mirror of
https://github.com/arnaucube/phantom-zone.git
synced 2026-01-08 23:21:29 +01:00
clean
This commit is contained in:
File diff suppressed because it is too large
Load Diff
@@ -146,26 +146,25 @@ impl<El> BoolParameters<El> {
|
||||
}
|
||||
|
||||
#[derive(Clone, Copy, PartialEq)]
|
||||
struct DecompostionLogBase(pub(crate) usize);
|
||||
pub(crate) struct DecompostionLogBase(pub(crate) usize);
|
||||
impl AsRef<usize> for DecompostionLogBase {
|
||||
fn as_ref(&self) -> &usize {
|
||||
&self.0
|
||||
}
|
||||
}
|
||||
#[derive(Clone, Copy, PartialEq)]
|
||||
struct DecompositionCount(pub(crate) usize);
|
||||
pub(crate) struct DecompositionCount(pub(crate) usize);
|
||||
impl AsRef<usize> for DecompositionCount {
|
||||
fn as_ref(&self) -> &usize {
|
||||
&self.0
|
||||
}
|
||||
}
|
||||
|
||||
#[derive(Clone, Copy, PartialEq)]
|
||||
struct LweDimension(pub(crate) usize);
|
||||
pub(crate) struct LweDimension(pub(crate) usize);
|
||||
#[derive(Clone, Copy, PartialEq)]
|
||||
struct PolynomialSize(pub(crate) usize);
|
||||
pub(crate) struct PolynomialSize(pub(crate) usize);
|
||||
#[derive(Clone, Copy, PartialEq)]
|
||||
struct Modulus<T>(pub(crate) T);
|
||||
pub(crate) struct Modulus<T>(pub(crate) T);
|
||||
|
||||
pub(super) const SP_BOOL_PARAMS: BoolParameters<u64> = BoolParameters::<u64> {
|
||||
rlwe_q: Modulus(268369921u64),
|
||||
|
||||
@@ -13,6 +13,30 @@ fn gadget_vector<T: PrimInt>(logq: usize, logb: usize, d: usize) -> Vec<T> {
|
||||
.collect_vec()
|
||||
}
|
||||
|
||||
pub trait RlweDecomposer {
|
||||
type Element;
|
||||
type D: Decomposer<Element = Self::Element>;
|
||||
|
||||
/// Decomposer for RLWE Part A
|
||||
fn a(&self) -> &Self::D;
|
||||
/// Decomposer for RLWE Part B
|
||||
fn b(&self) -> &Self::D;
|
||||
}
|
||||
|
||||
impl<D> RlweDecomposer for (D, D)
|
||||
where
|
||||
D: Decomposer,
|
||||
{
|
||||
type D = D;
|
||||
type Element = D::Element;
|
||||
fn a(&self) -> &Self::D {
|
||||
&self.0
|
||||
}
|
||||
fn b(&self) -> &Self::D {
|
||||
&self.1
|
||||
}
|
||||
}
|
||||
|
||||
pub trait Decomposer {
|
||||
type Element;
|
||||
fn new(q: Self::Element, logb: usize, d: usize) -> Self;
|
||||
@@ -142,6 +166,44 @@ impl<T: PrimInt + WrappingSub + Debug + NumInfo> Decomposer for DefaultDecompose
|
||||
}
|
||||
}
|
||||
|
||||
// impl<T> Decomposer for dyn AsRef<DefaultDecomposer<T>>
|
||||
// where
|
||||
// DefaultDecomposer<T>: Decomposer<Element = T>,
|
||||
// {
|
||||
// type Element = T;
|
||||
|
||||
// fn new(q: Self::Element, logb: usize, d: usize) -> Self {
|
||||
// DefaultDecomposer::<T>::new(q, logb, d)
|
||||
// }
|
||||
|
||||
// fn decompose(&self, v: &Self::Element) -> Vec<Self::Element> {
|
||||
// todo!()
|
||||
// }
|
||||
|
||||
// fn decomposition_count(&self) -> usize {
|
||||
// todo!()
|
||||
// }
|
||||
// }
|
||||
|
||||
// impl<U: AsRef<DefaultDecomposer<T>>> Decomposer for U
|
||||
// where
|
||||
// DefaultDecomposer<T>: Decomposer,
|
||||
// {
|
||||
// type Element = T;
|
||||
|
||||
// fn new(q: Self::Element, logb: usize, d: usize) -> Self {
|
||||
// todo!()
|
||||
// }
|
||||
|
||||
// fn decompose(&self, v: &Self::Element) -> Vec<Self::Element> {
|
||||
// todo!()
|
||||
// }
|
||||
|
||||
// fn decomposition_count(&self) -> usize {
|
||||
// todo!()
|
||||
// }
|
||||
// }
|
||||
|
||||
fn round_value<T: PrimInt>(value: T, ignore_bits: usize) -> T {
|
||||
if ignore_bits == 0 {
|
||||
return value;
|
||||
|
||||
15
src/lib.rs
15
src/lib.rs
@@ -42,6 +42,9 @@ pub trait Matrix: AsRef<[Self::R]> {
|
||||
fn split_at_row(&self, idx: usize) -> (&[<Self as Matrix>::R], &[<Self as Matrix>::R]) {
|
||||
self.as_ref().split_at(idx)
|
||||
}
|
||||
|
||||
/// Does the matrix fit sub-matrix of dimension row x col
|
||||
fn fits(&self, row: usize, col: usize) -> bool;
|
||||
}
|
||||
|
||||
pub trait MatrixMut: Matrix + AsMut<[<Self as Matrix>::R]>
|
||||
@@ -96,6 +99,10 @@ impl<T> Matrix for Vec<Vec<T>> {
|
||||
fn dimension(&self) -> (usize, usize) {
|
||||
(self.len(), self[0].len())
|
||||
}
|
||||
|
||||
fn fits(&self, row: usize, col: usize) -> bool {
|
||||
self.len() >= row && self[0].len() >= col
|
||||
}
|
||||
}
|
||||
|
||||
impl<T> Matrix for &[Vec<T>] {
|
||||
@@ -105,6 +112,10 @@ impl<T> Matrix for &[Vec<T>] {
|
||||
fn dimension(&self) -> (usize, usize) {
|
||||
(self.len(), self[0].len())
|
||||
}
|
||||
|
||||
fn fits(&self, row: usize, col: usize) -> bool {
|
||||
self.len() >= row && self[0].len() >= col
|
||||
}
|
||||
}
|
||||
|
||||
impl<T> Matrix for &mut [Vec<T>] {
|
||||
@@ -114,6 +125,10 @@ impl<T> Matrix for &mut [Vec<T>] {
|
||||
fn dimension(&self) -> (usize, usize) {
|
||||
(self.len(), self[0].len())
|
||||
}
|
||||
|
||||
fn fits(&self, row: usize, col: usize) -> bool {
|
||||
self.len() >= row && self[0].len() >= col
|
||||
}
|
||||
}
|
||||
|
||||
impl<T> MatrixMut for Vec<Vec<T>> {}
|
||||
|
||||
@@ -111,7 +111,9 @@ pub(crate) fn lwe_key_switch<
|
||||
operator: &Op,
|
||||
decomposer: &D,
|
||||
) {
|
||||
assert!(lwe_ksk.dimension().0 == ((lwe_in.as_ref().len() - 1) * decomposer.decomposition_count()));
|
||||
assert!(
|
||||
lwe_ksk.dimension().0 == ((lwe_in.as_ref().len() - 1) * decomposer.decomposition_count())
|
||||
);
|
||||
assert!(lwe_out.as_ref().len() == lwe_ksk.dimension().1);
|
||||
|
||||
let lwe_in_a_decomposed = lwe_in
|
||||
|
||||
417
src/noise.rs
417
src/noise.rs
@@ -17,229 +17,244 @@ mod tests {
|
||||
Matrix, Row, Secret,
|
||||
};
|
||||
|
||||
// Test B part with limbd -1 when variance of m is 1
|
||||
#[test]
|
||||
fn trial() {
|
||||
let logq = 28;
|
||||
let ring_size = 1 << 10;
|
||||
let q = generate_prime(logq, (ring_size as u64) << 1, 1 << logq).unwrap();
|
||||
let logb = 7;
|
||||
let d0 = 3;
|
||||
let d1 = d0 - 1;
|
||||
// // Test B part with limbd -1 when variance of m is 1
|
||||
// #[test]
|
||||
// fn trial() {
|
||||
// let logq = 28;
|
||||
// let ring_size = 1 << 10;
|
||||
// let q = generate_prime(logq, (ring_size as u64) << 1, 1 <<
|
||||
// logq).unwrap(); let logb = 7;
|
||||
// let d0 = 3;
|
||||
// let d1 = d0 - 1;
|
||||
|
||||
let sk = RlweSecret::random((ring_size >> 1) as usize, ring_size as usize);
|
||||
// let sk = RlweSecret::random((ring_size >> 1) as usize, ring_size as
|
||||
// usize);
|
||||
|
||||
let mut rng = DefaultSecureRng::new();
|
||||
let decomposer = DefaultDecomposer::new(q, logb, d0);
|
||||
let gadget_vector = decomposer.gadget_vector();
|
||||
// let mut rng = DefaultSecureRng::new();
|
||||
// let decomposer = DefaultDecomposer::new(q, logb, d0);
|
||||
// let gadget_vector = decomposer.gadget_vector();
|
||||
|
||||
for i in 0..100 {
|
||||
// m should have norm 1
|
||||
let mut m0 = vec![0u64; ring_size as usize];
|
||||
m0[thread_rng().gen_range(0..ring_size)] = 1;
|
||||
// for i in 0..100 {
|
||||
// // m should have norm 1
|
||||
// let mut m0 = vec![0u64; ring_size as usize];
|
||||
// m0[thread_rng().gen_range(0..ring_size)] = 1;
|
||||
|
||||
let modq_op = ModularOpsU64::new(q);
|
||||
let nttq_op = NttBackendU64::new(q, ring_size);
|
||||
// let modq_op = ModularOpsU64::new(q);
|
||||
// let nttq_op = NttBackendU64::new(q, ring_size);
|
||||
|
||||
// Encrypt RGSW(m0)
|
||||
let mut rgsw_seed = [0u8; 32];
|
||||
rng.fill_bytes(&mut rgsw_seed);
|
||||
let mut seeded_rgsw =
|
||||
SeededRgswCiphertext::<Vec<Vec<u64>>, _>::empty(ring_size, d0, rgsw_seed, q);
|
||||
let mut p_rng = DefaultSecureRng::new_seeded(rgsw_seed);
|
||||
secret_key_encrypt_rgsw(
|
||||
&mut seeded_rgsw.data,
|
||||
&m0,
|
||||
&gadget_vector,
|
||||
sk.values(),
|
||||
&modq_op,
|
||||
&nttq_op,
|
||||
&mut p_rng,
|
||||
&mut rng,
|
||||
);
|
||||
// // Encrypt RGSW(m0)
|
||||
// let mut rgsw_seed = [0u8; 32];
|
||||
// rng.fill_bytes(&mut rgsw_seed);
|
||||
// let mut seeded_rgsw =
|
||||
// SeededRgswCiphertext::<Vec<Vec<u64>>, _>::empty(ring_size,
|
||||
// d0, rgsw_seed, q); let mut p_rng =
|
||||
// DefaultSecureRng::new_seeded(rgsw_seed);
|
||||
// secret_key_encrypt_rgsw(
|
||||
// &mut seeded_rgsw.data,
|
||||
// &m0,
|
||||
// &gadget_vector,
|
||||
// &gadget_vector,
|
||||
// sk.values(),
|
||||
// &modq_op,
|
||||
// &nttq_op,
|
||||
// &mut p_rng,
|
||||
// &mut rng,
|
||||
// );
|
||||
|
||||
// Encrypt RLWE(m1)
|
||||
let mut m1 = vec![0u64; ring_size];
|
||||
RandomUniformDist::random_fill(&mut rng, &q, m1.as_mut_slice());
|
||||
let mut rlwe_seed = [0u8; 32];
|
||||
rng.fill_bytes(&mut rlwe_seed);
|
||||
let mut seeded_rlwe: SeededRlweCiphertext<Vec<u64>, [u8; 32]> =
|
||||
SeededRlweCiphertext::<Vec<u64>, _>::empty(ring_size, rlwe_seed, q);
|
||||
let mut p_rng = DefaultSecureRng::new_seeded(rlwe_seed);
|
||||
secret_key_encrypt_rlwe(
|
||||
&m1,
|
||||
&mut seeded_rlwe.data,
|
||||
sk.values(),
|
||||
&modq_op,
|
||||
&nttq_op,
|
||||
&mut p_rng,
|
||||
&mut rng,
|
||||
);
|
||||
// // Encrypt RLWE(m1)
|
||||
// let mut m1 = vec![0u64; ring_size];
|
||||
// RandomUniformDist::random_fill(&mut rng, &q, m1.as_mut_slice());
|
||||
// let mut rlwe_seed = [0u8; 32];
|
||||
// rng.fill_bytes(&mut rlwe_seed);
|
||||
// let mut seeded_rlwe: SeededRlweCiphertext<Vec<u64>, [u8; 32]> =
|
||||
// SeededRlweCiphertext::<Vec<u64>, _>::empty(ring_size,
|
||||
// rlwe_seed, q); let mut p_rng =
|
||||
// DefaultSecureRng::new_seeded(rlwe_seed);
|
||||
// secret_key_encrypt_rlwe(
|
||||
// &m1,
|
||||
// &mut seeded_rlwe.data,
|
||||
// sk.values(),
|
||||
// &modq_op,
|
||||
// &nttq_op,
|
||||
// &mut p_rng,
|
||||
// &mut rng,
|
||||
// );
|
||||
|
||||
let mut rlwe = RlweCiphertext::<Vec<Vec<u64>>, DefaultSecureRng>::from(&seeded_rlwe);
|
||||
let rgsw = RgswCiphertextEvaluationDomain::<_, DefaultSecureRng, NttBackendU64>::from(
|
||||
&seeded_rgsw,
|
||||
);
|
||||
// let mut rlwe = RlweCiphertext::<Vec<Vec<u64>>,
|
||||
// DefaultSecureRng>::from(&seeded_rlwe); let rgsw =
|
||||
// RgswCiphertextEvaluationDomain::<_, DefaultSecureRng,
|
||||
// NttBackendU64>::from( &seeded_rgsw,
|
||||
// );
|
||||
|
||||
// RLWE(m0m1) = RLWE(m1) x RGSW(m0)
|
||||
let mut scratch = vec![vec![0u64; ring_size]; d0 + 2];
|
||||
less1_rlwe_by_rgsw(
|
||||
&mut rlwe,
|
||||
&rgsw.data,
|
||||
&mut scratch,
|
||||
&decomposer,
|
||||
&nttq_op,
|
||||
&modq_op,
|
||||
0,
|
||||
1,
|
||||
);
|
||||
// rlwe_by_rgsw(
|
||||
// // RLWE(m0m1) = RLWE(m1) x RGSW(m0)
|
||||
// let mut scratch = vec![vec![0u64; ring_size]; d0 + 2];
|
||||
// less1_rlwe_by_rgsw(
|
||||
// &mut rlwe,
|
||||
// &rgsw.data,
|
||||
// &mut scratch,
|
||||
// &decomposer,
|
||||
// &nttq_op,
|
||||
// &modq_op,
|
||||
// 0,
|
||||
// 1,
|
||||
// );
|
||||
// // rlwe_by_rgsw(
|
||||
// // &mut rlwe,
|
||||
// // &rgsw.data,
|
||||
// // &mut scratch,
|
||||
// // &decomposer,
|
||||
// // &nttq_op,
|
||||
// // &modq_op,
|
||||
// // );
|
||||
|
||||
// // measure noise
|
||||
// let mul_mod = |v0: &u64, v1: &u64| ((*v0 as u128 * *v1 as u128) %
|
||||
// q as u128) as u64; let m0m1 = negacyclic_mul(&m0, &m1,
|
||||
// mul_mod, q); let noise = measure_noise(&rlwe, &m0m1,
|
||||
// &nttq_op, &modq_op, sk.values()); println!("Noise: {noise}");
|
||||
// }
|
||||
// }
|
||||
|
||||
// // Test B part with limbd -1 when variance of m is 1
|
||||
// #[test]
|
||||
// fn rgsw_saver() {
|
||||
// let logq = 60;
|
||||
// let ring_size = 1 << 11;
|
||||
// let q = generate_prime(logq, (ring_size as u64) << 1, 1 <<
|
||||
// logq).unwrap(); let logb = 12;
|
||||
// let d0 = 4;
|
||||
|
||||
// let sk = RlweSecret::random((ring_size >> 1) as usize, ring_size as
|
||||
// usize);
|
||||
|
||||
// let mut rng = DefaultSecureRng::new();
|
||||
|
||||
// let decomposer = DefaultDecomposer::new(q, logb, d0);
|
||||
// let gadget_vector = decomposer.gadget_vector();
|
||||
|
||||
// for i in 0..100 {
|
||||
// let modq_op = ModularOpsU64::new(q);
|
||||
// let nttq_op = NttBackendU64::new(q, ring_size);
|
||||
|
||||
// // Encrypt RGSW(m0)
|
||||
// let mut m0 = vec![0u64; ring_size as usize];
|
||||
// m0[thread_rng().gen_range(0..ring_size)] = 1;
|
||||
// let mut rgsw_seed = [0u8; 32];
|
||||
// rng.fill_bytes(&mut rgsw_seed);
|
||||
// let mut seeded_rgsw0 =
|
||||
// SeededRgswCiphertext::<Vec<Vec<u64>>, _>::empty(ring_size,
|
||||
// d0, rgsw_seed, q); let mut p_rng =
|
||||
// DefaultSecureRng::new_seeded(rgsw_seed);
|
||||
// secret_key_encrypt_rgsw(
|
||||
// &mut seeded_rgsw0.data,
|
||||
// &m0,
|
||||
// &gadget_vector,
|
||||
// &gadget_vector,
|
||||
// sk.values(),
|
||||
// &modq_op,
|
||||
// &nttq_op,
|
||||
// &mut p_rng,
|
||||
// &mut rng,
|
||||
// );
|
||||
|
||||
// measure noise
|
||||
let mul_mod = |v0: &u64, v1: &u64| ((*v0 as u128 * *v1 as u128) % q as u128) as u64;
|
||||
let m0m1 = negacyclic_mul(&m0, &m1, mul_mod, q);
|
||||
let noise = measure_noise(&rlwe, &m0m1, &nttq_op, &modq_op, sk.values());
|
||||
println!("Noise: {noise}");
|
||||
}
|
||||
}
|
||||
// // Encrypt RGSW(m1)
|
||||
// let mut m1 = vec![0u64; ring_size as usize];
|
||||
// m1[thread_rng().gen_range(0..ring_size)] = 1;
|
||||
// let mut rgsw_seed = [0u8; 32];
|
||||
// rng.fill_bytes(&mut rgsw_seed);
|
||||
// let mut seeded_rgsw1 =
|
||||
// SeededRgswCiphertext::<Vec<Vec<u64>>, _>::empty(ring_size,
|
||||
// d0, rgsw_seed, q); let mut p_rng =
|
||||
// DefaultSecureRng::new_seeded(rgsw_seed);
|
||||
// secret_key_encrypt_rgsw(
|
||||
// &mut seeded_rgsw1.data,
|
||||
// &m1,
|
||||
// &gadget_vector,
|
||||
// &gadget_vector,
|
||||
// sk.values(),
|
||||
// &modq_op,
|
||||
// &nttq_op,
|
||||
// &mut p_rng,
|
||||
// &mut rng,
|
||||
// );
|
||||
|
||||
// Test B part with limbd -1 when variance of m is 1
|
||||
#[test]
|
||||
fn rgsw_saver() {
|
||||
let logq = 60;
|
||||
let ring_size = 1 << 11;
|
||||
let q = generate_prime(logq, (ring_size as u64) << 1, 1 << logq).unwrap();
|
||||
let logb = 12;
|
||||
let d0 = 4;
|
||||
// // TODO(Jay): Why cant you create RgswCIphertext from
|
||||
// SeededRgswCiphertext? let mut rgsw0 = {
|
||||
// let mut evl_tmp =
|
||||
// RgswCiphertextEvaluationDomain::<_, DefaultSecureRng,
|
||||
// NttBackendU64>::from( &seeded_rgsw0,
|
||||
// );
|
||||
// evl_tmp
|
||||
// .data
|
||||
// .iter_mut()
|
||||
// .for_each(|ri| nttq_op.backward(ri.as_mut()));
|
||||
// evl_tmp.data
|
||||
// };
|
||||
// let rgsw1 = RgswCiphertextEvaluationDomain::<_, DefaultSecureRng,
|
||||
// NttBackendU64>::from( &seeded_rgsw1,
|
||||
// );
|
||||
// let mut scratch_matrix_d_plus_rgsw_by_ring = vec![vec![0u64;
|
||||
// ring_size]; d0 + (d0 * 4)];
|
||||
|
||||
let sk = RlweSecret::random((ring_size >> 1) as usize, ring_size as usize);
|
||||
// // RGSW(m0m1) = RGSW(m0)xRGSW(m1)
|
||||
// rgsw_by_rgsw_inplace(
|
||||
// &mut rgsw0,
|
||||
// &rgsw1.data,
|
||||
// &decomposer,
|
||||
// &decomposer,
|
||||
// &mut scratch_matrix_d_plus_rgsw_by_ring,
|
||||
// &nttq_op,
|
||||
// &modq_op,
|
||||
// );
|
||||
|
||||
let mut rng = DefaultSecureRng::new();
|
||||
// // send RGSW(m0m1) to Evaluation domain
|
||||
// let mut rgsw01 = rgsw0;
|
||||
// rgsw01
|
||||
// .iter_mut()
|
||||
// .for_each(|v| nttq_op.forward(v.as_mut_slice()));
|
||||
|
||||
let decomposer = DefaultDecomposer::new(q, logb, d0);
|
||||
let gadget_vector = decomposer.gadget_vector();
|
||||
// // RLWE(m2)
|
||||
// let mut m2 = vec![0u64; ring_size as usize];
|
||||
// RandomUniformDist::random_fill(&mut rng, &q, m2.as_mut_slice());
|
||||
// let mut rlwe_seed = [0u8; 32];
|
||||
// rng.fill_bytes(&mut rlwe_seed);
|
||||
// let mut seeded_rlwe =
|
||||
// SeededRlweCiphertext::<Vec<u64>, _>::empty(ring_size,
|
||||
// rlwe_seed, q); let mut p_rng =
|
||||
// DefaultSecureRng::new_seeded(rlwe_seed);
|
||||
// secret_key_encrypt_rlwe(
|
||||
// &m2,
|
||||
// &mut seeded_rlwe.data,
|
||||
// sk.values(),
|
||||
// &modq_op,
|
||||
// &nttq_op,
|
||||
// &mut p_rng,
|
||||
// &mut rng,
|
||||
// );
|
||||
|
||||
for i in 0..100 {
|
||||
let modq_op = ModularOpsU64::new(q);
|
||||
let nttq_op = NttBackendU64::new(q, ring_size);
|
||||
// let mut rlwe = RlweCiphertext::<Vec<Vec<u64>>,
|
||||
// DefaultSecureRng>::from(&seeded_rlwe);
|
||||
|
||||
// Encrypt RGSW(m0)
|
||||
let mut m0 = vec![0u64; ring_size as usize];
|
||||
m0[thread_rng().gen_range(0..ring_size)] = 1;
|
||||
let mut rgsw_seed = [0u8; 32];
|
||||
rng.fill_bytes(&mut rgsw_seed);
|
||||
let mut seeded_rgsw0 =
|
||||
SeededRgswCiphertext::<Vec<Vec<u64>>, _>::empty(ring_size, d0, rgsw_seed, q);
|
||||
let mut p_rng = DefaultSecureRng::new_seeded(rgsw_seed);
|
||||
secret_key_encrypt_rgsw(
|
||||
&mut seeded_rgsw0.data,
|
||||
&m0,
|
||||
&gadget_vector,
|
||||
sk.values(),
|
||||
&modq_op,
|
||||
&nttq_op,
|
||||
&mut p_rng,
|
||||
&mut rng,
|
||||
);
|
||||
// // RLWE(m0m1m2) = RLWE(m2) x RGSW(m0m1)
|
||||
// let mut scratch_matrix_dplus2_ring = vec![vec![0u64; ring_size];
|
||||
// d0 + 2]; less1_rlwe_by_rgsw(
|
||||
// &mut rlwe,
|
||||
// &rgsw01,
|
||||
// &mut scratch_matrix_dplus2_ring,
|
||||
// &decomposer,
|
||||
// &nttq_op,
|
||||
// &modq_op,
|
||||
// 1,
|
||||
// 2,
|
||||
// );
|
||||
|
||||
// Encrypt RGSW(m1)
|
||||
let mut m1 = vec![0u64; ring_size as usize];
|
||||
m1[thread_rng().gen_range(0..ring_size)] = 1;
|
||||
let mut rgsw_seed = [0u8; 32];
|
||||
rng.fill_bytes(&mut rgsw_seed);
|
||||
let mut seeded_rgsw1 =
|
||||
SeededRgswCiphertext::<Vec<Vec<u64>>, _>::empty(ring_size, d0, rgsw_seed, q);
|
||||
let mut p_rng = DefaultSecureRng::new_seeded(rgsw_seed);
|
||||
secret_key_encrypt_rgsw(
|
||||
&mut seeded_rgsw1.data,
|
||||
&m1,
|
||||
&gadget_vector,
|
||||
sk.values(),
|
||||
&modq_op,
|
||||
&nttq_op,
|
||||
&mut p_rng,
|
||||
&mut rng,
|
||||
);
|
||||
// let mul_mod = |v0: &u64, v1: &u64| ((*v0 as u128 * *v1 as u128) %
|
||||
// q as u128) as u64; let m0m1 = negacyclic_mul(&m0, &m1,
|
||||
// mul_mod, q); let m0m1m2 = negacyclic_mul(&m2, &m0m1, mul_mod,
|
||||
// q); let noise = measure_noise(&rlwe.data, &m0m1m2, &nttq_op,
|
||||
// &modq_op, sk.values());
|
||||
|
||||
// TODO(Jay): Why cant you create RgswCIphertext from SeededRgswCiphertext?
|
||||
let mut rgsw0 = {
|
||||
let mut evl_tmp =
|
||||
RgswCiphertextEvaluationDomain::<_, DefaultSecureRng, NttBackendU64>::from(
|
||||
&seeded_rgsw0,
|
||||
);
|
||||
evl_tmp
|
||||
.data
|
||||
.iter_mut()
|
||||
.for_each(|ri| nttq_op.backward(ri.as_mut()));
|
||||
evl_tmp.data
|
||||
};
|
||||
let rgsw1 = RgswCiphertextEvaluationDomain::<_, DefaultSecureRng, NttBackendU64>::from(
|
||||
&seeded_rgsw1,
|
||||
);
|
||||
let mut scratch_matrix_d_plus_rgsw_by_ring = vec![vec![0u64; ring_size]; d0 + (d0 * 4)];
|
||||
|
||||
// RGSW(m0m1) = RGSW(m0)xRGSW(m1)
|
||||
rgsw_by_rgsw_inplace(
|
||||
&mut rgsw0,
|
||||
&rgsw1.data,
|
||||
&decomposer,
|
||||
&mut scratch_matrix_d_plus_rgsw_by_ring,
|
||||
&nttq_op,
|
||||
&modq_op,
|
||||
);
|
||||
|
||||
// send RGSW(m0m1) to Evaluation domain
|
||||
let mut rgsw01 = rgsw0;
|
||||
rgsw01
|
||||
.iter_mut()
|
||||
.for_each(|v| nttq_op.forward(v.as_mut_slice()));
|
||||
|
||||
// RLWE(m2)
|
||||
let mut m2 = vec![0u64; ring_size as usize];
|
||||
RandomUniformDist::random_fill(&mut rng, &q, m2.as_mut_slice());
|
||||
let mut rlwe_seed = [0u8; 32];
|
||||
rng.fill_bytes(&mut rlwe_seed);
|
||||
let mut seeded_rlwe =
|
||||
SeededRlweCiphertext::<Vec<u64>, _>::empty(ring_size, rlwe_seed, q);
|
||||
let mut p_rng = DefaultSecureRng::new_seeded(rlwe_seed);
|
||||
secret_key_encrypt_rlwe(
|
||||
&m2,
|
||||
&mut seeded_rlwe.data,
|
||||
sk.values(),
|
||||
&modq_op,
|
||||
&nttq_op,
|
||||
&mut p_rng,
|
||||
&mut rng,
|
||||
);
|
||||
|
||||
let mut rlwe = RlweCiphertext::<Vec<Vec<u64>>, DefaultSecureRng>::from(&seeded_rlwe);
|
||||
|
||||
// RLWE(m0m1m2) = RLWE(m2) x RGSW(m0m1)
|
||||
let mut scratch_matrix_dplus2_ring = vec![vec![0u64; ring_size]; d0 + 2];
|
||||
less1_rlwe_by_rgsw(
|
||||
&mut rlwe,
|
||||
&rgsw01,
|
||||
&mut scratch_matrix_dplus2_ring,
|
||||
&decomposer,
|
||||
&nttq_op,
|
||||
&modq_op,
|
||||
1,
|
||||
2,
|
||||
);
|
||||
|
||||
let mul_mod = |v0: &u64, v1: &u64| ((*v0 as u128 * *v1 as u128) % q as u128) as u64;
|
||||
let m0m1 = negacyclic_mul(&m0, &m1, mul_mod, q);
|
||||
let m0m1m2 = negacyclic_mul(&m2, &m0m1, mul_mod, q);
|
||||
let noise = measure_noise(&rlwe.data, &m0m1m2, &nttq_op, &modq_op, sk.values());
|
||||
|
||||
println!("Noise: {noise}");
|
||||
}
|
||||
}
|
||||
// println!("Noise: {noise}");
|
||||
// }
|
||||
// }
|
||||
}
|
||||
|
||||
988
src/rgsw.rs
988
src/rgsw.rs
File diff suppressed because it is too large
Load Diff
Reference in New Issue
Block a user