp
let deserialized_pp: bidirectional::PublicParams = deserialize_object(serialized_pp);
println!("deserialized pp!");
// Deserialize the channel state
let mut deserialized_channel_state: bidirectional::ChannelState = deserialize_object(serialized_channel);
println!("deserialized channel state!");
// Deserialize the merchant data
let deserialized_merchant_data: bidirectional::InitMerchantData = deserialize_object(serialized_merchant_data);
println!("deserialized merchant data!");
// Deserialize the first proof
let deserialized_proof_1: clproto::ProofCV = deserialize_object(serialized_proof1);
println!("deserialized proof_1!");
let wallet_sig = bidirectional::establish_merchant_phase2(&deserialized_pp, &mut deserialized_channel_state, &deserialized_merchant_data, &deserialized_proof_1);
println!("got the wallet signature!");
let ser = ["{\'wallet_sig\':\'", serde_json::to_string(&wallet_sig).unwrap().as_str(), "\', \'state\':\'", serde_json::to_string(&deserialized_channel_state).unwrap().as_str() ,"\'}"].concat();
let cser = CString::new(ser).unwrap();
cser.into_raw()

View File

@ -227,6 +227,7 @@ cust_data, channel_state = libbolt.bidirectional_init_customer(pp, channel_state
merch_bases = libbolt.util_extract_pub_bases_from_keypair(merch_data)
proof1 = libbolt.bidirectional_establish_customer_phase1(pp, cust_data, merch_bases)
print("proof 1: ", proof1)
wallet_sig, channel_state = libbolt.bidirectional_establish_merchant_phase2(pp, channel_state, merch_data, proof1)