qplasthop_client.py 5.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485
  1. from dht_common import SIZE_OF_HASH, SIZE_OF_IP_ADDRESS, SIZE_OF_OT_VALUE, SIZE_OF_KEY, SIZE_OF_SIGNATURE, SIZE_OF_TIMESTAMP
  2. from qp_client import QP_Client
  3. from collections import defaultdict
  4. class QPLastHop_Client(QP_Client):
  5. def __init__(self, DHT, knownQuorum, documentSize, numNodes):
  6. QP_Client.__init__(self, DHT, knownQuorum, documentSize, numNodes)
  7. self.databaseAccesses = defaultdict(lambda: 0)
  8. def get_database_accesses(self):
  9. return self.databaseAccesses
  10. # Iterative search comes from QP_Client, but retrieving the file is now more complicated
  11. def retrieve_file(self, documentID):
  12. whichQuorum, numKeys, numSignatures = self.__iterative_search__(documentID)
  13. randomNode = self.cryptogen.randrange(self.numNodes)
  14. numItems = self.DHT.access_node(whichQuorum).get_final_table_ranges(randomNode, numKeys, numSignatures)
  15. # Asker's ID
  16. sizeOfRequest = SIZE_OF_HASH
  17. # timestamp
  18. sizeOfRequest += SIZE_OF_TIMESTAMP
  19. # keys in request
  20. sizeOfRequest += SIZE_OF_KEY * numKeys
  21. # signatures in request
  22. sizeOfRequest += SIZE_OF_SIGNATURE * numSignatures
  23. # The set of hashes in the item store
  24. sizeOfResponse = SIZE_OF_HASH * numItems
  25. # Then the entrywise encrypted item store
  26. sizeOfResponse += self.documentSize * numItems
  27. # Then the OT prime values
  28. sizeOfResponse += 2 * SIZE_OF_OT_VALUE * numItems
  29. # Then, finally, a signature to tie it together
  30. sizeOfResponse += SIZE_OF_SIGNATURE
  31. self.numRounds += 1
  32. self.numMessagesSent += 1
  33. self.numMessagesRecv += 1
  34. self.numBytesSent += sizeOfRequest
  35. self.numBytesRecv += sizeOfResponse
  36. self.databaseAccesses[numItems] += 1
  37. self.DHT.access_node(whichQuorum).OT_retrieve(randomNode, numKeys, numSignatures)
  38. # Asker's ID
  39. sizeOfRequest = SIZE_OF_HASH
  40. # timestamp
  41. sizeOfRequest += SIZE_OF_TIMESTAMP
  42. # keys in request
  43. sizeOfRequest += SIZE_OF_KEY * numKeys
  44. # signatures in request
  45. sizeOfRequest += SIZE_OF_SIGNATURE * numSignatures
  46. # actual OT crypto usage
  47. sizeOfRequest += SIZE_OF_OT_VALUE
  48. # signature on whole thing
  49. sizeOfRequest += SIZE_OF_SIGNATURE
  50. sizeOfResponse = SIZE_OF_OT_VALUE + SIZE_OF_SIGNATURE
  51. self.numRounds += 1
  52. self.numMessagesSent += 1
  53. self.numMessagesRecv += 1
  54. self.numBytesSent += sizeOfRequest
  55. self.numBytesRecv += sizeOfResponse
  56. # UNIT TESTS
  57. if __name__ == "__main__":
  58. from dht_simulator import DHT_Simulator
  59. from qplasthop_node import QPLastHop_Quorum
  60. NUM_QUORUMS_IN_TEST = 10
  61. SIZE_OF_DOCUMENTS_IN_TEST = 1024
  62. NUM_NODES_PER_QUORUM_IN_TEST = 10
  63. testbed = DHT_Simulator(QPLastHop_Quorum, NUM_QUORUMS_IN_TEST, SIZE_OF_DOCUMENTS_IN_TEST, NUM_NODES_PER_QUORUM_IN_TEST)
  64. client = QPLastHop_Client(testbed, 0, SIZE_OF_DOCUMENTS_IN_TEST, NUM_NODES_PER_QUORUM_IN_TEST)
  65. file = b'\xc3\xa7\x0c\xc3\x97!\xc3\xb2offy\x13\xc2\x81~\xc2\x9f\xc3\xb5\xc3\xa1\xc3\xb9C\xc2\x92f\xc2\x968\x01\xc2\x9183D\xc3\x84\xc3\xa9\xc3\x8e\t\x0f\xc2\xa1<\xc2\xad%G\xc3\x9dq\xc2\xb7\x1b\x7f\xc2\x82\xc3\x84\xc3\xb4\xc3\x81\x1c\xc3\x8dqgH(H\\C&\x14\xc2\x98\xc3\x93`\xc3\xbe\xc3\x95\xc3\xad\xc3\x8d\xc3\xb5\xc2\x8d.\xc2\x94D\x13IK\xc3\x9a\xc2\x8dS\xc3\x8b\xc2\xa7\xc2\xb6\xc2\x9d\x1fY\xc3\xbe\xc3\x85[\r\xc2\x85\x0e#\xc2\xb85B4\x15\xc3\xaf\xc2\x81_g\xc3\xb3;!|\xc3\xbc\xc3\xaa;\xc3\xbd(m\xc2\xbd\xc3\x96b\xc2\x88\xc3\x9d\xc2\x87N\xc3\xb9\xc3\xb5\xc3\xa54\xc2\xb6(\xc2\xa7\xc3\x950\xc3\x82\x1c\xc3\x95\xc2\x85\xc2\x983\xc3\xbfy\xc2\x89lQ\xc2\x8aN\xc2\xb0\x05\xc2\x9f\xc2\xac\xc2\xa3T+z.D1\xc2\xae\xc2\xae+\xc3\x86\xc2\xb3\xc2\xb0\xc3\x8d,\x04\xc2\x96\xc2\xa7\xc3\xba\xc2\xb4A\xc2\x95P"*\x1d\x0b\xc3\xbd!e\xc2\xaa\xc2\xa4UL\xc3\x84j\xc2\xb9>h\x01\x08\xc3\xb1\xc2\x85\xc3\x81\xc2\xb0b\xc2\x9b\x0fY\xc3\xb7V ^\xc3\xb0Z~r%\xc2\x9c\xc2\x91Q\x03+9(\x14\xc2\xa1`\x17\xc3\x8c\x18+\xc3\xb4\xc2\xb4Z&l9L\xc2\x94\xc2\xae\xc2\x83\x7fJt\xc2\xbbt\xc2\x89\n\xc2\xab\xc2\x94\xc2\x90I3\xc3\xa8\xc2\xbb\x14\xc3\x9ekM\x170}r\xc2\x9c>\xc3\xa2!\xc2\x8d\xc2\x91f\xc3\xb2\xc3\xae<v\x07\xc3\xa5V\xc2\x81\xc2\x9a\xc2\xbe\xc2\xb9\xc3\x91\xc3\x97\xc3\xb01\xc2\x82b\xc3\x82\xc3\x93\x04\xc2\xb3\xc2\xb3\x0bdtR\xc2\x80\x0e\xc2\x96\xc3\x8c\xc2\x82\xc2\xba\x15\xc3\x8aO\xc2\xae\xc2\x8a\xc2\x9b\xc2\x9d\xc3\xb4\xc2\xbc\xc2\x8d\xc2\xad\xc3\x94\xc3\xab\x1b]\xc2\xaf\xc3\xadd\xc2\xb2[\xc3\x83]\xc2\x9d\xc3\x91\x1b\xc2\x82\'\x15\xc2\xbe\xc2\xad\xc3\xaf\xc3\x80\xc2\x90\xc2\x9c<xOh;\xc2\xb3\xc3\xae\x05m5\x14\xc2\xacm\xc3\xba\xc3\xbd;R*\xc3\xae$\xc2\x9d\xc2\x8ff\x178mU\xc3\xba?\\o{\xc2\xa6\xc2\xa3+\xc3\x9c\xc2\xa5\xc2\xa4\xc2\xabFv\t\xc3\x9b>h\xc3\x82\xc2\x94\x11*\xc2\x97D`\xc3\xba\xc3\xa0\x17\xc3\xab!An\x7f\xc2\x89Rrh\xc3\x80\xc2\xaf\x1f*}j\xc2\xaf\xc2\x84\xc2\xa4\xc2\x92\xc2\x97\xc2\x83\xc2\x8cf\xc3\xb6\x1f\xc3\xadfb\xc2\xb1\xc2\xa3\xc3\x8f7\xc3\x82 \xc3\xbb\xc2\x84\xc3\xb0sh\xc2\x9d|\x7f\xc3\xbda\xc3\x84\xc2\x80\x08\xc3\x88\xc2\xa8mBi\xc2\xae)\x02}K\xc3\x9f\xc2\xa7\xc3\x95\xc3\x94[[D\n\xc2\x98AQH\xc2\xb9\xc2\xb3\xc3\xb3"\x08\xc2\x9f\xc3\x98\xc3\x91B[\xc2\x8b\xc2\x86xhMK\xc3\xbb\xc2\x83`\xc2\xa7\x02\xc3\x8a\xc3\x89\xc3\x8f\xc3\xb0\xc2\xa9\xc3\x99\xc3\x9b\xc2\xb2\xc3\x9a\xc3\xaa5\xc2\xb7T\xc2\x81\x0f\xc3\x90\x0c\xc3\xb3\x05\xc3\x8d\xc3\x85S\xc2\xbb\x17\xc3\x86\xc3\xb2\xc3\xa3\xc3\xb0V\x07\x0e\xc2\xb0y\xc2\x8e\xc2\xb1\xc3\x8f;\xc2\xb9Tc\xc3\xadM\xc2\xad\xc2\x98#\xc2\xb0\x01`\x1c\xc2\x84d'
  66. fileID = b'\xb5\xe0\xf4\xd8\xe9\x1e\xf6i\xc4=^\xc2Y\xac\xdc\x88p\x8a+\x10t\x90\xa5\xc9\x1f\x98\xc61\xda\x7fH\x92'
  67. client.insert_file(file)
  68. client.retrieve_file(fileID)
  69. print("Basic insertion/retrieval fires correctly.")