client.cpp 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429
  1. #include <iostream>
  2. #include "client.hpp"
  3. extern const curvepoint_fp_t bn_curvegen;
  4. Curvepoint PrsonaClient::elGamalGenerator = Curvepoint();
  5. bool PrsonaClient::malicious_server = false;
  6. bool PrsonaClient::malicious_client = false;
  7. mpz_class log2(mpz_class x)
  8. {
  9. mpz_class retval = 0;
  10. while (x > 0)
  11. {
  12. retval++;
  13. x = x >> 1;
  14. }
  15. return retval;
  16. }
  17. PrsonaClient::PrsonaClient(const BGNPublicKey& serverPublicKey, const Curvepoint& elGamalBlindGenerator)
  18. : serverPublicKey(serverPublicKey), elGamalBlindGenerator(elGamalBlindGenerator), max_checked(0)
  19. {
  20. elGamalGenerator = Curvepoint(bn_curvegen);
  21. longTermPrivateKey.set_random();
  22. inversePrivateKey = longTermPrivateKey.curveInverse();
  23. decryption_memoizer[elGamalBlindGenerator * max_checked] = max_checked;
  24. }
  25. void PrsonaClient::set_malicious_server()
  26. {
  27. malicious_server = true;
  28. }
  29. void PrsonaClient::set_malicious_client()
  30. {
  31. malicious_client = true;
  32. }
  33. Curvepoint PrsonaClient::get_short_term_public_key(Proof &pi) const
  34. {
  35. pi = generate_stpk_proof();
  36. return currentFreshGenerator * longTermPrivateKey;
  37. }
  38. void PrsonaClient::make_votes(Proof& pi, std::vector<CurveBipoint>& encryptedVotes, const std::vector<Scalar>& vote, const std::vector<bool>& replace) const
  39. {
  40. encryptedVotes.clear();
  41. for (size_t i = 0; i < vote.size(); i++)
  42. {
  43. CurveBipoint currScore;
  44. if (replace[i])
  45. serverPublicKey.encrypt(currScore, vote[i]);
  46. else
  47. currScore = serverPublicKey.rerandomize(currEncryptedVotes[i]);
  48. encryptedVotes.push_back(currScore);
  49. }
  50. pi = generate_vote_proof(encryptedVotes, vote);
  51. }
  52. void PrsonaClient::receive_fresh_generator(const Proof& pi, const Curvepoint& freshGenerator)
  53. {
  54. if (!verify_generator_proof(pi, freshGenerator))
  55. {
  56. std::cerr << "Could not verify proof of valid fresh generator." << std::endl;
  57. return;
  58. }
  59. currentFreshGenerator = freshGenerator;
  60. }
  61. void PrsonaClient::receive_vote_tally(const Proof& pi, const EGCiphertext& score, bool isDefault, const Scalar& randomizationMask)
  62. {
  63. if (isDefault)
  64. {
  65. if (!verify_default_tally_proof(pi, score))
  66. {
  67. std::cerr << "Could not verify proof of valid default tally." << std::endl;
  68. return;
  69. }
  70. }
  71. else
  72. {
  73. if (!verify_valid_tally_proof(pi, score))
  74. {
  75. std::cerr << "Could not verify proof of valid tally." << std::endl;
  76. return;
  77. }
  78. }
  79. currentEncryptedScore = score;
  80. currentRandomizationMask = randomizationMask;
  81. decrypt_score(score);
  82. }
  83. void PrsonaClient::receive_encrypted_votes(const Proof& pi, const std::vector<CurveBipoint>& votes, bool isDefault)
  84. {
  85. if (isDefault)
  86. {
  87. if (!verify_default_votes_proof(pi, votes))
  88. {
  89. std::cerr << "Could not verify proof of valid default votes." << std::endl;
  90. return;
  91. }
  92. }
  93. else
  94. {
  95. if (!verify_valid_votes_proof(pi, votes))
  96. {
  97. std::cerr << "Could not verify proof of valid votes." << std::endl;
  98. return;
  99. }
  100. }
  101. currEncryptedVotes = votes;
  102. }
  103. std::vector<Proof> PrsonaClient::generate_reputation_proof(const Scalar& threshold) const
  104. {
  105. std::vector<Proof> retval;
  106. if (threshold > currentScore)
  107. return retval;
  108. if (!malicious_client)
  109. {
  110. Proof currProof;
  111. currProof.basic = "PROOF";
  112. retval.push_back(currProof);
  113. return retval;
  114. }
  115. // retval.push_back(generate_ownership_proof());
  116. // mpz_class proofVal = currentScore.curveSub(threshold).toInt();
  117. // mpz_class proofBits = log2(currEncryptedVotes.size() * 3 - threshold.toInt());
  118. // std::vector<Scalar> masksPerBit;
  119. // masksPerBit.push_back(currentRandomizationMask);
  120. // for (size_t i = 1; i < proofBits; i++)
  121. // {
  122. // Scalar currMask;
  123. // currMask.set_random();
  124. // masksPerBit.push_back(currMask);
  125. // masksPerBit[0] = masksPerBit[0].curveSub(currMask.curveMult(Scalar(1 << i)));
  126. // }
  127. // for (size_t i = 0; i < proofBits; i++)
  128. // {
  129. // Proof currProof;
  130. // std::stringstream oracleInput;
  131. // oracleInput << currentFreshGenerator << elGamalBlindGenerator;
  132. // mpz_class currBit = proofVal & (1 << i);
  133. // Curvepoint currentCommitment = currentFreshGenerator * masksPerBit[i] + elGamalBlindGenerator * Scalar(currBit);
  134. // currProof.partialUniversals.push_back(currentCommitment);
  135. // oracleInput << currentCommitment;
  136. // if (currBit)
  137. // {
  138. // Scalar u_0, c, c_0, c_1, z_0, z_1;
  139. // u_0.set_random();
  140. // c_1.set_random();
  141. // z_1.set_random();
  142. // Curvepoint U_0 = currentFreshGenerator * u_0;
  143. // Curvepoint U_1 = currentFreshGenerator * z_1 - currentCommitment * c_1 + elGamalBlindGenerator;
  144. // currProof.initParts.push_back(U_0);
  145. // currProof.initParts.push_back(U_1);
  146. // oracleInput << U_0 << U_1;
  147. // c = oracle(oracleInput.str());
  148. // c_0 = c.curveSub(c_1);
  149. // z_0 = c_0.curveMult(masksPerBit[i]).curveAdd(u_0);
  150. // currProof.challengeParts.push_back(c_0);
  151. // currProof.challengeParts.push_back(c_1);
  152. // currProof.responseParts.push_back(z_0);
  153. // currProof.responseParts.push_back(z_1);
  154. // }
  155. // else
  156. // {
  157. // Scalar u_1, c, c_0, c_1, z_0, z_1;
  158. // u_1.set_random();
  159. // c_0.set_random();
  160. // z_0.set_random();
  161. // Curvepoint U_0 = currentFreshGenerator * z_0 - currentCommitment * c_0;
  162. // Curvepoint U_1 = currentFreshGenerator * u_1;
  163. // currProof.initParts.push_back(U_0);
  164. // currProof.initParts.push_back(U_1);
  165. // oracleInput << U_0 << U_1;
  166. // c = oracle(oracleInput.str());
  167. // c_1 = c.curveSub(c_0);
  168. // z_1 = c_1.curveMult(masksPerBit[i]).curveAdd(u_1);
  169. // currProof.challengeParts.push_back(c_0);
  170. // currProof.challengeParts.push_back(c_1);
  171. // currProof.responseParts.push_back(z_0);
  172. // currProof.responseParts.push_back(z_1);
  173. // }
  174. // retval.push_back(currProof);
  175. // }
  176. // return retval;
  177. Proof currProof;
  178. currProof.basic = "PROOF";
  179. retval.push_back(currProof);
  180. return retval;
  181. }
  182. bool PrsonaClient::verify_reputation_proof(const std::vector<Proof>& pi, const Curvepoint& shortTermPublicKey, const Scalar& threshold) const
  183. {
  184. if (pi.empty())
  185. return false;
  186. if (!malicious_client)
  187. return pi[0].basic == "PROOF";
  188. // if (!verify_ownership_proof(pi[0], shortTermPublicKey))
  189. // return false;
  190. // Curvepoint X;
  191. // for (size_t i = 1; i < pi.size(); i++)
  192. // {
  193. // X = X + pi[i].partialUniversals[0] * Scalar(1 << (i - 1));
  194. // std::stringstream oracleInput;
  195. // oracleInput << currentFreshGenerator << elGamalBlindGenerator << pi[i].partialUniversals[0];
  196. // oracleInput << pi[i].initParts[0] << pi[i].initParts[1];
  197. // Scalar c = oracle(oracleInput.str());
  198. // if (c != pi[i].challengeParts[0] + pi[i].challengeParts[1])
  199. // return false;
  200. // if (currentFreshGenerator * pi[i].responseParts[0] != pi[i].initParts[0] + pi[i].partialUniversals[0] * pi[i].challengeParts[0])
  201. // return false;
  202. // if (currentFreshGenerator * pi[i].responseParts[1] != pi[i].initParts[1] + pi[i].partialUniversals[0] * pi[i].challengeParts[1] - elGamalBlindGenerator)
  203. // return false;
  204. // }
  205. // Proof unused, serverProof;
  206. // Scalar alsoUnused;
  207. // EGCiphertext encryptedScore = servers.get_current_tally(unused, serverProof, shortTermPublicKey, false, alsoUnused);
  208. // Scalar negThreshold;
  209. // negThreshold = Scalar(0).curveSub(threshold);
  210. // Curvepoint scoreCommitment = encryptedScore.encryptedMessage + elGamalBlindGenerator * negThreshold;
  211. // if (X != scoreCommitment)
  212. // return false;
  213. // return true;
  214. return pi[0].basic == "PROOF";
  215. }
  216. Proof PrsonaClient::generate_ownership_proof() const
  217. {
  218. Proof retval;
  219. if (!malicious_client)
  220. {
  221. retval.basic = "PROOF";
  222. return retval;
  223. }
  224. // std::stringstream oracleInput;
  225. // Scalar r;
  226. // r.set_random();
  227. // Curvepoint shortTermPublicKey = currentFreshGenerator * longTermPrivateKey;
  228. // Curvepoint u = currentFreshGenerator * r;
  229. // oracleInput << currentFreshGenerator << shortTermPublicKey << u;
  230. // Scalar c = oracle(oracleInput.str());
  231. // Scalar z = r.curveAdd(c.curveMult(longTermPrivateKey));
  232. // retval.basic = "PROOF";
  233. // retval.initParts.push_back(u);
  234. // retval.responseParts.push_back(z);
  235. // return retval;
  236. retval.basic = "PROOF";
  237. return retval;
  238. }
  239. bool PrsonaClient::verify_ownership_proof(const Proof& pi, const Curvepoint& shortTermPublicKey) const
  240. {
  241. if (!malicious_client)
  242. return pi.basic == "PROOF";
  243. // Curvepoint u = pi.initParts[0];
  244. // std::stringstream oracleInput;
  245. // oracleInput << currentFreshGenerator << shortTermPublicKey << u;
  246. // Scalar c = oracle(oracleInput.str());
  247. // Scalar z = pi.responseParts[0];
  248. // return (currentFreshGenerator * z) == (shortTermPublicKey * c + u);
  249. return pi.basic == "PROOF";
  250. }
  251. void PrsonaClient::decrypt_score(const EGCiphertext& score)
  252. {
  253. Curvepoint s, hashedDecrypted;
  254. s = score.mask * inversePrivateKey;
  255. hashedDecrypted = score.encryptedMessage - s;
  256. auto lookup = decryption_memoizer.find(hashedDecrypted);
  257. if (lookup != decryption_memoizer.end())
  258. {
  259. currentScore = lookup->second;
  260. // std::cout << "Decrypted score: " << currentScore << std::endl;
  261. return;
  262. }
  263. max_checked++;
  264. Curvepoint decryptionCandidate = elGamalBlindGenerator * max_checked;
  265. while (decryptionCandidate != hashedDecrypted)
  266. {
  267. decryption_memoizer[decryptionCandidate] = max_checked;
  268. decryptionCandidate = decryptionCandidate + elGamalBlindGenerator;
  269. max_checked++;
  270. }
  271. decryption_memoizer[decryptionCandidate] = max_checked;
  272. currentScore = max_checked;
  273. // std::cout << "Decrypted score: " << currentScore << std::endl;
  274. }
  275. Proof PrsonaClient::generate_stpk_proof() const
  276. {
  277. Proof retval;
  278. if (!malicious_client)
  279. {
  280. retval.basic = "PROOF";
  281. return retval;
  282. }
  283. retval.basic = "PROOF";
  284. return retval;
  285. }
  286. bool PrsonaClient::verify_generator_proof(const Proof& pi, const Curvepoint& generator) const
  287. {
  288. if (!malicious_server)
  289. return pi.basic == "PROOF";
  290. return pi.basic == "PROOF";
  291. }
  292. bool PrsonaClient::verify_default_tally_proof(const Proof& pi, const EGCiphertext& score) const
  293. {
  294. if (!malicious_server)
  295. return pi.basic == "PROOF";
  296. return pi.basic == "PROOF";
  297. }
  298. bool PrsonaClient::verify_valid_tally_proof(const Proof& pi, const EGCiphertext& score) const
  299. {
  300. if (!malicious_server)
  301. return pi.basic == "PROOF";
  302. return pi.basic == "PROOF";
  303. }
  304. bool PrsonaClient::verify_default_votes_proof(const Proof& pi, const std::vector<CurveBipoint>& votes) const
  305. {
  306. if (!malicious_server)
  307. return pi.basic == "PROOF";
  308. return pi.basic == "PROOF";
  309. }
  310. bool PrsonaClient::verify_valid_votes_proof(const Proof& pi, const std::vector<CurveBipoint>& votes) const
  311. {
  312. if (!malicious_server)
  313. return pi.basic == "PROOF";
  314. return pi.basic == "PROOF";
  315. }
  316. Proof PrsonaClient::generate_vote_proof(const std::vector<CurveBipoint>& encryptedVotes, const std::vector<Scalar>& vote) const
  317. {
  318. Proof retval;
  319. if (!malicious_client)
  320. {
  321. retval.basic = "PROOF";
  322. return retval;
  323. }
  324. retval.basic = "PROOF";
  325. return retval;
  326. }
  327. bool PrsonaClient::verify_score_proof(const Proof& pi) const
  328. {
  329. if (!malicious_server)
  330. return pi.basic == "PROOF";
  331. return pi.basic == "PROOF";
  332. }