Eviction.java 13 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407
  1. package protocols;
  2. import java.util.Arrays;
  3. import com.oblivm.backend.flexsc.CompEnv;
  4. import com.oblivm.backend.gc.GCSignal;
  5. import com.oblivm.backend.gc.regular.GCEva;
  6. import com.oblivm.backend.gc.regular.GCGen;
  7. import com.oblivm.backend.network.Network;
  8. import communication.Communication;
  9. import crypto.Crypto;
  10. import gc.GCRoute;
  11. import gc.GCUtil;
  12. import oram.Bucket;
  13. import oram.Forest;
  14. import oram.Metadata;
  15. import oram.Tree;
  16. import oram.Tuple;
  17. import struct.Party;
  18. import subprotocols.PermuteIndex;
  19. import subprotocols.PermuteTarget;
  20. import subprotocols.SSXOT;
  21. import util.M;
  22. import util.P;
  23. import util.Util;
  24. // TODO: set bucket on path
  25. public class Eviction extends Protocol {
  26. int pid = P.EVI;
  27. public Eviction(Communication con1, Communication con2) {
  28. super(con1, con2);
  29. online_band = all.online_band[pid];
  30. offline_band = all.offline_band[pid];
  31. timer = all.timer[pid];
  32. }
  33. private int[] prepareEviction(int[] target, int[] ti, int W) {
  34. int d = ti.length;
  35. int[] evict = new int[W * d];
  36. for (int r = 0; r < d; r++) {
  37. int tupleIndex = r * W + ti[r];
  38. for (int c = 0; c < W; c++) {
  39. int currIndex = r * W + c;
  40. if (currIndex == tupleIndex) {
  41. int targetIndex = target[r] * W + ti[target[r]];
  42. evict[targetIndex] = currIndex;
  43. } else
  44. evict[currIndex] = currIndex;
  45. }
  46. }
  47. return evict;
  48. }
  49. public void runE(boolean firstTree, int[] tupleParam, byte[] Li, Tuple[] originalPath, Tree OTi) {
  50. if (firstTree) {
  51. // OTi.setBucketsOnPath(new BigInteger(1, Li).longValue(), new Bucket[] { new
  52. // Bucket(originalPath) });
  53. return;
  54. }
  55. timer.start(M.offline_comp);
  56. // GC
  57. int d = OTi.getD();
  58. int sw = OTi.getStashSize();
  59. int w = OTi.getW();
  60. int logW = (int) Math.ceil(Math.log(w + 1) / Math.log(2));
  61. GCSignal[][] evict_LiKeyPairs = GCUtil.genKeyPairs(d - 1);
  62. GCSignal[] LiZeroKeys = GCUtil.getZeroKeys(evict_LiKeyPairs);
  63. GCSignal[][][] evict_E_feKeyPairs = new GCSignal[d][][];
  64. GCSignal[][][] evict_C_feKeyPairs = new GCSignal[d][][];
  65. GCSignal[][] E_feZeroKeys = new GCSignal[d][];
  66. GCSignal[][] C_feZeroKeys = new GCSignal[d][];
  67. GCSignal[][][][] evict_E_labelKeyPairs = new GCSignal[d][w][][];
  68. GCSignal[][][][] evict_C_labelKeyPairs = new GCSignal[d][w][][];
  69. GCSignal[][][] E_labelZeroKeys = new GCSignal[d][w][];
  70. GCSignal[][][] C_labelZeroKeys = new GCSignal[d][w][];
  71. GCSignal[][][] evict_deltaKeyPairs = new GCSignal[d][][];
  72. GCSignal[][] deltaZeroKeys = new GCSignal[d][];
  73. for (int i = 0; i < d; i++) {
  74. evict_E_feKeyPairs[i] = GCUtil.genKeyPairs(w);
  75. evict_C_feKeyPairs[i] = GCUtil.genKeyPairs(w);
  76. E_feZeroKeys[i] = GCUtil.getZeroKeys(evict_E_feKeyPairs[i]);
  77. C_feZeroKeys[i] = GCUtil.getZeroKeys(evict_C_feKeyPairs[i]);
  78. evict_deltaKeyPairs[i] = GCUtil.genKeyPairs(logW);
  79. deltaZeroKeys[i] = GCUtil.getZeroKeys(evict_deltaKeyPairs[i]);
  80. for (int j = 0; j < w; j++) {
  81. evict_E_labelKeyPairs[i][j] = GCUtil.genKeyPairs(d - 1);
  82. evict_C_labelKeyPairs[i][j] = GCUtil.genKeyPairs(d - 1);
  83. E_labelZeroKeys[i][j] = GCUtil.getZeroKeys(evict_E_labelKeyPairs[i][j]);
  84. C_labelZeroKeys[i][j] = GCUtil.getZeroKeys(evict_C_labelKeyPairs[i][j]);
  85. }
  86. }
  87. Network channel = new Network(null, con1);
  88. CompEnv<GCSignal> gen = new GCGen(channel, timer, offline_band, M.offline_write);
  89. GCSignal[][][] outZeroKeys = new GCRoute<GCSignal>(gen, d, w).routing(LiZeroKeys, E_feZeroKeys, C_feZeroKeys,
  90. E_labelZeroKeys, C_labelZeroKeys, deltaZeroKeys);
  91. ((GCGen) gen).sendLastSetGTT();
  92. byte[][][] evict_tiOutKeyHashes = new byte[d][][];
  93. GCSignal[][][] evict_targetOutKeyPairs = new GCSignal[d][][];
  94. for (int i = 0; i < d; i++) {
  95. evict_tiOutKeyHashes[i] = GCUtil.genOutKeyHashes(outZeroKeys[1][i]);
  96. evict_targetOutKeyPairs[i] = GCUtil.recoverOutKeyPairs(outZeroKeys[0][i]);
  97. }
  98. timer.start(M.offline_write);
  99. con2.write(offline_band, evict_C_feKeyPairs);
  100. con2.write(offline_band, evict_C_labelKeyPairs);
  101. con1.write(offline_band, evict_tiOutKeyHashes);
  102. timer.stop(M.offline_write);
  103. // Permutation
  104. int[] evict_pi = Util.randomPermutation(d, Crypto.sr_CE);
  105. byte[][] evict_delta = new byte[d][(logW + 7) / 8];
  106. byte[][] evict_rho = new byte[d][(logW + 7) / 8];
  107. int[][] evict_delta_p = new int[d][];
  108. int[][] evict_rho_p = new int[d][];
  109. for (int i = 0; i < d; i++) {
  110. Crypto.sr_CE.nextBytes(evict_delta[i]);
  111. Crypto.sr_CE.nextBytes(evict_rho[i]);
  112. evict_delta_p[i] = Util.getXorPermutation(evict_delta[i], logW);
  113. evict_rho_p[i] = Util.getXorPermutation(evict_rho[i], logW);
  114. }
  115. timer.stop(M.offline_comp);
  116. ///////////////////////////////////////////////////////////////////
  117. timer.start(M.online_comp);
  118. Tuple[] pathTuples = new Tuple[d * w];
  119. System.arraycopy(originalPath, 0, pathTuples, 0, w);
  120. System.arraycopy(originalPath, sw, pathTuples, w, (d - 1) * w);
  121. Bucket[] pathBuckets = Bucket.tuplesToBuckets(pathTuples, d, w, w);
  122. GCSignal[] LiInputKeys = GCUtil.revSelectKeys(evict_LiKeyPairs, Li);
  123. GCSignal[][] E_feInputKeys = new GCSignal[d][];
  124. GCSignal[][][] E_labelInputKeys = new GCSignal[d][][];
  125. GCSignal[][] deltaInputKeys = new GCSignal[d][];
  126. for (int i = 0; i < d; i++) {
  127. E_feInputKeys[i] = GCUtil.selectFeKeys(evict_E_feKeyPairs[i], pathBuckets[i].getTuples());
  128. E_labelInputKeys[i] = GCUtil.selectLabelKeys(evict_E_labelKeyPairs[i], pathBuckets[i].getTuples());
  129. deltaInputKeys[i] = GCUtil.revSelectKeys(evict_deltaKeyPairs[i], evict_delta[i]);
  130. }
  131. timer.start(M.online_write);
  132. con1.write(online_band, LiInputKeys);
  133. con1.write(online_band, E_feInputKeys);
  134. con1.write(online_band, E_labelInputKeys);
  135. con1.write(online_band, deltaInputKeys);
  136. timer.stop(M.online_write);
  137. PermuteTarget permutetarget = new PermuteTarget(con1, con2);
  138. permutetarget.runE(d, evict_pi, evict_targetOutKeyPairs);
  139. PermuteIndex permuteindex = new PermuteIndex(con1, con2);
  140. permuteindex.runE(w, evict_pi);
  141. int W = (int) Math.pow(2, logW);
  142. for (int i = 0; i < d; i++) {
  143. pathBuckets[i].expand(W);
  144. pathBuckets[i].permute(evict_delta_p[i]);
  145. }
  146. pathBuckets = Util.permute(pathBuckets, evict_pi);
  147. for (int i = 0; i < d; i++) {
  148. pathBuckets[i].permute(evict_rho_p[i]);
  149. }
  150. pathTuples = Bucket.bucketsToTuples(pathBuckets);
  151. SSXOT ssxot = new SSXOT(con1, con2);
  152. pathTuples = ssxot.runE(pathTuples, tupleParam);
  153. pathBuckets = Bucket.tuplesToBuckets(pathTuples, d, W, W);
  154. for (int i = 0; i < d; i++) {
  155. int[] rho_ivs = Util.inversePermutation(evict_rho_p[i]);
  156. pathBuckets[i].permute(rho_ivs);
  157. }
  158. int[] pi_ivs = Util.inversePermutation(evict_pi);
  159. pathBuckets = Util.permute(pathBuckets, pi_ivs);
  160. for (int i = 0; i < d; i++) {
  161. int[] delta_ivs = Util.inversePermutation(evict_delta_p[i]);
  162. pathBuckets[i].permute(delta_ivs);
  163. pathBuckets[i].shrink(w);
  164. }
  165. pathBuckets[0].expand(Arrays.copyOfRange(originalPath, w, sw));
  166. // OTi.setBucketsOnPath(new BigInteger(1, Li).longValue(), pathBuckets);
  167. timer.stop(M.online_comp);
  168. }
  169. public void runD(boolean firstTree, int[] tupleParam, byte[] Li, Tree OTi) {
  170. if (firstTree) {
  171. timer.start(M.online_read);
  172. // Tuple[] originalPath = con2.readTupleArrayAndDec();
  173. timer.stop(M.online_read);
  174. // OTi.setBucketsOnPath(new BigInteger(1, Li).longValue(), new Bucket[] { new
  175. // Bucket(originalPath) });
  176. return;
  177. }
  178. timer.start(M.offline_comp);
  179. // GC
  180. int d = OTi.getD();
  181. int w = OTi.getW();
  182. int logW = (int) Math.ceil(Math.log(w + 1) / Math.log(2));
  183. GCSignal[] LiZeroKeys = GCUtil.genEmptyKeys(d - 1);
  184. GCSignal[][] E_feZeroKeys = new GCSignal[d][];
  185. GCSignal[][] C_feZeroKeys = new GCSignal[d][];
  186. GCSignal[][][] E_labelZeroKeys = new GCSignal[d][w][];
  187. GCSignal[][][] C_labelZeroKeys = new GCSignal[d][w][];
  188. GCSignal[][] deltaZeroKeys = new GCSignal[d][];
  189. for (int i = 0; i < d; i++) {
  190. E_feZeroKeys[i] = GCUtil.genEmptyKeys(w);
  191. C_feZeroKeys[i] = GCUtil.genEmptyKeys(w);
  192. deltaZeroKeys[i] = GCUtil.genEmptyKeys(logW);
  193. for (int j = 0; j < w; j++) {
  194. E_labelZeroKeys[i][j] = GCUtil.genEmptyKeys(d - 1);
  195. C_labelZeroKeys[i][j] = GCUtil.genEmptyKeys(d - 1);
  196. }
  197. }
  198. Network channel = new Network(con1, null);
  199. CompEnv<GCSignal> eva = new GCEva(channel, timer, M.offline_read);
  200. GCRoute<GCSignal> evict_gcroute = new GCRoute<GCSignal>(eva, d, w);
  201. evict_gcroute.routing(LiZeroKeys, E_feZeroKeys, C_feZeroKeys, E_labelZeroKeys, C_labelZeroKeys, deltaZeroKeys);
  202. ((GCEva) eva).receiveLastSetGTT();
  203. eva.setEvaluate();
  204. timer.start(M.offline_read);
  205. byte[][][] evict_tiOutKeyHashes = con1.readTripleByteArrayAndDec();
  206. timer.stop(M.offline_read);
  207. timer.stop(M.offline_comp);
  208. //////////////////////////////////////////////////////////////////////
  209. timer.start(M.online_comp);
  210. timer.start(M.online_read);
  211. GCSignal[] LiInputKeys = con1.readGCSignalArrayAndDec();
  212. GCSignal[][] E_feInputKeys = con1.readDoubleGCSignalArrayAndDec();
  213. GCSignal[][][] E_labelInputKeys = con1.readTripleGCSignalArrayAndDec();
  214. GCSignal[][] deltaInputKeys = con1.readDoubleGCSignalArrayAndDec();
  215. GCSignal[][] C_feInputKeys = con2.readDoubleGCSignalArrayAndDec();
  216. GCSignal[][][] C_labelInputKeys = con2.readTripleGCSignalArrayAndDec();
  217. timer.stop(M.online_read);
  218. GCSignal[][][] outKeys = evict_gcroute.routing(LiInputKeys, E_feInputKeys, C_feInputKeys, E_labelInputKeys,
  219. C_labelInputKeys, deltaInputKeys);
  220. byte[][] ti_p = new byte[deltaInputKeys.length][];
  221. for (int i = 0; i < ti_p.length; i++) {
  222. ti_p[i] = Util.padArray(GCUtil.evaOutKeys(outKeys[1][i], evict_tiOutKeyHashes[i]).toByteArray(),
  223. (logW + 7) / 8);
  224. }
  225. PermuteTarget permutetarget = new PermuteTarget(con1, con2);
  226. int[] target_pp = permutetarget.runD(firstTree, outKeys[0]);
  227. PermuteIndex permuteindex = new PermuteIndex(con1, con2);
  228. int[] ti_pp = permuteindex.runD(firstTree, ti_p, w);
  229. int W = (int) Math.pow(2, logW);
  230. int[] evict = prepareEviction(target_pp, ti_pp, W);
  231. SSXOT ssxot = new SSXOT(con1, con2);
  232. ssxot.runD(evict.length, evict.length, tupleParam, evict);
  233. timer.start(M.online_read);
  234. // Bucket[] pathBuckets = con2.readBucketArrayAndDec();
  235. timer.stop(M.online_read);
  236. // OTi.setBucketsOnPath(new BigInteger(1, Li).longValue(), pathBuckets);
  237. timer.stop(M.online_comp);
  238. }
  239. public void runC(boolean firstTree, int[] tupleParam, Tuple[] originalPath, int d, int sw, int w) {
  240. if (firstTree) {
  241. timer.start(M.online_write);
  242. // con2.write(online_band, originalPath);
  243. timer.stop(M.online_write);
  244. return;
  245. }
  246. timer.start(M.offline_comp);
  247. // GC
  248. timer.start(M.offline_read);
  249. GCSignal[][][] evict_C_feKeyPairs = con1.readTripleGCSignalArrayAndDec();
  250. GCSignal[][][][] evict_C_labelKeyPairs = con1.readQuadGCSignalArrayAndDec();
  251. timer.stop(M.offline_read);
  252. // Permutation
  253. int logW = (int) Math.ceil(Math.log(w + 1) / Math.log(2));
  254. int[] evict_pi = Util.randomPermutation(d, Crypto.sr_CE);
  255. byte[][] evict_delta = new byte[d][(logW + 7) / 8];
  256. byte[][] evict_rho = new byte[d][(logW + 7) / 8];
  257. int[][] evict_delta_p = new int[d][];
  258. int[][] evict_rho_p = new int[d][];
  259. for (int i = 0; i < d; i++) {
  260. Crypto.sr_CE.nextBytes(evict_delta[i]);
  261. Crypto.sr_CE.nextBytes(evict_rho[i]);
  262. evict_delta_p[i] = Util.getXorPermutation(evict_delta[i], logW);
  263. evict_rho_p[i] = Util.getXorPermutation(evict_rho[i], logW);
  264. }
  265. timer.stop(M.offline_comp);
  266. ///////////////////////////////////////////////////////////////
  267. timer.start(M.online_comp);
  268. Tuple[] pathTuples = new Tuple[d * w];
  269. System.arraycopy(originalPath, 0, pathTuples, 0, w);
  270. System.arraycopy(originalPath, sw, pathTuples, w, (d - 1) * w);
  271. Bucket[] pathBuckets = Bucket.tuplesToBuckets(pathTuples, d, w, w);
  272. GCSignal[][] C_feInputKeys = new GCSignal[d][];
  273. GCSignal[][][] C_labelInputKeys = new GCSignal[d][][];
  274. for (int i = 0; i < d; i++) {
  275. C_feInputKeys[i] = GCUtil.selectFeKeys(evict_C_feKeyPairs[i], pathBuckets[i].getTuples());
  276. C_labelInputKeys[i] = GCUtil.selectLabelKeys(evict_C_labelKeyPairs[i], pathBuckets[i].getTuples());
  277. }
  278. timer.start(M.online_write);
  279. con2.write(online_band, C_feInputKeys);
  280. con2.write(online_band, C_labelInputKeys);
  281. timer.stop(M.online_write);
  282. PermuteTarget permutetarget = new PermuteTarget(con1, con2);
  283. permutetarget.runC(firstTree, d, evict_pi);
  284. PermuteIndex permuteindex = new PermuteIndex(con1, con2);
  285. permuteindex.runC(firstTree, w, evict_pi, evict_rho);
  286. int W = (int) Math.pow(2, logW);
  287. for (int i = 0; i < d; i++) {
  288. pathBuckets[i].expand(W);
  289. pathBuckets[i].permute(evict_delta_p[i]);
  290. }
  291. pathBuckets = Util.permute(pathBuckets, evict_pi);
  292. for (int i = 0; i < d; i++) {
  293. pathBuckets[i].permute(evict_rho_p[i]);
  294. }
  295. pathTuples = Bucket.bucketsToTuples(pathBuckets);
  296. SSXOT ssxot = new SSXOT(con1, con2);
  297. pathTuples = ssxot.runC(pathTuples, tupleParam);
  298. pathBuckets = Bucket.tuplesToBuckets(pathTuples, d, W, W);
  299. for (int i = 0; i < d; i++) {
  300. int[] rho_ivs = Util.inversePermutation(evict_rho_p[i]);
  301. pathBuckets[i].permute(rho_ivs);
  302. }
  303. int[] pi_ivs = Util.inversePermutation(evict_pi);
  304. pathBuckets = Util.permute(pathBuckets, pi_ivs);
  305. for (int i = 0; i < d; i++) {
  306. int[] delta_ivs = Util.inversePermutation(evict_delta_p[i]);
  307. pathBuckets[i].permute(delta_ivs);
  308. pathBuckets[i].shrink(w);
  309. }
  310. pathBuckets[0].expand(Arrays.copyOfRange(originalPath, w, sw));
  311. timer.start(M.online_write);
  312. // con2.write(online_band, pathBuckets);
  313. timer.stop(M.online_write);
  314. timer.stop(M.online_comp);
  315. }
  316. @Override
  317. public void run(Party party, Metadata md, Forest[] forest) {
  318. System.out.println("Use PIRRetrieve to test Eviction");
  319. }
  320. @Override
  321. public void run(Party party, Metadata md, Forest forest) {
  322. }
  323. }