mirror of
https://github.com/arnaucube/poulpy.git
synced 2026-02-10 05:06:44 +01:00
glwe encryption + reenable associated tests
This commit is contained in:
@@ -3,20 +3,20 @@ pub mod test_suite;
|
|||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
mod serialization;
|
mod serialization;
|
||||||
|
|
||||||
//#[allow(unused_imports)]
|
#[allow(unused_imports)]
|
||||||
// use poulpy_hal::backend_test_suite;
|
use poulpy_hal::backend_test_suite;
|
||||||
|
|
||||||
// #[cfg(test)]
|
#[cfg(test)]
|
||||||
// backend_test_suite!(
|
backend_test_suite!(
|
||||||
// mod cpu_spqlios,
|
mod cpu_spqlios,
|
||||||
// backend = poulpy_backend::cpu_spqlios::FFT64Spqlios,
|
backend = poulpy_backend::cpu_spqlios::FFT64Spqlios,
|
||||||
// size = 1<<8,
|
size = 1<<8,
|
||||||
// tests = {
|
tests = {
|
||||||
// GLWE Encryption
|
//GLWE Encryption
|
||||||
// glwe_encrypt_sk => crate::tests::test_suite::encryption::test_glwe_encrypt_sk,
|
glwe_encrypt_sk => crate::tests::test_suite::encryption::test_glwe_encrypt_sk,
|
||||||
// glwe_compressed_encrypt_sk => crate::tests::test_suite::encryption::test_glwe_compressed_encrypt_sk,
|
lwe_compressed_encrypt_sk => crate::tests::test_suite::encryption::test_glwe_compressed_encrypt_sk,
|
||||||
// glwe_encrypt_zero_sk => crate::tests::test_suite::encryption::test_glwe_encrypt_zero_sk,
|
glwe_encrypt_zero_sk => crate::tests::test_suite::encryption::test_glwe_encrypt_zero_sk,
|
||||||
// glwe_encrypt_pk => crate::tests::test_suite::encryption::test_glwe_encrypt_pk,
|
glwe_encrypt_pk => crate::tests::test_suite::encryption::test_glwe_encrypt_pk,
|
||||||
// GLWE Keyswitch
|
// GLWE Keyswitch
|
||||||
// glwe_keyswitch => crate::tests::test_suite::keyswitch::test_glwe_keyswitch,
|
// glwe_keyswitch => crate::tests::test_suite::keyswitch::test_glwe_keyswitch,
|
||||||
// glwe_keyswitch_inplace => crate::tests::test_suite::keyswitch::test_glwe_keyswitch_inplace,
|
// glwe_keyswitch_inplace => crate::tests::test_suite::keyswitch::test_glwe_keyswitch_inplace,
|
||||||
@@ -61,9 +61,8 @@ mod serialization;
|
|||||||
// lwe_keyswitch => crate::tests::test_suite::keyswitch::test_lwe_keyswitch,
|
// lwe_keyswitch => crate::tests::test_suite::keyswitch::test_lwe_keyswitch,
|
||||||
// glwe_to_lwe => crate::tests::test_suite::test_glwe_to_lwe,
|
// glwe_to_lwe => crate::tests::test_suite::test_glwe_to_lwe,
|
||||||
// lwe_to_glwe => crate::tests::test_suite::test_lwe_to_glwe,
|
// lwe_to_glwe => crate::tests::test_suite::test_lwe_to_glwe,
|
||||||
// }
|
}
|
||||||
// );
|
);
|
||||||
//
|
|
||||||
// #[cfg(test)]
|
// #[cfg(test)]
|
||||||
// backend_test_suite!(
|
// backend_test_suite!(
|
||||||
// mod cpu_ref,
|
// mod cpu_ref,
|
||||||
|
|||||||
@@ -1,22 +1,16 @@
|
|||||||
use poulpy_hal::{
|
use poulpy_hal::{
|
||||||
api::{
|
api::{ScratchAvailable, ScratchOwnedAlloc, ScratchOwnedBorrow, VecZnxFillUniform},
|
||||||
ScratchAvailable, ScratchOwnedAlloc, ScratchOwnedBorrow, SvpApplyDftToDft, SvpApplyDftToDftInplace, SvpPPolAlloc,
|
|
||||||
SvpPPolBytesOf, SvpPrepare, VecZnxAddInplace, VecZnxAddNormal, VecZnxBigAddInplace, VecZnxBigAddNormal,
|
|
||||||
VecZnxBigAddSmallInplace, VecZnxBigBytesOf, VecZnxBigNormalize, VecZnxCopy, VecZnxDftAlloc, VecZnxDftApply,
|
|
||||||
VecZnxDftBytesOf, VecZnxFillUniform, VecZnxIdftApplyConsume, VecZnxNormalize, VecZnxNormalizeInplace,
|
|
||||||
VecZnxNormalizeTmpBytes, VecZnxSub, VecZnxSubInplace,
|
|
||||||
},
|
|
||||||
layouts::{Backend, Module, Scratch, ScratchOwned},
|
layouts::{Backend, Module, Scratch, ScratchOwned},
|
||||||
source::Source,
|
source::Source,
|
||||||
};
|
};
|
||||||
|
|
||||||
use crate::{
|
use crate::{
|
||||||
GLWEEncryptSk, GLWESub, ScratchTakeCore,
|
GLWECompressedEncryptSk, GLWEEncryptPk, GLWEEncryptSk, GLWEPublicKeyGenerate, GLWESub, ScratchTakeCore,
|
||||||
decryption::GLWEDecrypt,
|
decryption::GLWEDecrypt,
|
||||||
encryption::SIGMA,
|
encryption::SIGMA,
|
||||||
layouts::{
|
layouts::{
|
||||||
GLWE, GLWEAlloc, GLWELayout, GLWEPlaintext, GLWEPlaintextLayout, GLWEPublicKey, GLWESecret, GLWESecretPrepare,
|
GLWE, GLWEAlloc, GLWELayout, GLWEPlaintext, GLWEPlaintextLayout, GLWEPublicKey, GLWEPublicKeyPrepare,
|
||||||
GLWESecretPreparedAlloc, LWEInfos,
|
GLWEPublicKeyPreparedAlloc, GLWESecret, GLWESecretPrepare, GLWESecretPreparedAlloc, LWEInfos,
|
||||||
compressed::GLWECompressed,
|
compressed::GLWECompressed,
|
||||||
prepared::{GLWEPublicKeyPrepared, GLWESecretPrepared},
|
prepared::{GLWEPublicKeyPrepared, GLWESecretPrepared},
|
||||||
},
|
},
|
||||||
@@ -67,8 +61,8 @@ where
|
|||||||
|
|
||||||
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(module, &glwe_infos);
|
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(module, &glwe_infos);
|
||||||
sk.fill_ternary_prob(0.5, &mut source_xs);
|
sk.fill_ternary_prob(0.5, &mut source_xs);
|
||||||
let mut sk_prepared: GLWESecretPrepared<Vec<u8>, B> = GLWESecretPrepared::alloc(module, rank.into());
|
|
||||||
|
|
||||||
|
let mut sk_prepared: GLWESecretPrepared<Vec<u8>, B> = GLWESecretPrepared::alloc(module, rank.into());
|
||||||
sk_prepared.prepare(module, &sk);
|
sk_prepared.prepare(module, &sk);
|
||||||
|
|
||||||
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, &mut source_xa);
|
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, &mut source_xa);
|
||||||
@@ -93,30 +87,17 @@ where
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn test_glwe_compressed_encrypt_sk<B>(module: &Module<B>)
|
pub fn test_glwe_compressed_encrypt_sk<B: Backend>(module: &Module<B>)
|
||||||
where
|
where
|
||||||
Module<B>: VecZnxDftBytesOf
|
Module<B>: GLWEAlloc
|
||||||
+ VecZnxBigBytesOf
|
+ GLWECompressedEncryptSk<B>
|
||||||
+ VecZnxDftApply<B>
|
+ GLWEDecrypt<B>
|
||||||
+ SvpApplyDftToDftInplace<B>
|
+ GLWESecretPreparedAlloc<B>
|
||||||
+ VecZnxIdftApplyConsume<B>
|
+ GLWESecretPrepare<B>
|
||||||
+ VecZnxBigAddInplace<B>
|
|
||||||
+ VecZnxBigAddSmallInplace<B>
|
|
||||||
+ VecZnxBigNormalize<B>
|
|
||||||
+ VecZnxNormalizeTmpBytes
|
|
||||||
+ SvpPrepare<B>
|
|
||||||
+ SvpPPolBytesOf
|
|
||||||
+ SvpPPolAlloc<B>
|
|
||||||
+ SvpApplyDftToDft<B>
|
|
||||||
+ VecZnxBigAddNormal<B>
|
|
||||||
+ VecZnxFillUniform
|
+ VecZnxFillUniform
|
||||||
+ VecZnxSubInplace
|
+ GLWESub,
|
||||||
+ VecZnxAddInplace
|
ScratchOwned<B>: ScratchOwnedAlloc<B> + ScratchOwnedBorrow<B>,
|
||||||
+ VecZnxNormalizeInplace<B>
|
Scratch<B>: ScratchAvailable + ScratchTakeCore<B>,
|
||||||
+ VecZnxAddNormal
|
|
||||||
+ VecZnxNormalize<B>
|
|
||||||
+ VecZnxSub
|
|
||||||
+ VecZnxCopy,
|
|
||||||
{
|
{
|
||||||
let base2k: usize = 8;
|
let base2k: usize = 8;
|
||||||
let k_ct: usize = 54;
|
let k_ct: usize = 54;
|
||||||
@@ -138,10 +119,10 @@ where
|
|||||||
k: k_pt.into(),
|
k: k_pt.into(),
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut ct_compressed: GLWECompressed<Vec<u8>> = GLWECompressed::alloc_from_infos(&glwe_infos);
|
let mut ct_compressed: GLWECompressed<Vec<u8>> = GLWECompressed::alloc_from_infos(module, &glwe_infos);
|
||||||
|
|
||||||
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&pt_infos);
|
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(module, &pt_infos);
|
||||||
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&pt_infos);
|
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(module, &pt_infos);
|
||||||
|
|
||||||
let mut source_xs: Source = Source::new([0u8; 32]);
|
let mut source_xs: Source = Source::new([0u8; 32]);
|
||||||
let mut source_xe: Source = Source::new([0u8; 32]);
|
let mut source_xe: Source = Source::new([0u8; 32]);
|
||||||
@@ -151,9 +132,11 @@ where
|
|||||||
GLWECompressed::encrypt_sk_tmp_bytes(module, &glwe_infos) | GLWE::decrypt_tmp_bytes(module, &glwe_infos),
|
GLWECompressed::encrypt_sk_tmp_bytes(module, &glwe_infos) | GLWE::decrypt_tmp_bytes(module, &glwe_infos),
|
||||||
);
|
);
|
||||||
|
|
||||||
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(&glwe_infos);
|
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(module, &glwe_infos);
|
||||||
sk.fill_ternary_prob(0.5, &mut source_xs);
|
sk.fill_ternary_prob(0.5, &mut source_xs);
|
||||||
let sk_prepared: GLWESecretPrepared<Vec<u8>, B> = sk.prepare_alloc(module, scratch.borrow());
|
|
||||||
|
let mut sk_prepared: GLWESecretPrepared<Vec<u8>, B> = GLWESecretPrepared::alloc(module, rank.into());
|
||||||
|
sk_prepared.prepare(module, &sk);
|
||||||
|
|
||||||
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, &mut source_xa);
|
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, &mut source_xa);
|
||||||
|
|
||||||
@@ -168,12 +151,12 @@ where
|
|||||||
scratch.borrow(),
|
scratch.borrow(),
|
||||||
);
|
);
|
||||||
|
|
||||||
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(&glwe_infos);
|
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(module, &glwe_infos);
|
||||||
ct.decompress(module, &ct_compressed);
|
ct.decompress(module, &ct_compressed);
|
||||||
|
|
||||||
ct.decrypt(module, &mut pt_have, &sk_prepared, scratch.borrow());
|
ct.decrypt(module, &mut pt_have, &sk_prepared, scratch.borrow());
|
||||||
|
|
||||||
pt_want.sub_inplace_ab(module, &pt_have);
|
module.glwe_sub_inplace(&mut pt_want, &pt_have);
|
||||||
|
|
||||||
let noise_have: f64 = pt_want.data.std(base2k, 0) * (ct.k().as_u32() as f64).exp2();
|
let noise_have: f64 = pt_want.data.std(base2k, 0) * (ct.k().as_u32() as f64).exp2();
|
||||||
let noise_want: f64 = SIGMA;
|
let noise_want: f64 = SIGMA;
|
||||||
@@ -186,29 +169,17 @@ where
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn test_glwe_encrypt_zero_sk<B>(module: &Module<B>)
|
pub fn test_glwe_encrypt_zero_sk<B: Backend>(module: &Module<B>)
|
||||||
where
|
where
|
||||||
Module<B>: VecZnxDftBytesOf
|
Module<B>: GLWEAlloc
|
||||||
+ VecZnxBigBytesOf
|
+ GLWEEncryptSk<B>
|
||||||
+ VecZnxDftApply<B>
|
+ GLWEDecrypt<B>
|
||||||
+ SvpApplyDftToDftInplace<B>
|
+ GLWESecretPreparedAlloc<B>
|
||||||
+ VecZnxIdftApplyConsume<B>
|
+ GLWESecretPrepare<B>
|
||||||
+ VecZnxBigAddInplace<B>
|
|
||||||
+ VecZnxBigAddSmallInplace<B>
|
|
||||||
+ VecZnxBigNormalize<B>
|
|
||||||
+ VecZnxNormalizeTmpBytes
|
|
||||||
+ SvpPrepare<B>
|
|
||||||
+ SvpPPolBytesOf
|
|
||||||
+ SvpPPolAlloc<B>
|
|
||||||
+ SvpApplyDftToDft<B>
|
|
||||||
+ VecZnxBigAddNormal<B>
|
|
||||||
+ VecZnxFillUniform
|
+ VecZnxFillUniform
|
||||||
+ VecZnxSubInplace
|
+ GLWESub,
|
||||||
+ VecZnxAddInplace
|
ScratchOwned<B>: ScratchOwnedAlloc<B> + ScratchOwnedBorrow<B>,
|
||||||
+ VecZnxNormalizeInplace<B>
|
Scratch<B>: ScratchAvailable + ScratchTakeCore<B>,
|
||||||
+ VecZnxAddNormal
|
|
||||||
+ VecZnxNormalize<B>
|
|
||||||
+ VecZnxSub,
|
|
||||||
{
|
{
|
||||||
let base2k: usize = 8;
|
let base2k: usize = 8;
|
||||||
let k_ct: usize = 54;
|
let k_ct: usize = 54;
|
||||||
@@ -223,7 +194,7 @@ where
|
|||||||
rank: rank.into(),
|
rank: rank.into(),
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut pt: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&glwe_infos);
|
let mut pt: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(module, &glwe_infos);
|
||||||
|
|
||||||
let mut source_xs: Source = Source::new([0u8; 32]);
|
let mut source_xs: Source = Source::new([0u8; 32]);
|
||||||
let mut source_xe: Source = Source::new([1u8; 32]);
|
let mut source_xe: Source = Source::new([1u8; 32]);
|
||||||
@@ -232,11 +203,13 @@ where
|
|||||||
let mut scratch: ScratchOwned<B> =
|
let mut scratch: ScratchOwned<B> =
|
||||||
ScratchOwned::alloc(GLWE::decrypt_tmp_bytes(module, &glwe_infos) | GLWE::encrypt_sk_tmp_bytes(module, &glwe_infos));
|
ScratchOwned::alloc(GLWE::decrypt_tmp_bytes(module, &glwe_infos) | GLWE::encrypt_sk_tmp_bytes(module, &glwe_infos));
|
||||||
|
|
||||||
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(&glwe_infos);
|
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(module, &glwe_infos);
|
||||||
sk.fill_ternary_prob(0.5, &mut source_xs);
|
sk.fill_ternary_prob(0.5, &mut source_xs);
|
||||||
let sk_prepared: GLWESecretPrepared<Vec<u8>, B> = sk.prepare_alloc(module, scratch.borrow());
|
|
||||||
|
|
||||||
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(&glwe_infos);
|
let mut sk_prepared: GLWESecretPrepared<Vec<u8>, B> = GLWESecretPrepared::alloc(module, rank.into());
|
||||||
|
sk_prepared.prepare(module, &sk);
|
||||||
|
|
||||||
|
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(module, &glwe_infos);
|
||||||
|
|
||||||
ct.encrypt_zero_sk(
|
ct.encrypt_zero_sk(
|
||||||
module,
|
module,
|
||||||
@@ -251,31 +224,20 @@ where
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn test_glwe_encrypt_pk<B>(module: &Module<B>)
|
pub fn test_glwe_encrypt_pk<B: Backend>(module: &Module<B>)
|
||||||
where
|
where
|
||||||
Module<B>: VecZnxDftBytesOf
|
Module<B>: GLWEAlloc
|
||||||
+ VecZnxBigNormalize<B>
|
+ GLWEEncryptPk<B>
|
||||||
+ VecZnxDftApply<B>
|
+ GLWEPublicKeyPrepare<B>
|
||||||
+ SvpApplyDftToDftInplace<B>
|
+ GLWEPublicKeyPreparedAlloc<B>
|
||||||
+ VecZnxIdftApplyConsume<B>
|
+ GLWEPublicKeyGenerate<B>
|
||||||
+ VecZnxNormalizeTmpBytes
|
+ GLWEDecrypt<B>
|
||||||
|
+ GLWESecretPreparedAlloc<B>
|
||||||
|
+ GLWESecretPrepare<B>
|
||||||
+ VecZnxFillUniform
|
+ VecZnxFillUniform
|
||||||
+ VecZnxSubInplace
|
+ GLWESub,
|
||||||
+ VecZnxAddInplace
|
ScratchOwned<B>: ScratchOwnedAlloc<B> + ScratchOwnedBorrow<B>,
|
||||||
+ VecZnxNormalizeInplace<B>
|
Scratch<B>: ScratchAvailable + ScratchTakeCore<B>,
|
||||||
+ VecZnxAddNormal
|
|
||||||
+ VecZnxNormalize<B>
|
|
||||||
+ VecZnxSub
|
|
||||||
+ SvpPrepare<B>
|
|
||||||
+ SvpPPolBytesOf
|
|
||||||
+ SvpPPolAlloc<B>
|
|
||||||
+ VecZnxBigAddSmallInplace<B>
|
|
||||||
+ VecZnxBigBytesOf
|
|
||||||
+ VecZnxBigAddInplace<B>
|
|
||||||
+ VecZnxCopy
|
|
||||||
+ VecZnxDftAlloc<B>
|
|
||||||
+ SvpApplyDftToDft<B>
|
|
||||||
+ VecZnxBigAddNormal<B>,
|
|
||||||
{
|
{
|
||||||
let base2k: usize = 8;
|
let base2k: usize = 8;
|
||||||
let k_ct: usize = 54;
|
let k_ct: usize = 54;
|
||||||
@@ -290,31 +252,31 @@ where
|
|||||||
rank: rank.into(),
|
rank: rank.into(),
|
||||||
};
|
};
|
||||||
|
|
||||||
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(&glwe_infos);
|
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(module, &glwe_infos);
|
||||||
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&glwe_infos);
|
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(module, &glwe_infos);
|
||||||
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&glwe_infos);
|
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(module, &glwe_infos);
|
||||||
|
|
||||||
let mut source_xs: Source = Source::new([0u8; 32]);
|
let mut source_xs: Source = Source::new([0u8; 32]);
|
||||||
let mut source_xe: Source = Source::new([0u8; 32]);
|
let mut source_xe: Source = Source::new([0u8; 32]);
|
||||||
let mut source_xa: Source = Source::new([0u8; 32]);
|
let mut source_xa: Source = Source::new([0u8; 32]);
|
||||||
let mut source_xu: Source = Source::new([0u8; 32]);
|
let mut source_xu: Source = Source::new([0u8; 32]);
|
||||||
|
|
||||||
let mut scratch: ScratchOwned<B> = ScratchOwned::alloc(
|
let mut scratch: ScratchOwned<B> =
|
||||||
GLWE::encrypt_sk_tmp_bytes(module, &glwe_infos)
|
ScratchOwned::alloc(GLWE::decrypt_tmp_bytes(module, &glwe_infos) | GLWE::encrypt_pk_tmp_bytes(module, &glwe_infos));
|
||||||
| GLWE::decrypt_tmp_bytes(module, &glwe_infos)
|
|
||||||
| GLWE::encrypt_pk_tmp_bytes(module, &glwe_infos),
|
|
||||||
);
|
|
||||||
|
|
||||||
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(&glwe_infos);
|
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(module, &glwe_infos);
|
||||||
sk.fill_ternary_prob(0.5, &mut source_xs);
|
sk.fill_ternary_prob(0.5, &mut source_xs);
|
||||||
let sk_prepared: GLWESecretPrepared<Vec<u8>, B> = sk.prepare_alloc(module, scratch.borrow());
|
|
||||||
|
|
||||||
let mut pk: GLWEPublicKey<Vec<u8>> = GLWEPublicKey::alloc_from_infos(&glwe_infos);
|
let mut sk_prepared: GLWESecretPrepared<Vec<u8>, B> = GLWESecretPrepared::alloc(module, rank.into());
|
||||||
|
sk_prepared.prepare(module, &sk);
|
||||||
|
|
||||||
|
let mut pk: GLWEPublicKey<Vec<u8>> = GLWEPublicKey::alloc_from_infos(module, &glwe_infos);
|
||||||
pk.generate(module, &sk_prepared, &mut source_xa, &mut source_xe);
|
pk.generate(module, &sk_prepared, &mut source_xa, &mut source_xe);
|
||||||
|
|
||||||
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, &mut source_xa);
|
module.vec_znx_fill_uniform(base2k, &mut pt_want.data, 0, &mut source_xa);
|
||||||
|
|
||||||
let pk_prepared: GLWEPublicKeyPrepared<Vec<u8>, B> = pk.prepare_alloc(module, scratch.borrow());
|
let mut pk_prepared: GLWEPublicKeyPrepared<Vec<u8>, B> = GLWEPublicKeyPrepared::alloc_from_infos(module, &glwe_infos);
|
||||||
|
pk_prepared.prepare(module, &pk);
|
||||||
|
|
||||||
ct.encrypt_pk(
|
ct.encrypt_pk(
|
||||||
module,
|
module,
|
||||||
@@ -327,7 +289,7 @@ where
|
|||||||
|
|
||||||
ct.decrypt(module, &mut pt_have, &sk_prepared, scratch.borrow());
|
ct.decrypt(module, &mut pt_have, &sk_prepared, scratch.borrow());
|
||||||
|
|
||||||
pt_want.sub_inplace_ab(module, &pt_have);
|
module.glwe_sub_inplace(&mut pt_want, &pt_have);
|
||||||
|
|
||||||
let noise_have: f64 = pt_want.data.std(base2k, 0).log2();
|
let noise_have: f64 = pt_want.data.std(base2k, 0).log2();
|
||||||
let noise_want: f64 = ((((rank as f64) + 1.0) * n as f64 * 0.5 * SIGMA * SIGMA).sqrt()).log2() - (k_ct as f64);
|
let noise_want: f64 = ((((rank as f64) + 1.0) * n as f64 * 0.5 * SIGMA * SIGMA).sqrt()).log2() - (k_ct as f64);
|
||||||
|
|||||||
Reference in New Issue
Block a user