You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

203 lines
5.7 KiB

  1. extern crate ark_ed_on_bn254;
  2. use ark_ec::{AffineCurve, ProjectiveCurve, TEModelParameters};
  3. use ark_ed_on_bn254::{EdwardsAffine, EdwardsParameters, EdwardsProjective, FqParameters, Fr};
  4. use ark_ff::{bytes::FromBytes, fields::PrimeField, BigInteger, Fp256};
  5. use ark_std::{rand, UniformRand, Zero};
  6. use sha2::{Digest, Sha256};
  7. const GX: Fp256<FqParameters> = <EdwardsParameters as TEModelParameters>::AFFINE_GENERATOR_COEFFS.0;
  8. const GY: Fp256<FqParameters> = <EdwardsParameters as TEModelParameters>::AFFINE_GENERATOR_COEFFS.1;
  9. #[macro_use]
  10. extern crate lazy_static;
  11. lazy_static! {
  12. static ref G_AFFINE: EdwardsAffine = EdwardsAffine::new(GX, GY);
  13. pub static ref G: EdwardsProjective = G_AFFINE.into_projective();
  14. }
  15. pub type PublicKey = EdwardsProjective;
  16. pub type Signature = (Fr, Vec<Fr>);
  17. #[derive(Debug, PartialEq)]
  18. pub struct KeyPair {
  19. sk: Fr,
  20. pub pk: PublicKey,
  21. }
  22. pub fn new_key() -> KeyPair {
  23. let mut rng = ark_std::rand::thread_rng();
  24. let sk: Fr = Fr::rand(&mut rng);
  25. // let sk: Fr = UniformRand::rand(&mut rng);
  26. let pk = G.mul(sk.into_repr());
  27. KeyPair { sk, pk }
  28. }
  29. impl KeyPair {
  30. pub fn key_image(&self) -> EdwardsProjective {
  31. hash_to_point(self.pk).mul(self.sk.into_repr())
  32. }
  33. pub fn sign(&self, ring: Vec<PublicKey>, m: Vec<u8>) -> Signature {
  34. let ring_size = ring.len();
  35. // determine pi (the position of signer's public key in R
  36. let mut pi = 0;
  37. let mut found = false;
  38. for i in 0..ring_size {
  39. if self.pk == ring[i] {
  40. pi = i;
  41. found = true;
  42. break;
  43. }
  44. }
  45. if !found {
  46. // error
  47. println!("key not found in the ring");
  48. }
  49. let mut rng = ark_std::rand::thread_rng();
  50. let a: Fr = Fr::rand(&mut rng);
  51. let mut r: Vec<Fr> = vec![Fr::zero(); ring_size];
  52. // for i \in {1, 2, ..., n} \ {i=pi}
  53. for i in 0..ring_size {
  54. if i == pi {
  55. continue;
  56. }
  57. r[i] = Fr::rand(&mut rng);
  58. }
  59. let mut c: Vec<Fr> = vec![Fr::zero(); ring_size];
  60. // c_{pi+1}
  61. let pi1 = (pi + 1) % ring_size;
  62. c[pi1] = hash(
  63. &ring,
  64. &m,
  65. G.mul(a.into_repr()),
  66. hash_to_point(ring[pi]).mul(a.into_repr()),
  67. );
  68. let key_image = self.key_image();
  69. // do c_{i+1} from i=pi+1 to pi-1:
  70. for j in 0..(ring_size - 1) {
  71. let i = (pi1 + j) % ring_size;
  72. let i1 = (pi1 + j + 1) % ring_size;
  73. c[i1] = hash(
  74. &ring,
  75. &m,
  76. G.mul(r[i].into_repr()) + ring[i].mul(c[i].into_repr()),
  77. hash_to_point(ring[i]).mul(r[i].into_repr()) + key_image.mul(c[i].into_repr()),
  78. );
  79. println!("i {:?}, {:?}", i, c[i1]);
  80. }
  81. // compute r_pi
  82. r[pi] = a - c[pi] * self.sk;
  83. (c[0], r)
  84. }
  85. }
  86. pub fn verify(
  87. ring: Vec<PublicKey>,
  88. m: Vec<u8>,
  89. key_image: EdwardsProjective,
  90. sig: Signature,
  91. ) -> bool {
  92. let ring_size = ring.len();
  93. let c1 = sig.0;
  94. let r = sig.1;
  95. if ring_size != r.len() {
  96. println!("ERROR"); // TODO
  97. return false;
  98. }
  99. // TODO check that key_image \in G (EC), by l * key_image == 0
  100. let mut c: Vec<Fr> = vec![Fr::zero(); ring_size];
  101. c[0] = c1;
  102. for j in 0..ring_size {
  103. let i = j % ring_size;
  104. let i1 = (j + 1) % ring_size;
  105. c[i1] = hash(
  106. &ring,
  107. &m,
  108. G.mul(r[i].into_repr()) + ring[i].mul(c[i].into_repr()),
  109. hash_to_point(ring[i]).mul(r[i].into_repr()) + key_image.mul(c[i].into_repr()),
  110. );
  111. }
  112. println!("c {:?}\n{:?}", c1, c[0]);
  113. if c1 == c[0] {
  114. return true;
  115. }
  116. false
  117. }
  118. fn hash_to_point(a: EdwardsProjective) -> EdwardsProjective {
  119. // TODO use a proper hash_to_point method
  120. let mut v: Vec<u8> = Vec::new();
  121. v.append(&mut a.into_affine().x.into_repr().to_bytes_le());
  122. v.append(&mut a.into_affine().y.into_repr().to_bytes_le());
  123. let mut hasher = Sha256::new();
  124. hasher.update(v);
  125. let h = hasher.finalize();
  126. let v = Fr::from_le_bytes_mod_order(&h[..]);
  127. G.mul(v.into_repr())
  128. }
  129. fn hash(ring: &Vec<PublicKey>, m: &Vec<u8>, a: EdwardsProjective, b: EdwardsProjective) -> Fr {
  130. let mut v: Vec<u8> = Vec::new();
  131. for i in 0..ring.len() {
  132. v.append(&mut ring[i].into_affine().x.into_repr().to_bytes_le());
  133. v.append(&mut ring[i].into_affine().y.into_repr().to_bytes_le());
  134. }
  135. v.append(&mut m.clone());
  136. v.append(&mut a.into_affine().x.into_repr().to_bytes_le());
  137. v.append(&mut a.into_affine().y.into_repr().to_bytes_le());
  138. v.append(&mut b.into_affine().x.into_repr().to_bytes_le());
  139. v.append(&mut b.into_affine().y.into_repr().to_bytes_le());
  140. Fr::from_le_bytes_mod_order(&Sha256::new().chain_update(v).finalize())
  141. }
  142. #[cfg(test)]
  143. mod tests {
  144. use super::*;
  145. #[test]
  146. #[allow(non_snake_case)]
  147. fn test_bLSAG() {
  148. let n = 5; // ring size
  149. let pi = 3; // position of prover key in the ring
  150. let k_pi = new_key();
  151. println!("{:?}", k_pi);
  152. // generate other n public keys
  153. let mut ring: Vec<PublicKey> = vec![G.clone(); n];
  154. for i in 0..n {
  155. let k = new_key();
  156. ring[i] = k.pk;
  157. }
  158. // set K_pi
  159. ring[pi] = k_pi.pk;
  160. let m: Vec<u8> = vec![1, 2, 3, 4];
  161. let sig = k_pi.sign(ring.clone(), m.clone());
  162. println!("sig {:?}", sig);
  163. let key_image = k_pi.key_image();
  164. let v = verify(ring.clone(), m.clone(), key_image, sig.clone());
  165. println!("v {:?}", v);
  166. assert!(v);
  167. let m: Vec<u8> = vec![1, 2, 3, 3];
  168. let v = verify(ring, m, key_image, sig);
  169. assert!(!v);
  170. }
  171. }