mirror of
https://github.com/arnaucube/poulpy.git
synced 2026-02-10 05:06:44 +01:00
Re-organized code for glwe testing
This commit is contained in:
@@ -29,3 +29,6 @@ pub use public_key::*;
|
|||||||
pub use secret::*;
|
pub use secret::*;
|
||||||
#[allow(unused_imports)]
|
#[allow(unused_imports)]
|
||||||
pub use trace::*;
|
pub use trace::*;
|
||||||
|
|
||||||
|
#[cfg(test)]
|
||||||
|
mod test_fft64;
|
||||||
|
|||||||
1
core/src/glwe/test_fft64/automorphism.rs
Normal file
1
core/src/glwe/test_fft64/automorphism.rs
Normal file
@@ -0,0 +1 @@
|
|||||||
|
|
||||||
180
core/src/glwe/test_fft64/encryption.rs
Normal file
180
core/src/glwe/test_fft64/encryption.rs
Normal file
@@ -0,0 +1,180 @@
|
|||||||
|
use backend::{Decoding, Encoding, FFT64, Module, ScratchOwned, Stats, VecZnxOps, ZnxZero};
|
||||||
|
use itertools::izip;
|
||||||
|
use sampling::source::Source;
|
||||||
|
|
||||||
|
use crate::{FourierGLWECiphertext, GLWECiphertext, GLWEPlaintext, GLWEPublicKey, GLWESecret, Infos};
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn encrypt_sk() {
|
||||||
|
let log_n: usize = 8;
|
||||||
|
(1..4).for_each(|rank| {
|
||||||
|
println!("test encrypt_sk rank: {}", rank);
|
||||||
|
test_encrypt_sk(log_n, 8, 54, 30, 3.2, rank);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn encrypt_zero_sk() {
|
||||||
|
let log_n: usize = 8;
|
||||||
|
(1..4).for_each(|rank| {
|
||||||
|
println!("test encrypt_zero_sk rank: {}", rank);
|
||||||
|
test_encrypt_zero_sk(log_n, 8, 64, 3.2, rank);
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
#[test]
|
||||||
|
fn encrypt_pk() {
|
||||||
|
let log_n: usize = 8;
|
||||||
|
(1..4).for_each(|rank| {
|
||||||
|
println!("test encrypt_pk rank: {}", rank);
|
||||||
|
test_encrypt_pk(log_n, 8, 64, 64, 3.2, rank)
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
fn test_encrypt_sk(log_n: usize, basek: usize, k_ct: usize, k_pt: usize, sigma: f64, rank: usize) {
|
||||||
|
let module: Module<FFT64> = Module::<FFT64>::new(1 << log_n);
|
||||||
|
|
||||||
|
let mut ct: GLWECiphertext<Vec<u8>> = GLWECiphertext::alloc(&module, basek, k_ct, rank);
|
||||||
|
let mut pt: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc(&module, basek, k_pt);
|
||||||
|
|
||||||
|
let mut source_xs: Source = Source::new([0u8; 32]);
|
||||||
|
let mut source_xe: Source = Source::new([0u8; 32]);
|
||||||
|
let mut source_xa: Source = Source::new([0u8; 32]);
|
||||||
|
|
||||||
|
let mut scratch: ScratchOwned = ScratchOwned::new(
|
||||||
|
GLWECiphertext::encrypt_sk_scratch_space(&module, basek, ct.k())
|
||||||
|
| GLWECiphertext::decrypt_scratch_space(&module, basek, ct.k()),
|
||||||
|
);
|
||||||
|
|
||||||
|
let mut sk: GLWESecret<Vec<u8>, FFT64> = GLWESecret::alloc(&module, rank);
|
||||||
|
sk.fill_ternary_prob(&module, 0.5, &mut source_xs);
|
||||||
|
|
||||||
|
let mut data_want: Vec<i64> = vec![0i64; module.n()];
|
||||||
|
|
||||||
|
data_want
|
||||||
|
.iter_mut()
|
||||||
|
.for_each(|x| *x = source_xa.next_i64() & 0xFF);
|
||||||
|
|
||||||
|
pt.data.encode_vec_i64(0, basek, k_pt, &data_want, 10);
|
||||||
|
|
||||||
|
ct.encrypt_sk(
|
||||||
|
&module,
|
||||||
|
&pt,
|
||||||
|
&sk,
|
||||||
|
&mut source_xa,
|
||||||
|
&mut source_xe,
|
||||||
|
sigma,
|
||||||
|
scratch.borrow(),
|
||||||
|
);
|
||||||
|
|
||||||
|
pt.data.zero();
|
||||||
|
|
||||||
|
ct.decrypt(&module, &mut pt, &sk, scratch.borrow());
|
||||||
|
|
||||||
|
let mut data_have: Vec<i64> = vec![0i64; module.n()];
|
||||||
|
|
||||||
|
pt.data
|
||||||
|
.decode_vec_i64(0, basek, pt.size() * basek, &mut data_have);
|
||||||
|
|
||||||
|
// TODO: properly assert the decryption noise through std(dec(ct) - pt)
|
||||||
|
let scale: f64 = (1 << (pt.size() * basek - k_pt)) as f64;
|
||||||
|
izip!(data_want.iter(), data_have.iter()).for_each(|(a, b)| {
|
||||||
|
let b_scaled = (*b as f64) / scale;
|
||||||
|
assert!(
|
||||||
|
(*a as f64 - b_scaled).abs() < 0.1,
|
||||||
|
"{} {}",
|
||||||
|
*a as f64,
|
||||||
|
b_scaled
|
||||||
|
)
|
||||||
|
});
|
||||||
|
}
|
||||||
|
|
||||||
|
fn test_encrypt_zero_sk(log_n: usize, basek: usize, k_ct: usize, sigma: f64, rank: usize) {
|
||||||
|
let module: Module<FFT64> = Module::<FFT64>::new(1 << log_n);
|
||||||
|
|
||||||
|
let mut pt: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc(&module, basek, k_ct);
|
||||||
|
|
||||||
|
let mut source_xs: Source = Source::new([0u8; 32]);
|
||||||
|
let mut source_xe: Source = Source::new([1u8; 32]);
|
||||||
|
let mut source_xa: Source = Source::new([0u8; 32]);
|
||||||
|
|
||||||
|
let mut sk: GLWESecret<Vec<u8>, FFT64> = GLWESecret::alloc(&module, rank);
|
||||||
|
sk.fill_ternary_prob(&module, 0.5, &mut source_xs);
|
||||||
|
|
||||||
|
let mut ct_dft: FourierGLWECiphertext<Vec<u8>, FFT64> = FourierGLWECiphertext::alloc(&module, basek, k_ct, rank);
|
||||||
|
|
||||||
|
let mut scratch: ScratchOwned = ScratchOwned::new(
|
||||||
|
FourierGLWECiphertext::decrypt_scratch_space(&module, basek, k_ct)
|
||||||
|
| FourierGLWECiphertext::encrypt_sk_scratch_space(&module, basek, k_ct, rank),
|
||||||
|
);
|
||||||
|
|
||||||
|
ct_dft.encrypt_zero_sk(
|
||||||
|
&module,
|
||||||
|
&sk,
|
||||||
|
&mut source_xa,
|
||||||
|
&mut source_xe,
|
||||||
|
sigma,
|
||||||
|
scratch.borrow(),
|
||||||
|
);
|
||||||
|
ct_dft.decrypt(&module, &mut pt, &sk, scratch.borrow());
|
||||||
|
|
||||||
|
assert!((sigma - pt.data.std(0, basek) * (k_ct as f64).exp2()) <= 0.2);
|
||||||
|
}
|
||||||
|
|
||||||
|
fn test_encrypt_pk(log_n: usize, basek: usize, k_ct: usize, k_pk: usize, sigma: f64, rank: usize) {
|
||||||
|
let module: Module<FFT64> = Module::<FFT64>::new(1 << log_n);
|
||||||
|
|
||||||
|
let mut ct: GLWECiphertext<Vec<u8>> = GLWECiphertext::alloc(&module, basek, k_ct, rank);
|
||||||
|
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc(&module, basek, k_ct);
|
||||||
|
|
||||||
|
let mut source_xs: Source = Source::new([0u8; 32]);
|
||||||
|
let mut source_xe: Source = Source::new([0u8; 32]);
|
||||||
|
let mut source_xa: Source = Source::new([0u8; 32]);
|
||||||
|
let mut source_xu: Source = Source::new([0u8; 32]);
|
||||||
|
|
||||||
|
let mut sk: GLWESecret<Vec<u8>, FFT64> = GLWESecret::alloc(&module, rank);
|
||||||
|
sk.fill_ternary_prob(&module, 0.5, &mut source_xs);
|
||||||
|
|
||||||
|
let mut pk: GLWEPublicKey<Vec<u8>, FFT64> = GLWEPublicKey::alloc(&module, basek, k_pk, rank);
|
||||||
|
pk.generate_from_sk(&module, &sk, &mut source_xa, &mut source_xe, sigma);
|
||||||
|
|
||||||
|
let mut scratch: ScratchOwned = ScratchOwned::new(
|
||||||
|
GLWECiphertext::encrypt_sk_scratch_space(&module, basek, ct.k())
|
||||||
|
| GLWECiphertext::decrypt_scratch_space(&module, basek, ct.k())
|
||||||
|
| GLWECiphertext::encrypt_pk_scratch_space(&module, basek, pk.k()),
|
||||||
|
);
|
||||||
|
|
||||||
|
let mut data_want: Vec<i64> = vec![0i64; module.n()];
|
||||||
|
|
||||||
|
data_want
|
||||||
|
.iter_mut()
|
||||||
|
.for_each(|x| *x = source_xa.next_i64() & 0);
|
||||||
|
|
||||||
|
pt_want.data.encode_vec_i64(0, basek, k_ct, &data_want, 10);
|
||||||
|
|
||||||
|
ct.encrypt_pk(
|
||||||
|
&module,
|
||||||
|
&pt_want,
|
||||||
|
&pk,
|
||||||
|
&mut source_xu,
|
||||||
|
&mut source_xe,
|
||||||
|
sigma,
|
||||||
|
scratch.borrow(),
|
||||||
|
);
|
||||||
|
|
||||||
|
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc(&module, basek, k_ct);
|
||||||
|
|
||||||
|
ct.decrypt(&module, &mut pt_have, &sk, scratch.borrow());
|
||||||
|
|
||||||
|
module.vec_znx_sub_ab_inplace(&mut pt_want.data, 0, &pt_have.data, 0);
|
||||||
|
|
||||||
|
let noise_have: f64 = pt_want.data.std(0, basek).log2();
|
||||||
|
let noise_want: f64 = ((((rank as f64) + 1.0) * module.n() as f64 * 0.5 * sigma * sigma).sqrt()).log2() - (k_ct as f64);
|
||||||
|
|
||||||
|
assert!(
|
||||||
|
(noise_have - noise_want).abs() < 0.2,
|
||||||
|
"{} {}",
|
||||||
|
noise_have,
|
||||||
|
noise_want
|
||||||
|
);
|
||||||
|
}
|
||||||
1
core/src/glwe/test_fft64/keyswitch.rs
Normal file
1
core/src/glwe/test_fft64/keyswitch.rs
Normal file
@@ -0,0 +1 @@
|
|||||||
|
|
||||||
6
core/src/glwe/test_fft64/mod.rs
Normal file
6
core/src/glwe/test_fft64/mod.rs
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
pub mod automorphism;
|
||||||
|
pub mod encryption;
|
||||||
|
pub mod external_product;
|
||||||
|
pub mod keyswitch;
|
||||||
|
pub mod packing;
|
||||||
|
pub mod trace;
|
||||||
@@ -1,11 +1,8 @@
|
|||||||
mod automorphism_key;
|
mod automorphism_key;
|
||||||
mod gglwe;
|
mod gglwe;
|
||||||
mod ggsw;
|
mod ggsw;
|
||||||
mod glwe;
|
|
||||||
mod glwe_fourier;
|
mod glwe_fourier;
|
||||||
mod glwe_packing;
|
|
||||||
mod tensor_key;
|
mod tensor_key;
|
||||||
mod trace;
|
|
||||||
|
|
||||||
pub(crate) fn var_noise_gglwe_product(
|
pub(crate) fn var_noise_gglwe_product(
|
||||||
n: f64,
|
n: f64,
|
||||||
|
|||||||
Reference in New Issue
Block a user