|
|
@@ -20,40 +20,100 @@ cryptoContext.Enable(PKESchemeFeature.LEVELEDSHE)
|
|
|
# Serialize cryptocontext
|
|
|
if not SerializeToFile(datafolder + "/cryptocontext.txt", cryptoContext, BINARY):
|
|
|
raise Exception("Error writing serialization of the crypto context to cryptocontext.txt")
|
|
|
-
|
|
|
print("The cryptocontext has been serialized.")
|
|
|
|
|
|
# Sample Program: Step 2: Key Generation
|
|
|
|
|
|
# Generate a public/private key pair
|
|
|
keypair = cryptoContext.KeyGen()
|
|
|
-
|
|
|
print("The keypair has been generated.")
|
|
|
|
|
|
# Serialize the public key
|
|
|
if not SerializeToFile(datafolder + "/key-public.txt", keypair.publicKey, BINARY):
|
|
|
raise Exception("Error writing serialization of the public key to key-public.txt")
|
|
|
-
|
|
|
print("The public key has been serialized.")
|
|
|
|
|
|
# Serialize the secret key
|
|
|
if not SerializeToFile(datafolder + "/key-secret.txt", keypair.secretKey, BINARY):
|
|
|
raise Exception("Error writing serialization of the secret key to key-secret.txt")
|
|
|
-
|
|
|
print("The secret key has been serialized.")
|
|
|
|
|
|
# Generate the relinearization key
|
|
|
cryptoContext.EvalMultKeyGen(keypair.secretKey)
|
|
|
-
|
|
|
print("The relinearization key has been generated.")
|
|
|
|
|
|
# Serialize the relinearization key
|
|
|
-
|
|
|
if not cryptoContext.SerializeEvalMultKey(datafolder + "/key-relin.txt",BINARY):
|
|
|
raise Exception("Error writing serialization of the eval mult keys to \"key-eval-mult.txt\"")
|
|
|
-
|
|
|
print("The relinearization key has been serialized.")
|
|
|
|
|
|
+# Generate the rotation evaluation keys
|
|
|
+cryptoContext.EvalRotateKeyGen(keypair.secretKey, [1, 2, -1, -2])
|
|
|
+print("The rotation evaluation keys have been generated.")
|
|
|
+
|
|
|
+# Serialize the rotation evaluation keys
|
|
|
+if not cryptoContext.SerializeEvalAutomorphismKey(datafolder + "/key-eval-rot.txt",BINARY):
|
|
|
+ raise Exception("Error writing serialization of the eval rotate keys to \"key-eval-rot.txt\"")
|
|
|
+print("The rotation evaluation keys have been serialized.")
|
|
|
+
|
|
|
+# Sample Program: Step 3: Encryption
|
|
|
+
|
|
|
+# First plaintext vector is encoded
|
|
|
+vectorOfInts1 = [1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12]
|
|
|
+plaintext1 = cryptoContext.MakePackedPlaintext(vectorOfInts1)
|
|
|
+
|
|
|
+# Second plaintext vector is encoded
|
|
|
+vectorOfInts2 = [3, 2, 1, 4, 5, 6, 7, 8, 9, 10, 11, 12]
|
|
|
+plaintext2 = cryptoContext.MakePackedPlaintext(vectorOfInts2)
|
|
|
+
|
|
|
+# Third plaintext vector is encoded
|
|
|
+vectorOfInts3 = [1, 2, 5, 2, 5, 6, 7, 8, 9, 10, 11, 12]
|
|
|
+plaintext3 = cryptoContext.MakePackedPlaintext(vectorOfInts3)
|
|
|
+
|
|
|
+
|
|
|
+# The encoded vectors are encrypted
|
|
|
+ciphertext1 = cryptoContext.Encrypt(keypair.publicKey, plaintext1)
|
|
|
+ciphertext2 = cryptoContext.Encrypt(keypair.publicKey, plaintext2)
|
|
|
+ciphertext3 = cryptoContext.Encrypt(keypair.publicKey, plaintext3)
|
|
|
+print("The plaintexts have been encrypted.")
|
|
|
+
|
|
|
+if not SerializeToFile(datafolder + "/ciphertext1.txt", ciphertext1, BINARY):
|
|
|
+ raise Exception("Error writing serialization of ciphertext 1 to ciphertext1.txt")
|
|
|
+print("The first ciphertext has been serialized.")
|
|
|
+
|
|
|
+if not SerializeToFile(datafolder + "/ciphertext2.txt", ciphertext2, BINARY):
|
|
|
+ raise Exception("Error writing serialization of ciphertext2 to ciphertext2.txt")
|
|
|
+print("The second ciphertext has been serialized.")
|
|
|
+
|
|
|
+if not SerializeToFile(datafolder + "/ciphertext3.txt", ciphertext3, BINARY):
|
|
|
+ raise Exception("Error writing serialization of ciphertext3 to ciphertext3.txt")
|
|
|
+print("The third ciphertext has been serialized.")
|
|
|
+
|
|
|
+# Sample Program: Step 4: Evaluation
|
|
|
+
|
|
|
+# OpenFHE maintains an internal map of CryptoContext objects which are
|
|
|
+# indexed by a tag and the tag is applied to both the CryptoContext and some
|
|
|
+# of the keys. When deserializing a context, OpenFHE checks for the tag and
|
|
|
+# if it finds it in the CryptoContext map, it will return the stored version.
|
|
|
+# Hence, we need to clear the context and clear the keys.
|
|
|
+cryptoContext.ClearEvalMultKeys()
|
|
|
+cryptoContext.ClearEvalAutomorphismKeys()
|
|
|
+ReleaseAllContexts()
|
|
|
+
|
|
|
+# Deserialize the crypto context
|
|
|
+cc = CryptoContext()
|
|
|
+
|
|
|
+if not DeserializeFromFile(datafolder + "/cryptocontext.txt", cc, BINARY):
|
|
|
+ raise Exception("Error reading serialization of the crypto context from cryptocontext.txt")
|
|
|
+print("The cryptocontext has been deserialized.")
|
|
|
+
|
|
|
+# Deserialize the public key
|
|
|
+pk = PublicKey()
|
|
|
+
|
|
|
+if not DeserializeFromFile(datafolder + "/key-public.txt", pk, BINARY):
|
|
|
+ raise Exception("Error reading serialization of the public key from key-public.txt")
|
|
|
+
|
|
|
+
|
|
|
|
|
|
|
|
|
|