Files
poulpy/poulpy-core/examples/encryption.rs

119 lines
3.7 KiB
Rust

use poulpy_core::{
layouts::{
prepared::GLWESecretPrepared, Base2K, Degree, GLWELayout, GLWEPlaintext, GLWEPlaintextLayout, GLWESecret, LWEInfos, Rank,
TorusPrecision, GLWE,
},
GLWESub, SIGMA,
};
#[cfg(all(feature = "enable-avx", target_arch = "x86_64"))]
pub use poulpy_cpu_avx::FFT64Avx as BackendImpl;
#[cfg(not(all(feature = "enable-avx", target_arch = "x86_64")))]
pub use poulpy_cpu_ref::FFT64Ref as BackendImpl;
use poulpy_hal::{
api::{ModuleNew, ScratchOwnedAlloc, ScratchOwnedBorrow, VecZnxFillUniform},
layouts::{Module, ScratchOwned},
source::Source,
};
fn main() {
// Ring degree
let log_n: usize = 10;
let n: Degree = Degree(1 << log_n);
// Base-2-k (implicit digit decomposition)
let base2k: Base2K = Base2K(14);
// Ciphertext Torus precision (equivalent to ciphertext modulus)
let k_ct: TorusPrecision = TorusPrecision(27);
// Plaintext Torus precision (equivament to plaintext modulus)
let k_pt: TorusPrecision = TorusPrecision(base2k.into());
// GLWE rank
let rank: Rank = Rank(1);
// Instantiate Module (DFT Tables)
let module: Module<BackendImpl> = Module::<BackendImpl>::new(n.0 as u64);
let glwe_ct_infos: GLWELayout = GLWELayout {
n,
base2k,
k: k_ct,
rank,
};
let glwe_pt_infos: GLWEPlaintextLayout = GLWEPlaintextLayout { n, base2k, k: k_pt };
// Allocates ciphertext & plaintexts
let mut ct: GLWE<Vec<u8>> = GLWE::alloc_from_infos(&glwe_ct_infos);
let mut pt_want: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&glwe_pt_infos);
let mut pt_have: GLWEPlaintext<Vec<u8>> = GLWEPlaintext::alloc_from_infos(&glwe_pt_infos);
// CPRNG
let mut source_xs: Source = Source::new([0u8; 32]);
let mut source_xe: Source = Source::new([1u8; 32]);
let mut source_xa: Source = Source::new([2u8; 32]);
// Scratch space
let mut scratch: ScratchOwned<BackendImpl> = ScratchOwned::alloc(
GLWE::encrypt_sk_tmp_bytes(&module, &glwe_ct_infos) | GLWE::decrypt_tmp_bytes(&module, &glwe_ct_infos),
);
// Generate secret-key
let mut sk: GLWESecret<Vec<u8>> = GLWESecret::alloc_from_infos(&glwe_ct_infos);
sk.fill_ternary_prob(0.5, &mut source_xs);
// Backend-prepared secret
let mut sk_prepared: GLWESecretPrepared<Vec<u8>, BackendImpl> = GLWESecretPrepared::alloc(&module, rank);
sk_prepared.prepare(&module, &sk);
// DBG:
// obtain pk from sk
let mut pk = poulpy_core::layouts::GLWEPublicKey::alloc_from_infos(&glwe_ct_infos);
pk.generate(&module, &sk_prepared, &mut source_xa, &mut source_xe);
// Backend-prepared publickey:
let mut pk_prepared: poulpy_core::layouts::GLWEPublicKeyPrepared<Vec<u8>, BackendImpl> =
poulpy_core::layouts::GLWEPublicKeyPrepared::alloc(&module, base2k, k_ct, rank);
pk_prepared.prepare(&module, &pk);
// Uniform plaintext
module.vec_znx_fill_uniform(base2k.into(), &mut pt_want.data, 0, &mut source_xa);
// Encryption
// ct.encrypt_sk(
// &module,
// &pt_want,
// &sk_prepared,
// &mut source_xa,
// &mut source_xe,
// scratch.borrow(),
// );
// DBG: encrypt with public key
ct.encrypt_pk(
&module,
&pt_want,
&pk_prepared,
&mut source_xa,
&mut source_xe,
scratch.borrow(),
);
// Decryption
ct.decrypt(&module, &mut pt_have, &sk_prepared, scratch.borrow());
// Diff between pt - Dec(Enc(pt))
module.glwe_sub_inplace(&mut pt_want, &pt_have);
// Ideal vs. actual noise
let noise_have: f64 = pt_want.data.stats(base2k.into(), 0).std() * (ct.k().as_u32() as f64).exp2();
let noise_want: f64 = SIGMA;
// Check
assert!(noise_have <= noise_want + 0.2);
}