2016-06-12 01:14:56 +02:00
|
|
|
/* This file is part of libbrandt.
|
|
|
|
* Copyright (C) 2016 GNUnet e.V.
|
|
|
|
*
|
|
|
|
* libbrandt is free software: you can redistribute it and/or modify it under
|
|
|
|
* the terms of the GNU General Public License as published by the Free Software
|
|
|
|
* Foundation, either version 3 of the License, or (at your option) any later
|
|
|
|
* version.
|
|
|
|
*
|
|
|
|
* libbrandt is distributed in the hope that it will be useful, but WITHOUT ANY
|
|
|
|
* WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR
|
|
|
|
* A PARTICULAR PURPOSE. See the GNU General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License along with
|
|
|
|
* libbrandt. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* @file crypto.c
|
|
|
|
* @brief Implementation of the crypto primitives.
|
2016-06-22 23:18:46 +02:00
|
|
|
* @author Markus Teich
|
2016-06-12 01:14:56 +02:00
|
|
|
*/
|
|
|
|
|
2016-08-16 20:58:20 +02:00
|
|
|
#include "platform.h"
|
2016-06-19 22:37:31 +02:00
|
|
|
|
|
|
|
#include <gcrypt.h>
|
2016-06-12 01:14:56 +02:00
|
|
|
|
|
|
|
#include "crypto.h"
|
2016-06-19 22:37:31 +02:00
|
|
|
#include "internals.h"
|
2016-06-12 01:14:56 +02:00
|
|
|
#include "util.h"
|
|
|
|
|
2016-08-16 20:58:20 +02:00
|
|
|
|
2016-06-12 01:14:56 +02:00
|
|
|
#define CURVE "Ed25519"
|
|
|
|
|
2016-06-12 20:52:22 +02:00
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
struct zkp_challenge_dl {
|
|
|
|
struct ec_mpi g;
|
|
|
|
struct ec_mpi v;
|
|
|
|
struct ec_mpi a;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct zkp_challenge_2dle {
|
|
|
|
struct ec_mpi g1;
|
|
|
|
struct ec_mpi g2;
|
|
|
|
struct ec_mpi v;
|
|
|
|
struct ec_mpi w;
|
|
|
|
struct ec_mpi a;
|
|
|
|
struct ec_mpi b;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct zkp_challenge_0og {
|
|
|
|
struct ec_mpi g;
|
|
|
|
struct ec_mpi alpha;
|
|
|
|
struct ec_mpi beta;
|
|
|
|
struct ec_mpi a1;
|
|
|
|
struct ec_mpi a2;
|
|
|
|
struct ec_mpi b1;
|
|
|
|
struct ec_mpi b2;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2016-09-29 18:22:21 +02:00
|
|
|
gcry_ctx_t ec_ctx = NULL;
|
|
|
|
gcry_mpi_point_t ec_gen = NULL;
|
|
|
|
gcry_mpi_point_t ec_zero = NULL;
|
|
|
|
gcry_mpi_t ec_n = NULL;
|
|
|
|
struct GNUNET_CRYPTO_EccDlogContext *ec_dlogctx = NULL;
|
2016-06-12 20:52:22 +02:00
|
|
|
|
|
|
|
|
2016-06-13 21:09:41 +02:00
|
|
|
/**
|
2016-06-20 00:36:18 +02:00
|
|
|
* brandt_crypto_init initializes the crypto system and must be called before
|
|
|
|
* any other function from this file.
|
2016-08-03 12:26:51 +02:00
|
|
|
*
|
2016-07-13 14:01:24 +02:00
|
|
|
* @param[in] dlogctx Pointer to the prepared dlog context.
|
2016-06-13 21:09:41 +02:00
|
|
|
*/
|
2016-06-12 20:52:22 +02:00
|
|
|
void
|
2016-07-13 14:08:49 +02:00
|
|
|
brandt_crypto_init (struct GNUNET_CRYPTO_EccDlogContext *dlogctx)
|
2016-06-12 20:52:22 +02:00
|
|
|
{
|
|
|
|
gcry_error_t rc;
|
|
|
|
|
2016-07-13 14:01:24 +02:00
|
|
|
ec_dlogctx = dlogctx;
|
|
|
|
|
2016-06-12 20:52:22 +02:00
|
|
|
rc = gcry_mpi_ec_new (&ec_ctx, NULL, CURVE);
|
|
|
|
brandt_assert_gpgerr (rc);
|
2016-06-16 00:09:29 +02:00
|
|
|
|
2016-06-12 20:52:22 +02:00
|
|
|
ec_gen = gcry_mpi_ec_get_point ("g", ec_ctx, 0);
|
|
|
|
brandt_assert (NULL != ec_gen);
|
2016-06-16 00:09:29 +02:00
|
|
|
|
|
|
|
ec_zero = gcry_mpi_point_new (0);
|
|
|
|
brandt_assert (NULL != ec_zero);
|
|
|
|
gcry_mpi_ec_sub (ec_zero, ec_gen, ec_gen, ec_ctx);
|
|
|
|
|
|
|
|
ec_n = gcry_mpi_ec_get_mpi ("n", ec_ctx, 1);
|
|
|
|
brandt_assert (NULL != ec_n);
|
2016-06-12 20:52:22 +02:00
|
|
|
}
|
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
|
2016-06-12 20:52:22 +02:00
|
|
|
/* --- EC --- */
|
2016-06-12 01:14:56 +02:00
|
|
|
|
2016-06-13 21:09:41 +02:00
|
|
|
/**
|
2016-06-19 22:37:31 +02:00
|
|
|
* ec_skey_create
|
2016-06-13 21:09:41 +02:00
|
|
|
*
|
2016-06-19 18:42:19 +02:00
|
|
|
* @param[out] skey where to store the generated secret key. This has to be an
|
|
|
|
* already initialized mpi.
|
2016-06-13 21:09:41 +02:00
|
|
|
*/
|
2016-06-12 01:14:56 +02:00
|
|
|
void
|
2016-06-19 22:37:31 +02:00
|
|
|
ec_skey_create (gcry_mpi_t skey)
|
2016-06-12 01:14:56 +02:00
|
|
|
{
|
2016-06-16 00:09:29 +02:00
|
|
|
gcry_mpi_t ret;
|
2016-06-12 01:14:56 +02:00
|
|
|
gcry_sexp_t s_keyparam;
|
2016-06-12 20:52:22 +02:00
|
|
|
gcry_sexp_t priv_sexp;
|
2016-06-16 00:09:29 +02:00
|
|
|
gcry_sexp_t priv_key;
|
|
|
|
gcry_sexp_t priv_key2;
|
2016-06-12 01:14:56 +02:00
|
|
|
gcry_error_t rc;
|
|
|
|
|
|
|
|
rc = gcry_sexp_build (&s_keyparam, NULL, "(genkey(ecc(curve \"" CURVE "\")"
|
2016-06-12 20:52:22 +02:00
|
|
|
"(flags)))");
|
|
|
|
brandt_assert_gpgerr (rc);
|
2016-06-13 21:01:14 +02:00
|
|
|
|
2016-06-12 20:52:22 +02:00
|
|
|
rc = gcry_pk_genkey (&priv_sexp, s_keyparam);
|
|
|
|
brandt_assert_gpgerr (rc);
|
2016-06-12 01:14:56 +02:00
|
|
|
gcry_sexp_release (s_keyparam);
|
2016-06-13 21:01:14 +02:00
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
priv_key = gcry_sexp_find_token (priv_sexp, "private-key", 11);
|
|
|
|
brandt_assert (NULL != priv_key);
|
2016-06-12 01:14:56 +02:00
|
|
|
gcry_sexp_release (priv_sexp);
|
2016-06-12 20:52:22 +02:00
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
priv_key2 = gcry_sexp_find_token (priv_key, "d", 1);
|
|
|
|
brandt_assert (NULL != priv_key2);
|
|
|
|
gcry_sexp_release (priv_key);
|
2016-06-12 20:52:22 +02:00
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
ret = gcry_sexp_nth_mpi (priv_key2, 1, GCRYMPI_FMT_USG);
|
|
|
|
brandt_assert (NULL != ret);
|
|
|
|
gcry_sexp_release (priv_key2);
|
|
|
|
|
|
|
|
gcry_mpi_snatch (skey, ret);
|
2016-06-12 20:52:22 +02:00
|
|
|
}
|
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
|
2016-06-13 21:09:41 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* ec_keypair_create creates a new keypair by creating a random secret key first
|
|
|
|
* and multipyling the base point with it to get the public key.
|
2016-06-13 21:09:41 +02:00
|
|
|
*
|
|
|
|
* @param[out] pkey where to store the generated public key
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[out] skey where to store the generated secret key. May be NULL if
|
|
|
|
* you're not interested in the secret key and just need a random point.
|
2016-06-13 21:09:41 +02:00
|
|
|
*/
|
2016-06-12 20:52:22 +02:00
|
|
|
void
|
2016-06-19 22:37:31 +02:00
|
|
|
ec_keypair_create (gcry_mpi_point_t pkey, gcry_mpi_t skey)
|
2016-06-12 20:52:22 +02:00
|
|
|
{
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_t sk;
|
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
brandt_assert (NULL != pkey);
|
2016-07-13 14:01:24 +02:00
|
|
|
sk = (NULL == skey) ? gcry_mpi_new (256) : skey;
|
2016-06-12 20:52:22 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_skey_create (sk);
|
|
|
|
gcry_mpi_ec_mul (pkey, sk, ec_gen, ec_ctx);
|
|
|
|
|
|
|
|
if (NULL == skey)
|
|
|
|
gcry_mpi_release (sk);
|
2016-06-12 20:52:22 +02:00
|
|
|
}
|
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
|
2016-06-13 21:09:41 +02:00
|
|
|
/**
|
2016-06-19 22:37:31 +02:00
|
|
|
* ec_keypair_create_base
|
2016-06-13 21:09:41 +02:00
|
|
|
*
|
|
|
|
* @param[out] pkey where to store the generated public key
|
|
|
|
* @param[out] skey where to store the generated secret key
|
|
|
|
* @param[in] base which base point should be used to calculate the public key
|
|
|
|
*/
|
2016-06-13 21:01:14 +02:00
|
|
|
void
|
2016-06-19 22:37:31 +02:00
|
|
|
ec_keypair_create_base (gcry_mpi_point_t pkey,
|
|
|
|
gcry_mpi_t skey,
|
|
|
|
const gcry_mpi_point_t base)
|
2016-06-13 21:01:14 +02:00
|
|
|
{
|
2016-06-16 00:09:29 +02:00
|
|
|
brandt_assert (NULL != pkey);
|
|
|
|
brandt_assert (NULL != skey);
|
|
|
|
brandt_assert (NULL != base);
|
|
|
|
|
2016-06-19 22:37:31 +02:00
|
|
|
ec_skey_create (skey);
|
2016-06-16 00:09:29 +02:00
|
|
|
gcry_mpi_ec_mul (pkey, skey, base, ec_ctx);
|
2016-06-13 21:01:14 +02:00
|
|
|
}
|
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
|
2016-07-13 14:01:24 +02:00
|
|
|
/**
|
|
|
|
* ec_point_copy creates a copy of one curve point
|
|
|
|
*
|
|
|
|
* @param[out] dst where to store the copy
|
|
|
|
* @param[in] src the input point to be copied
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ec_point_copy (gcry_mpi_point_t dst, const gcry_mpi_point_t src)
|
|
|
|
{
|
|
|
|
gcry_mpi_t x = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t y = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t z = gcry_mpi_new (256);
|
|
|
|
|
|
|
|
brandt_assert (dst && src);
|
|
|
|
gcry_mpi_point_get (x, y, z, src);
|
|
|
|
gcry_mpi_point_snatch_set (dst, x, y, z);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-13 21:09:41 +02:00
|
|
|
/**
|
2016-06-19 22:37:31 +02:00
|
|
|
* ec_point_cmp compares two curve points
|
2016-06-13 21:09:41 +02:00
|
|
|
*
|
|
|
|
* @param[in] a the first point
|
|
|
|
* @param[in] b the second point
|
|
|
|
* @return 0 if @a a and @a b represent the same point on the curve, something
|
|
|
|
* else otherwise
|
|
|
|
*/
|
2016-06-13 21:01:14 +02:00
|
|
|
int
|
2016-06-19 22:37:31 +02:00
|
|
|
ec_point_cmp (const gcry_mpi_point_t a, const gcry_mpi_point_t b)
|
2016-06-13 21:01:14 +02:00
|
|
|
{
|
2016-06-13 21:09:41 +02:00
|
|
|
int ret = 1;
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t ax = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t bx = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t ay = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t by = gcry_mpi_new (256);
|
2016-06-13 21:01:14 +02:00
|
|
|
|
|
|
|
brandt_assert (a && b);
|
|
|
|
if (!ax || !bx || !ay || !by)
|
|
|
|
{
|
2016-06-13 21:09:41 +02:00
|
|
|
weprintf ("could not init point in point_cmp");
|
2016-06-13 21:01:14 +02:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
if (!gcry_mpi_ec_get_affine (ax, ay, a, ec_ctx) &&
|
|
|
|
!gcry_mpi_ec_get_affine (bx, by, b, ec_ctx))
|
2016-06-13 21:01:14 +02:00
|
|
|
{
|
2016-06-13 21:09:41 +02:00
|
|
|
ret = gcry_mpi_cmp (ax, bx) || gcry_mpi_cmp (ay, by);
|
2016-06-13 21:01:14 +02:00
|
|
|
}
|
|
|
|
|
2016-06-13 21:09:41 +02:00
|
|
|
gcry_mpi_release (ax);
|
|
|
|
gcry_mpi_release (bx);
|
|
|
|
gcry_mpi_release (ay);
|
|
|
|
gcry_mpi_release (by);
|
2016-06-13 21:01:14 +02:00
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2016-06-12 01:14:56 +02:00
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
|
|
|
* mpi_serialize outputs the given MPI value to the given destination buffer in
|
|
|
|
* network byte order. The MPI @a src may not be negative.
|
|
|
|
*
|
|
|
|
* @param[out] dst where to output to
|
|
|
|
* @param[in] src value to write to @a dst
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
mpi_serialize (struct ec_mpi *dst, gcry_mpi_t src)
|
|
|
|
{
|
2016-06-28 16:29:18 +02:00
|
|
|
size_t rsize = 0;
|
2016-06-21 23:06:15 +02:00
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
if (gcry_mpi_get_flag (src, GCRYMPI_FLAG_OPAQUE))
|
2016-06-28 16:29:18 +02:00
|
|
|
{ /* Store opaque MPIs left aligned. Used by Ed25519 point compression */
|
|
|
|
unsigned int nbits;
|
|
|
|
const void *vp = gcry_mpi_get_opaque (src, &nbits);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
brandt_assert (vp);
|
2016-06-21 00:20:47 +02:00
|
|
|
rsize = (nbits + 7) / 8;
|
|
|
|
if (rsize > sizeof (struct ec_mpi))
|
|
|
|
rsize = sizeof (struct ec_mpi);
|
2016-06-21 23:06:15 +02:00
|
|
|
memcpy (dst, vp, rsize);
|
2016-06-21 00:20:47 +02:00
|
|
|
if (rsize < sizeof (struct ec_mpi))
|
|
|
|
memset (((char *)dst) + rsize, 0, sizeof (struct ec_mpi) - rsize);
|
|
|
|
}
|
|
|
|
else
|
2016-06-28 16:29:18 +02:00
|
|
|
{ /* Store regular MPIs as unsigned ints right aligned into the buffer. */
|
|
|
|
char *cp = (char *)dst;
|
|
|
|
gcry_error_t rc;
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
rc = gcry_mpi_print (GCRYMPI_FMT_USG, (void *)dst,
|
|
|
|
sizeof (struct ec_mpi), &rsize, src);
|
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
|
|
|
|
/* Shift the output to the right, if shorter than available space */
|
|
|
|
if (rsize && rsize < sizeof (struct ec_mpi))
|
|
|
|
{
|
2016-06-21 23:06:15 +02:00
|
|
|
memmove (&cp[sizeof (struct ec_mpi) - rsize], dst, rsize);
|
2016-06-21 00:20:47 +02:00
|
|
|
memset (dst, 0, sizeof (struct ec_mpi) - rsize);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* mpi_parse converts src buffer into MPI value.
|
|
|
|
* The buffer is interpreted as network byte order, unsigned integer.
|
|
|
|
*
|
|
|
|
* @param[out] dst where to store MPI value. Must be initialized.
|
|
|
|
* @param[in] src raw data source (GCRYMPI_FMT_USG)
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
mpi_parse (gcry_mpi_t dst, const struct ec_mpi *src)
|
|
|
|
{
|
|
|
|
gcry_mpi_t ret;
|
|
|
|
gcry_error_t rc;
|
|
|
|
|
2016-06-22 23:18:46 +02:00
|
|
|
rc = gcry_mpi_scan (&ret,
|
|
|
|
GCRYMPI_FMT_USG,
|
|
|
|
src,
|
|
|
|
sizeof (struct ec_mpi),
|
|
|
|
NULL);
|
2016-06-21 00:20:47 +02:00
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
|
|
|
|
gcry_mpi_snatch (dst, ret);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ec_point_serialize outputs the given curve point to the @a dst buffer.
|
|
|
|
*
|
|
|
|
* @param[out] dst where to write the raw data to
|
|
|
|
* @param[in] src curve point to write to @a dst
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ec_point_serialize (struct ec_mpi *dst, const gcry_mpi_point_t src)
|
|
|
|
{
|
|
|
|
gcry_sexp_t s;
|
|
|
|
gcry_ctx_t ctx;
|
|
|
|
gcry_error_t rc;
|
|
|
|
gcry_mpi_t q;
|
|
|
|
|
|
|
|
brandt_assert (dst);
|
|
|
|
|
|
|
|
rc = gcry_sexp_build (&s, NULL, "(public-key(ecc(curve " CURVE ")))");
|
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
brandt_assert (NULL != s);
|
|
|
|
|
|
|
|
rc = gcry_mpi_ec_new (&ctx, s, NULL);
|
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
gcry_sexp_release (s);
|
|
|
|
|
|
|
|
rc = gcry_mpi_ec_set_point ("q", src, ctx);
|
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
|
|
|
|
q = gcry_mpi_ec_get_mpi ("q@eddsa", ctx, 0);
|
|
|
|
brandt_assert (NULL != q);
|
|
|
|
gcry_ctx_release (ctx);
|
|
|
|
|
|
|
|
mpi_serialize (dst, q);
|
|
|
|
gcry_mpi_release (q);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
|
|
|
* ec_point_parse parses a point on the Ed25519 curve from @a src into @a dst.
|
|
|
|
*
|
|
|
|
* @param[out] dst where to store the curve point. Must be initialized
|
|
|
|
* @param[in] src raw data source
|
|
|
|
*/
|
|
|
|
void
|
|
|
|
ec_point_parse (gcry_mpi_point_t dst, const struct ec_mpi *src)
|
|
|
|
{
|
|
|
|
gcry_sexp_t s;
|
|
|
|
gcry_ctx_t ctx;
|
|
|
|
gcry_mpi_point_t ret;
|
|
|
|
gcry_error_t rc;
|
|
|
|
|
|
|
|
rc = gcry_sexp_build (&s, NULL, "(public-key(ecc(curve " CURVE ")(q %b)))",
|
|
|
|
sizeof (struct ec_mpi), src);
|
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
|
|
|
|
rc = gcry_mpi_ec_new (&ctx, s, NULL);
|
|
|
|
brandt_assert_gpgerr (rc);
|
|
|
|
gcry_sexp_release (s);
|
|
|
|
|
|
|
|
ret = gcry_mpi_ec_get_point ("q", ctx, 0);
|
|
|
|
brandt_assert (ret);
|
|
|
|
gcry_ctx_release (ctx);
|
|
|
|
gcry_mpi_ec_mul (dst, GCRYMPI_CONST_ONE, ret, ec_ctx);
|
2016-06-22 23:18:46 +02:00
|
|
|
gcry_mpi_point_release (ret);
|
2016-06-21 00:20:47 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
/**
|
|
|
|
* smc_free1 releases all points in @a dst and frees the memory
|
|
|
|
*
|
|
|
|
* @param[in,out] dst The 1 dimensional array to clean up
|
|
|
|
* @param[in] size1 size of the first dimension
|
|
|
|
*/
|
2016-08-16 20:58:20 +02:00
|
|
|
void
|
2016-06-28 16:29:18 +02:00
|
|
|
smc_free1 (gcry_mpi_point_t *dst, uint16_t size1)
|
|
|
|
{
|
|
|
|
if (NULL == dst)
|
|
|
|
return;
|
|
|
|
|
|
|
|
for (uint16_t i = 0; i < size1; i++)
|
|
|
|
if (NULL != dst[i])
|
|
|
|
gcry_mpi_point_release (dst[i]);
|
|
|
|
free (dst);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/**
|
2016-08-02 16:55:00 +02:00
|
|
|
* smc_init1 creates a 1 dimensional array of curve points. Make sure to
|
|
|
|
* initialize the values before using them, they are not automatically set to
|
|
|
|
* the zero point!
|
2016-06-28 16:29:18 +02:00
|
|
|
*
|
|
|
|
* @param[in] size1 size of the first dimension
|
|
|
|
* @return a pointer to the array or NULL on error.
|
|
|
|
* If not used anymore use smc_free2 to reclaim the memory.
|
|
|
|
*/
|
2016-08-16 20:58:20 +02:00
|
|
|
gcry_mpi_point_t *
|
2016-06-28 16:29:18 +02:00
|
|
|
smc_init1 (uint16_t size1)
|
|
|
|
{
|
|
|
|
gcry_mpi_point_t *ret;
|
|
|
|
|
2016-08-09 12:53:08 +02:00
|
|
|
ret = GNUNET_new_array (size1, gcry_mpi_point_t);
|
2016-06-28 16:29:18 +02:00
|
|
|
|
|
|
|
for (uint16_t i = 0; i < size1; i++)
|
|
|
|
{
|
|
|
|
if (NULL == (ret[i] = gcry_mpi_point_new (0)))
|
|
|
|
{
|
|
|
|
weprintf ("could not init point in 1 dimensional array. "
|
|
|
|
"out of memory?");
|
|
|
|
smc_free1 (ret, size1);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-22 14:22:52 +02:00
|
|
|
/**
|
|
|
|
* smc_free2 releases all points in @a dst and frees the memory
|
|
|
|
*
|
|
|
|
* @param[in,out] dst The 2 dimensional array to clean up
|
|
|
|
* @param[in] size1 size of the first dimension
|
|
|
|
* @param[in] size2 size of the second dimension
|
|
|
|
*/
|
2016-08-16 20:58:20 +02:00
|
|
|
void
|
2016-06-22 14:22:52 +02:00
|
|
|
smc_free2 (gcry_mpi_point_t **dst, uint16_t size1, uint16_t size2)
|
|
|
|
{
|
|
|
|
if (NULL == dst)
|
|
|
|
return;
|
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t i = 0; i < size1; i++)
|
|
|
|
for (uint16_t j = 0; j < size2; j++)
|
2016-06-22 14:22:52 +02:00
|
|
|
if (NULL != dst[i][j])
|
|
|
|
gcry_mpi_point_release (dst[i][j]);
|
|
|
|
free (dst);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-08-02 16:55:00 +02:00
|
|
|
* smc_init2 creates a 2 dimensional array of curve points. Make sure to
|
|
|
|
* initialize the values before using them, they are not automatically set to
|
|
|
|
* the zero point!
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
|
|
|
* @param[in] size1 size of the first dimension
|
|
|
|
* @param[in] size2 size of the second dimension
|
2016-06-22 14:22:52 +02:00
|
|
|
* @return a pointer to the array or NULL on error.
|
|
|
|
* If not used anymore use smc_free2 to reclaim the memory.
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-08-16 20:58:20 +02:00
|
|
|
gcry_mpi_point_t **
|
2016-06-19 22:37:31 +02:00
|
|
|
smc_init2 (uint16_t size1, uint16_t size2)
|
|
|
|
{
|
|
|
|
gcry_mpi_point_t **ret;
|
|
|
|
|
2016-09-08 19:17:15 +02:00
|
|
|
ret = GNUNET_new_array_2d (size1, size2, gcry_mpi_point_t);
|
2016-06-20 00:36:18 +02:00
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t i = 0; i < size1; i++)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t j = 0; j < size2; j++)
|
2016-06-22 14:22:52 +02:00
|
|
|
{
|
|
|
|
if (NULL == (ret[i][j] = gcry_mpi_point_new (0)))
|
|
|
|
{
|
|
|
|
weprintf ("could not init point in 2 dimensional array. "
|
|
|
|
"out of memory?");
|
|
|
|
smc_free2 (ret, size1, size2);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
2016-06-19 22:37:31 +02:00
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-06-22 14:22:52 +02:00
|
|
|
* smc_free3 releases all points in @a dst and frees the memory
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-06-22 14:22:52 +02:00
|
|
|
* @param[in,out] dst The 3 dimensional array to clean up
|
2016-06-21 00:20:47 +02:00
|
|
|
* @param[in] size1 size of the first dimension
|
|
|
|
* @param[in] size2 size of the second dimension
|
2016-06-22 14:22:52 +02:00
|
|
|
* @param[in] size3 size of the third dimension
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-08-16 20:58:20 +02:00
|
|
|
void
|
2016-06-22 14:22:52 +02:00
|
|
|
smc_free3 (gcry_mpi_point_t ***dst,
|
|
|
|
uint16_t size1,
|
|
|
|
uint16_t size2,
|
|
|
|
uint16_t size3)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-22 14:22:52 +02:00
|
|
|
if (NULL == dst)
|
|
|
|
return;
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t i = 0; i < size1; i++)
|
|
|
|
for (uint16_t j = 0; j < size2; j++)
|
|
|
|
for (uint16_t k = 0; k < size3; k++)
|
2016-06-22 14:22:52 +02:00
|
|
|
if (NULL != dst[i][j][k])
|
|
|
|
gcry_mpi_point_release (dst[i][j][k]);
|
2016-06-19 22:37:31 +02:00
|
|
|
free (dst);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-08-02 16:55:00 +02:00
|
|
|
* smc_init3 creates a 3 dimensional array of curve points. Make sure to
|
|
|
|
* initialize the values before using them, they are not automatically set to
|
|
|
|
* the zero point!
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
|
|
|
* @param[in] size1 size of the first dimension
|
|
|
|
* @param[in] size2 size of the second dimension
|
|
|
|
* @param[in] size3 size of the third dimension
|
2016-06-22 14:22:52 +02:00
|
|
|
* @return a pointer to the array or NULL on error.
|
|
|
|
* If not used anymore use smc_free3 to reclaim the memory.
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-08-16 20:58:20 +02:00
|
|
|
gcry_mpi_point_t ***
|
2016-06-20 00:36:18 +02:00
|
|
|
smc_init3 (uint16_t size1, uint16_t size2, uint16_t size3)
|
|
|
|
{
|
|
|
|
gcry_mpi_point_t ***ret;
|
|
|
|
|
2016-09-08 19:17:15 +02:00
|
|
|
ret = GNUNET_new_array_3d (size1, size2, size3, gcry_mpi_point_t);
|
2016-06-20 00:36:18 +02:00
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t i = 0; i < size1; i++)
|
2016-06-20 00:36:18 +02:00
|
|
|
{
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t j = 0; j < size2; j++)
|
2016-06-20 00:36:18 +02:00
|
|
|
{
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t k = 0; k < size3; k++)
|
2016-06-22 14:22:52 +02:00
|
|
|
{
|
|
|
|
if (NULL == (ret[i][j][k] = gcry_mpi_point_new (0)))
|
|
|
|
{
|
|
|
|
weprintf ("could not init point in 2 dimensional array. "
|
|
|
|
"out of memory?");
|
|
|
|
smc_free3 (ret, size1, size2, size3);
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
2016-06-20 00:36:18 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-19 22:37:31 +02:00
|
|
|
/**
|
|
|
|
* smc_sums_partial calculates sums up until the current index and stores them
|
2016-06-19 23:21:01 +02:00
|
|
|
* in @a out. \f$\forall i \leq len: out_i=\sum_{h=1}^iin_h\f$
|
2016-06-19 22:37:31 +02:00
|
|
|
*
|
2016-06-28 16:29:18 +02:00
|
|
|
* @param[out] out Where to store the resulting sums. Points must already be
|
|
|
|
* initialized beforehand.
|
2016-06-19 22:37:31 +02:00
|
|
|
* @param[in] in Input points.
|
2016-06-28 16:29:18 +02:00
|
|
|
* @param[in] len The length of @a out. @a in must be at least @a step times @a
|
|
|
|
* len elements long.
|
|
|
|
* @param[in] stepi The amount of items to advance in @a in each step. Can be
|
|
|
|
* used to sum over multi-dimensional arrays.
|
|
|
|
* @param[in] stepo The amount of items to advance in @a out each step. Can be
|
|
|
|
* used to store the sum in multi-dimensional arrays.
|
2016-06-19 22:37:31 +02:00
|
|
|
*/
|
2016-09-29 18:22:21 +02:00
|
|
|
void
|
2016-06-28 16:29:18 +02:00
|
|
|
smc_sums_partial (gcry_mpi_point_t out[],
|
|
|
|
gcry_mpi_point_t in[],
|
|
|
|
uint16_t len,
|
|
|
|
uint16_t stepi,
|
|
|
|
uint16_t stepo)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-28 16:29:18 +02:00
|
|
|
brandt_assert (NULL != out);
|
|
|
|
for (uint16_t i = 0, o = 0; o < len * stepo; i += stepi, o += stepo)
|
|
|
|
gcry_mpi_ec_add (out[o], (o ? out[o - stepo] : ec_zero), in[i], ec_ctx);
|
2016-06-19 22:37:31 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-12 01:14:56 +02:00
|
|
|
/**
|
2016-06-19 23:21:01 +02:00
|
|
|
* smc_sum calculates the sum of all input points.
|
|
|
|
* \f$out=\sum_{i=1}^{len}in_i\f$
|
2016-06-12 01:14:56 +02:00
|
|
|
*
|
2016-06-19 22:37:31 +02:00
|
|
|
* @param[out] out Where to store the result
|
|
|
|
* @param[in] in Input points.
|
2016-06-28 16:29:18 +02:00
|
|
|
* @param[in] len The amount of summands to use from @a in. @a in must be at
|
|
|
|
* least @a step times @a len elements long.
|
|
|
|
* @param[in] step The amount of items to advance in @a in each step. Can be
|
|
|
|
* used to sum over multi-dimensional arrays.
|
2016-06-19 22:37:31 +02:00
|
|
|
*/
|
2016-09-29 18:22:21 +02:00
|
|
|
void
|
2016-06-28 16:29:18 +02:00
|
|
|
smc_sum (gcry_mpi_point_t out,
|
|
|
|
gcry_mpi_point_t in[],
|
|
|
|
uint16_t len,
|
|
|
|
uint16_t step)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
|
|
|
brandt_assert (NULL != out);
|
2016-07-13 14:01:24 +02:00
|
|
|
ec_point_copy (out, ec_zero);
|
2016-06-28 22:05:30 +02:00
|
|
|
for (uint16_t i = 0; i < len * step; i += step)
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_ec_add (out, out, in[i], ec_ctx);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-08-31 14:37:22 +02:00
|
|
|
void
|
|
|
|
smc_prep_keyshare (struct BRANDT_Auction *ad)
|
|
|
|
{
|
|
|
|
ad->y = smc_init1 (ad->n);
|
|
|
|
brandt_assert (ad->y);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-08-23 12:56:44 +02:00
|
|
|
* smc_gen_keyshare creates the private keyshare and computes the
|
|
|
|
* public key share
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-08-23 12:56:44 +02:00
|
|
|
* @param[in] ad Pointer to the BRANDT_Auction struct to operate on
|
|
|
|
* @param[out] buflen Size of the returned message buffer in bytes
|
|
|
|
* @return A buffer containing the public key share
|
|
|
|
* which needs to be broadcast
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-06-22 14:22:52 +02:00
|
|
|
unsigned char *
|
2016-07-13 14:01:24 +02:00
|
|
|
smc_gen_keyshare (struct BRANDT_Auction *ad, size_t *buflen)
|
2016-06-20 00:47:20 +02:00
|
|
|
{
|
2016-06-22 14:22:52 +02:00
|
|
|
unsigned char *ret;
|
2016-08-23 12:56:44 +02:00
|
|
|
struct msg_head *head;
|
|
|
|
struct ec_mpi *pubkey_share;
|
2016-08-31 14:37:22 +02:00
|
|
|
struct proof_dl *proof1;
|
2016-06-22 14:22:52 +02:00
|
|
|
|
|
|
|
brandt_assert (ad && buflen);
|
2016-08-23 12:56:44 +02:00
|
|
|
*buflen = (sizeof (*head) +
|
|
|
|
sizeof (*pubkey_share) +
|
|
|
|
sizeof (*proof1));
|
2016-08-09 12:53:08 +02:00
|
|
|
ret = GNUNET_new_array (*buflen, unsigned char);
|
2016-06-20 00:47:20 +02:00
|
|
|
|
2016-08-23 12:56:44 +02:00
|
|
|
head = (struct msg_head *)ret;
|
|
|
|
head->prot_version = htonl (0);
|
|
|
|
head->msg_type = htonl (msg_init);
|
2016-06-20 00:47:20 +02:00
|
|
|
|
2016-08-23 12:56:44 +02:00
|
|
|
proof1 = (struct proof_dl *)(ret + sizeof (*head) + sizeof (*pubkey_share));
|
2016-07-13 14:01:24 +02:00
|
|
|
ad->x = gcry_mpi_new (256);
|
2016-06-22 02:12:54 +02:00
|
|
|
ec_skey_create (ad->x);
|
2016-06-22 14:22:52 +02:00
|
|
|
smc_zkp_dl (ad->y[ad->i], ad->x, proof1);
|
2016-08-23 12:56:44 +02:00
|
|
|
|
|
|
|
pubkey_share = (struct ec_mpi *)(ret + sizeof (*head));
|
|
|
|
ec_point_serialize (pubkey_share, ad->y[ad->i]);
|
|
|
|
|
2016-06-22 14:22:52 +02:00
|
|
|
return ret;
|
2016-06-22 02:12:54 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-22 14:22:52 +02:00
|
|
|
int
|
2016-07-13 14:01:24 +02:00
|
|
|
smc_recv_keyshare (struct BRANDT_Auction *ad,
|
2016-08-03 12:26:51 +02:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t buflen,
|
|
|
|
uint16_t sender)
|
2016-06-22 02:12:54 +02:00
|
|
|
{
|
2016-06-22 14:22:52 +02:00
|
|
|
int ret = 0;
|
|
|
|
struct proof_dl *proof1;
|
|
|
|
gcry_mpi_point_t y = gcry_mpi_point_new (0);
|
|
|
|
|
|
|
|
brandt_assert (ad && buf);
|
|
|
|
|
|
|
|
if (buflen != (sizeof (struct ec_mpi) + sizeof (*proof1)))
|
|
|
|
{
|
|
|
|
weprintf ("wrong size of received key share");
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
|
|
|
proof1 = (struct proof_dl *)(buf + sizeof (struct ec_mpi));
|
|
|
|
ec_point_parse (y, (struct ec_mpi *)buf);
|
|
|
|
if (smc_zkp_dl_check (y, proof1))
|
|
|
|
{
|
|
|
|
weprintf ("wrong zkp1 for public key share received");
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2016-07-13 14:01:24 +02:00
|
|
|
ec_point_copy (ad->y[sender], y);
|
2016-06-22 14:22:52 +02:00
|
|
|
|
|
|
|
ret = 1;
|
|
|
|
quit:
|
|
|
|
gcry_mpi_point_release (y);
|
|
|
|
return ret;
|
2016-06-20 00:47:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-08-31 14:37:22 +02:00
|
|
|
void
|
|
|
|
smc_prep_bid (struct BRANDT_Auction *ad)
|
|
|
|
{
|
|
|
|
ad->alpha = smc_init2 (ad->n, ad->k);
|
|
|
|
brandt_assert (ad->alpha);
|
|
|
|
|
|
|
|
ad->beta = smc_init2 (ad->n, ad->k);
|
|
|
|
brandt_assert (ad->beta);
|
|
|
|
|
|
|
|
ad->Y = gcry_mpi_point_new (0);
|
|
|
|
brandt_assert (ad->Y);
|
|
|
|
smc_sum (ad->Y, ad->y, ad->n, 1);
|
|
|
|
brandt_assert (ad->Y);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-08-23 12:56:44 +02:00
|
|
|
* smc_encrypt_bid encrypts the own bid with the shared public key and packs it
|
|
|
|
* into a message together with proofs of correctnes.
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-08-23 12:56:44 +02:00
|
|
|
* @param[in] ad Pointer to the BRANDT_Auction struct to operate on
|
|
|
|
* @param[out] buflen Size of the returned message buffer in bytes
|
|
|
|
* @return A buffer containing the encrypted bid
|
|
|
|
* which needs to be broadcast
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-06-22 14:22:52 +02:00
|
|
|
unsigned char *
|
2016-07-13 14:01:24 +02:00
|
|
|
smc_encrypt_bid (struct BRANDT_Auction *ad, size_t *buflen)
|
2016-06-22 14:22:52 +02:00
|
|
|
{
|
|
|
|
unsigned char *ret;
|
|
|
|
unsigned char *cur;
|
2016-08-23 12:56:44 +02:00
|
|
|
struct msg_head *head;
|
2016-08-31 14:37:22 +02:00
|
|
|
struct proof_0og *proof3;
|
2016-06-22 14:22:52 +02:00
|
|
|
gcry_mpi_t r_sum;
|
2016-10-09 14:16:53 +02:00
|
|
|
gcry_mpi_t r_sum2;
|
2016-06-22 14:22:52 +02:00
|
|
|
gcry_mpi_t r_part;
|
|
|
|
|
|
|
|
brandt_assert (ad && buflen);
|
2016-08-23 12:56:44 +02:00
|
|
|
*buflen = (sizeof (*head) + /* msg header */
|
|
|
|
ad->k * /* k * (alpha, beta, proof3) */
|
2016-08-31 14:37:22 +02:00
|
|
|
(sizeof (struct ec_mpi) * 2 +
|
2016-06-22 14:22:52 +02:00
|
|
|
sizeof (*proof3)) +
|
2016-08-31 14:37:22 +02:00
|
|
|
sizeof (struct proof_2dle)); /* proof2 */
|
2016-08-23 12:56:44 +02:00
|
|
|
ret = GNUNET_new_array (*buflen, unsigned char);
|
2016-06-22 14:22:52 +02:00
|
|
|
|
2016-08-23 12:56:44 +02:00
|
|
|
head = (struct msg_head *)ret;
|
|
|
|
head->prot_version = htonl (0);
|
|
|
|
head->msg_type = htonl (msg_bid);
|
|
|
|
cur = ret + sizeof (*head);
|
|
|
|
|
2016-07-13 14:01:24 +02:00
|
|
|
r_sum = gcry_mpi_new (256);
|
2016-10-09 14:16:53 +02:00
|
|
|
r_sum2 = gcry_mpi_new (256);
|
2016-07-13 14:01:24 +02:00
|
|
|
r_part = gcry_mpi_new (256);
|
2016-06-22 14:22:52 +02:00
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t j = 0; j < ad->k; j++)
|
2016-06-22 14:22:52 +02:00
|
|
|
{
|
|
|
|
proof3 = (struct proof_0og *)(cur + 2 * sizeof (struct ec_mpi));
|
2016-06-22 23:18:46 +02:00
|
|
|
smc_zkp_0og (j == ad->b,
|
|
|
|
ad->Y,
|
|
|
|
r_part,
|
|
|
|
ad->alpha[ad->i][j],
|
|
|
|
ad->beta[ad->i][j],
|
|
|
|
proof3);
|
2016-06-22 14:22:52 +02:00
|
|
|
ec_point_serialize ((struct ec_mpi *)cur, ad->alpha[ad->i][j]);
|
|
|
|
ec_point_serialize (&((struct ec_mpi *)cur)[1], ad->beta[ad->i][j]);
|
|
|
|
gcry_mpi_addm (r_sum, r_sum, r_part, ec_n);
|
2016-10-09 14:16:53 +02:00
|
|
|
|
|
|
|
/* prepare sum for additional M+1st price auction proof (see below) */
|
|
|
|
if (0 < ad->m && j >= ad->i && 0 == (j - ad->i) % ad->n)
|
|
|
|
gcry_mpi_addm (r_sum2, r_sum2, r_part, ec_n);
|
|
|
|
|
2016-06-22 14:22:52 +02:00
|
|
|
cur += 2 * sizeof (struct ec_mpi) + sizeof (struct proof_0og);
|
|
|
|
}
|
|
|
|
smc_zkp_2dle (NULL, NULL, ad->Y, ec_gen, r_sum, (struct proof_2dle *)cur);
|
|
|
|
|
2016-10-09 14:16:53 +02:00
|
|
|
/* in M+1st price auctions we need to prove that our bid is from the valid
|
|
|
|
* subset of bids as well */
|
|
|
|
if (0 < ad->m)
|
|
|
|
{
|
|
|
|
struct proof_2dle *proof2;
|
|
|
|
*buflen += sizeof (struct proof_2dle);
|
|
|
|
ret = GNUNET_realloc (ret, *buflen);
|
|
|
|
proof2 = (struct proof_2dle *)(ret + *buflen -
|
|
|
|
sizeof (struct proof_2dle));
|
|
|
|
smc_zkp_2dle (NULL, NULL, ad->Y, ec_gen, r_sum2, proof2);
|
|
|
|
}
|
|
|
|
|
2016-06-22 14:22:52 +02:00
|
|
|
gcry_mpi_release (r_sum);
|
2016-10-09 14:16:53 +02:00
|
|
|
gcry_mpi_release (r_sum2);
|
2016-06-22 14:22:52 +02:00
|
|
|
gcry_mpi_release (r_part);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int
|
2016-07-13 14:01:24 +02:00
|
|
|
smc_recv_encrypted_bid (struct BRANDT_Auction *ad,
|
2016-08-03 12:26:51 +02:00
|
|
|
const unsigned char *buf,
|
|
|
|
size_t buflen,
|
|
|
|
uint16_t sender)
|
2016-06-20 01:41:41 +02:00
|
|
|
{
|
2016-08-03 12:26:51 +02:00
|
|
|
int ret = 0;
|
|
|
|
const unsigned char *cur = buf;
|
|
|
|
struct proof_0og *proof3;
|
|
|
|
gcry_mpi_point_t **ct; /* ciphertexts */
|
|
|
|
gcry_mpi_point_t alpha_sum = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t beta_sum = gcry_mpi_point_new (0);
|
2016-10-09 14:16:53 +02:00
|
|
|
gcry_mpi_point_t alpha_sum2 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t beta_sum2 = gcry_mpi_point_new (0);
|
2016-06-22 14:22:52 +02:00
|
|
|
|
|
|
|
brandt_assert (ad && buf);
|
|
|
|
|
|
|
|
if (buflen != (ad->k * (sizeof (struct ec_mpi) * 2 + sizeof (*proof3)) +
|
2016-10-09 14:16:53 +02:00
|
|
|
(0 < ad->m ? 2 : 1) * sizeof (struct proof_2dle)) ||
|
2016-06-22 14:22:52 +02:00
|
|
|
NULL == (ct = smc_init2 (2, ad->k)))
|
|
|
|
{
|
|
|
|
weprintf ("wrong size of received encrypted bid");
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2016-07-13 14:01:24 +02:00
|
|
|
ec_point_copy (alpha_sum, ec_zero);
|
|
|
|
ec_point_copy (beta_sum, ec_zero);
|
2016-10-09 14:16:53 +02:00
|
|
|
ec_point_copy (alpha_sum2, ec_zero);
|
|
|
|
ec_point_copy (beta_sum2, ec_zero);
|
2016-06-22 14:22:52 +02:00
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t j = 0; j < ad->k; j++)
|
2016-06-22 14:22:52 +02:00
|
|
|
{
|
|
|
|
ec_point_parse (ct[0][j], (struct ec_mpi *)cur);
|
|
|
|
ec_point_parse (ct[1][j], &((struct ec_mpi *)cur)[1]);
|
|
|
|
proof3 = (struct proof_0og *)(cur + 2 * sizeof (struct ec_mpi));
|
|
|
|
if (smc_zkp_0og_check (ad->Y, ct[0][j], ct[1][j], proof3))
|
|
|
|
{
|
|
|
|
weprintf ("wrong zkp3 for alpha, beta received");
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
gcry_mpi_ec_add (alpha_sum, alpha_sum, ct[0][j], ec_ctx);
|
|
|
|
gcry_mpi_ec_add (beta_sum, beta_sum, ct[1][j], ec_ctx);
|
2016-10-09 14:16:53 +02:00
|
|
|
|
|
|
|
/* precalculate ciphertext sums for second 2dle proof needed in M+1st
|
|
|
|
* price auctions */
|
|
|
|
if (0 < ad->m && j >= ad->i && 0 == (j - ad->i) % ad->n)
|
|
|
|
{
|
|
|
|
gcry_mpi_ec_add (alpha_sum2, alpha_sum2, ct[0][j], ec_ctx);
|
|
|
|
gcry_mpi_ec_add (beta_sum2, beta_sum2, ct[1][j], ec_ctx);
|
|
|
|
}
|
|
|
|
|
2016-06-22 14:22:52 +02:00
|
|
|
cur += 2 * sizeof (struct ec_mpi) + sizeof (struct proof_0og);
|
|
|
|
}
|
|
|
|
|
|
|
|
gcry_mpi_ec_sub (alpha_sum, alpha_sum, ec_gen, ec_ctx);
|
2016-06-22 23:18:46 +02:00
|
|
|
if (smc_zkp_2dle_check (alpha_sum,
|
|
|
|
beta_sum,
|
|
|
|
ad->Y,
|
|
|
|
ec_gen,
|
2016-06-22 14:22:52 +02:00
|
|
|
(struct proof_2dle *)cur))
|
|
|
|
{
|
|
|
|
weprintf ("wrong zkp2 for alpha, beta received");
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
|
2016-10-09 14:16:53 +02:00
|
|
|
/* On M+1st price auctions check with the second 2dle proof if the bidder
|
|
|
|
* only bid on one of his allowed indizes */
|
|
|
|
if (0 < ad->m)
|
|
|
|
{
|
|
|
|
cur += sizeof (struct proof_2dle);
|
|
|
|
gcry_mpi_ec_sub (alpha_sum2, alpha_sum2, ec_gen, ec_ctx);
|
|
|
|
if (smc_zkp_2dle_check (alpha_sum2,
|
|
|
|
beta_sum2,
|
|
|
|
ad->Y,
|
|
|
|
ec_gen,
|
|
|
|
(struct proof_2dle *)cur))
|
|
|
|
{
|
|
|
|
weprintf ("wrong second zkp2 for alpha, beta received. "
|
|
|
|
"bid not allowed for this user in M+1st price auctions.");
|
|
|
|
goto quit;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-06-28 16:29:18 +02:00
|
|
|
for (uint16_t j = 0; j < ad->k; j++)
|
2016-06-22 14:22:52 +02:00
|
|
|
{
|
2016-07-13 14:01:24 +02:00
|
|
|
ec_point_copy (ad->alpha[sender][j], ct[0][j]);
|
|
|
|
ec_point_copy (ad->beta[sender][j], ct[1][j]);
|
2016-06-22 14:22:52 +02:00
|
|
|
}
|
|
|
|
smc_free2 (ct, 2, ad->k);
|
|
|
|
|
|
|
|
ret = 1; /* finally success */
|
|
|
|
quit:
|
|
|
|
gcry_mpi_point_release (alpha_sum);
|
|
|
|
gcry_mpi_point_release (beta_sum);
|
2016-10-09 14:16:53 +02:00
|
|
|
gcry_mpi_point_release (alpha_sum2);
|
|
|
|
gcry_mpi_point_release (beta_sum2);
|
2016-06-22 14:22:52 +02:00
|
|
|
return ret;
|
2016-06-20 01:41:41 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-19 22:37:31 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* smc_zkp_dl creates a proof of knowledge of @a x with \f$v = xg\f$ where
|
|
|
|
* \f$g\f$ is the base point on Ed25519.
|
2016-06-19 22:37:31 +02:00
|
|
|
*
|
2016-06-22 02:05:00 +02:00
|
|
|
* @param[out] v output point. Must be known to the verifier.
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[in] x private key. Knowledge of this number is certified in the proof
|
|
|
|
* @param[out] proof pointer where to save the output proof structure. Must be
|
|
|
|
* shared with the verifier.
|
2016-06-19 22:37:31 +02:00
|
|
|
*/
|
|
|
|
void
|
2016-06-22 02:05:00 +02:00
|
|
|
smc_zkp_dl (gcry_mpi_point_t v,
|
|
|
|
const gcry_mpi_t x,
|
|
|
|
struct proof_dl *proof)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-21 16:12:57 +02:00
|
|
|
struct zkp_challenge_dl challenge;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t a = gcry_mpi_point_new (0);
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t r = gcry_mpi_new (256);
|
2016-08-03 12:26:27 +02:00
|
|
|
gcry_mpi_t c;
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t z = gcry_mpi_new (256);
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-22 02:05:00 +02:00
|
|
|
/* v = xg */
|
|
|
|
gcry_mpi_ec_mul (v, x, ec_gen, ec_ctx);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
/* a = zg */
|
|
|
|
ec_keypair_create (a, z);
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
/* compute challenge c */
|
|
|
|
ec_point_serialize (&challenge.g, ec_gen);
|
|
|
|
ec_point_serialize (&challenge.v, v);
|
|
|
|
ec_point_serialize (&challenge.a, a);
|
2016-08-03 12:26:51 +02:00
|
|
|
GNUNET_CRYPTO_kdf_mod_mpi (&c,
|
|
|
|
ec_n,
|
|
|
|
NULL,
|
|
|
|
0,
|
|
|
|
&challenge,
|
|
|
|
sizeof (challenge),
|
|
|
|
"libbrandt zkp dl");
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
/* r = z + cx */
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_mulm (r, c, x, ec_n);
|
|
|
|
gcry_mpi_addm (r, r, z, ec_n);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_point_serialize (&proof->a, a);
|
|
|
|
mpi_serialize (&proof->r, r);
|
|
|
|
|
|
|
|
gcry_mpi_point_release (a);
|
|
|
|
gcry_mpi_release (r);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_release (c);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_release (z);
|
2016-06-12 01:14:56 +02:00
|
|
|
}
|
2016-06-12 20:52:22 +02:00
|
|
|
|
2016-06-16 00:09:29 +02:00
|
|
|
|
2016-06-12 20:52:22 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* smc_zkp_dl_check verifies a proof of knowledge of \f$x = ECDL_g(v)\f$ where
|
|
|
|
* \f$g\f$ is the base point on Ed25519.
|
2016-06-12 20:52:22 +02:00
|
|
|
*
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[in] v input point. Received from the prover.
|
|
|
|
* @param[in] proof pointer to the proof structure. Received from the prover.
|
2016-06-19 22:37:31 +02:00
|
|
|
* @return 0 if the proof is correct, something else otherwise
|
2016-06-12 20:52:22 +02:00
|
|
|
*/
|
2016-06-19 22:37:31 +02:00
|
|
|
int
|
|
|
|
smc_zkp_dl_check (const gcry_mpi_point_t v,
|
2016-06-21 23:06:15 +02:00
|
|
|
const struct proof_dl *proof)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-21 16:12:57 +02:00
|
|
|
int ret;
|
|
|
|
struct zkp_challenge_dl challenge;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t a = gcry_mpi_point_new (0);
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t r = gcry_mpi_new (256);
|
2016-08-03 12:26:27 +02:00
|
|
|
gcry_mpi_t c;
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_point_t left = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t right = gcry_mpi_point_new (0);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_point_parse (a, &proof->a);
|
|
|
|
mpi_parse (r, &proof->r);
|
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
/* compute challenge c */
|
|
|
|
ec_point_serialize (&challenge.g, ec_gen);
|
|
|
|
ec_point_serialize (&challenge.v, v);
|
|
|
|
ec_point_serialize (&challenge.a, a);
|
2016-08-03 12:26:51 +02:00
|
|
|
GNUNET_CRYPTO_kdf_mod_mpi (&c,
|
|
|
|
ec_n,
|
|
|
|
NULL,
|
|
|
|
0,
|
|
|
|
&challenge,
|
|
|
|
sizeof (challenge),
|
|
|
|
"libbrandt zkp dl");
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
/* rg =? a + cv */
|
|
|
|
gcry_mpi_ec_mul (left, r, ec_gen, ec_ctx);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_ec_mul (right, c, v, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, a, right, ec_ctx);
|
|
|
|
ret = ec_point_cmp (left, right);
|
2016-06-21 23:06:15 +02:00
|
|
|
|
|
|
|
gcry_mpi_point_release (a);
|
|
|
|
gcry_mpi_release (r);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_release (c);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_point_release (left);
|
|
|
|
gcry_mpi_point_release (right);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* smc_zkp_2dle creates a proof that two ECDLs are equal without revealing the
|
|
|
|
* ECDL. \f$v=xg_1, w=xg_2\f$ are calculated as well and can be returned to the
|
|
|
|
* caller if needed.
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[out] v first output point. May be NULL if not needed by the caller.
|
|
|
|
* Must be known to the verifier.
|
|
|
|
* @param[out] w second output point. May be NULL if not needed by the caller.
|
|
|
|
* Must be known to the verifier.
|
|
|
|
* @param[in] g1 first base point. Must be known to the verifier.
|
|
|
|
* @param[in] g2 second base point. Must be known to the verifier.
|
2016-06-28 16:29:18 +02:00
|
|
|
* @param[in] x private number to prove knowledge of. May be NULL if not used by
|
|
|
|
* the caller.
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[out] proof pointer where to save the output proof structure. Must be
|
|
|
|
* shared with the verifier.
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-06-19 22:37:31 +02:00
|
|
|
void
|
2016-06-21 23:06:15 +02:00
|
|
|
smc_zkp_2dle (gcry_mpi_point_t v,
|
|
|
|
gcry_mpi_point_t w,
|
2016-06-19 22:37:31 +02:00
|
|
|
const gcry_mpi_point_t g1,
|
|
|
|
const gcry_mpi_point_t g2,
|
|
|
|
const gcry_mpi_t x,
|
2016-06-21 23:06:15 +02:00
|
|
|
struct proof_2dle *proof)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-21 16:12:57 +02:00
|
|
|
struct zkp_challenge_2dle challenge;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t rv;
|
|
|
|
gcry_mpi_point_t rw;
|
2016-06-28 16:29:18 +02:00
|
|
|
gcry_mpi_t rx;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t a = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t b = gcry_mpi_point_new (0);
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t r = gcry_mpi_new (256);
|
2016-08-03 12:26:27 +02:00
|
|
|
gcry_mpi_t c;
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t z = gcry_mpi_new (256);
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-22 23:18:46 +02:00
|
|
|
rv = (NULL == v) ? gcry_mpi_point_new (0) : v;
|
|
|
|
rw = (NULL == w) ? gcry_mpi_point_new (0) : w;
|
2016-07-13 14:01:24 +02:00
|
|
|
rx = (NULL == x) ? gcry_mpi_new (256) : x;
|
2016-06-28 16:29:18 +02:00
|
|
|
|
|
|
|
if (NULL == x)
|
|
|
|
ec_skey_create (rx);
|
2016-06-21 23:06:15 +02:00
|
|
|
|
|
|
|
/* v = x*g1 */
|
2016-06-28 16:29:18 +02:00
|
|
|
gcry_mpi_ec_mul (rv, rx, g1, ec_ctx);
|
2016-06-21 23:06:15 +02:00
|
|
|
|
|
|
|
/* w = x*g2 */
|
2016-06-28 16:29:18 +02:00
|
|
|
gcry_mpi_ec_mul (rw, rx, g2, ec_ctx);
|
2016-06-21 23:06:15 +02:00
|
|
|
|
|
|
|
/* a = z*g1 */
|
2016-06-19 22:37:31 +02:00
|
|
|
ec_keypair_create_base (a, z, g1);
|
2016-06-21 23:06:15 +02:00
|
|
|
|
|
|
|
/* b = z*g2 */
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_ec_mul (b, z, g2, ec_ctx);
|
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
/* compute challenge c */
|
|
|
|
ec_point_serialize (&challenge.g1, g1);
|
|
|
|
ec_point_serialize (&challenge.g2, g2);
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_point_serialize (&challenge.v, rv);
|
|
|
|
ec_point_serialize (&challenge.w, rw);
|
2016-06-21 16:12:57 +02:00
|
|
|
ec_point_serialize (&challenge.a, a);
|
|
|
|
ec_point_serialize (&challenge.b, b);
|
2016-08-03 12:26:51 +02:00
|
|
|
GNUNET_CRYPTO_kdf_mod_mpi (&c,
|
|
|
|
ec_n,
|
|
|
|
NULL,
|
|
|
|
0,
|
|
|
|
&challenge,
|
|
|
|
sizeof (challenge),
|
|
|
|
"libbrandt zkp 2dle");
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
/* r = z + cx */
|
2016-06-28 16:29:18 +02:00
|
|
|
gcry_mpi_mulm (r, c, rx, ec_n);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_addm (r, r, z, ec_n);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
mpi_serialize (&proof->r, r);
|
|
|
|
ec_point_serialize (&proof->a, a);
|
|
|
|
ec_point_serialize (&proof->b, b);
|
|
|
|
|
|
|
|
if (NULL == v)
|
|
|
|
gcry_mpi_point_release (rv);
|
|
|
|
if (NULL == w)
|
|
|
|
gcry_mpi_point_release (rw);
|
2016-06-28 16:29:18 +02:00
|
|
|
if (NULL == x)
|
|
|
|
gcry_mpi_release (rx);
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_release (a);
|
|
|
|
gcry_mpi_point_release (b);
|
|
|
|
gcry_mpi_release (r);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_release (c);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_release (z);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* smc_zkp_2dle_check verifies a proof of knowledge of \f$x\f$ with \f$v=xg_1\f$
|
|
|
|
* and \f$w=xg_2\f$.
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[in] v first input point.
|
|
|
|
* @param[in] w second input point.
|
|
|
|
* @param[in] g1 first base point.
|
|
|
|
* @param[in] g2 second base point.
|
|
|
|
* @param[in] proof pointer to the proof structure. Received from the prover.
|
|
|
|
* @return 0 if the proof is correct, something else otherwise
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-06-19 22:37:31 +02:00
|
|
|
int
|
2016-06-21 23:06:15 +02:00
|
|
|
smc_zkp_2dle_check (const gcry_mpi_point_t v,
|
|
|
|
const gcry_mpi_point_t w,
|
|
|
|
const gcry_mpi_point_t g1,
|
|
|
|
const gcry_mpi_point_t g2,
|
|
|
|
const struct proof_2dle *proof)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-21 16:12:57 +02:00
|
|
|
int ret;
|
|
|
|
struct zkp_challenge_2dle challenge;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t a = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t b = gcry_mpi_point_new (0);
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t r = gcry_mpi_new (256);
|
2016-08-03 12:26:27 +02:00
|
|
|
gcry_mpi_t c;
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_point_t left = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t right = gcry_mpi_point_new (0);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
mpi_parse (r, &proof->r);
|
|
|
|
ec_point_parse (a, &proof->a);
|
|
|
|
ec_point_parse (b, &proof->b);
|
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
/* compute challenge c */
|
|
|
|
ec_point_serialize (&challenge.g1, g1);
|
|
|
|
ec_point_serialize (&challenge.g2, g2);
|
|
|
|
ec_point_serialize (&challenge.v, v);
|
|
|
|
ec_point_serialize (&challenge.w, w);
|
|
|
|
ec_point_serialize (&challenge.a, a);
|
|
|
|
ec_point_serialize (&challenge.b, b);
|
2016-08-03 12:26:51 +02:00
|
|
|
GNUNET_CRYPTO_kdf_mod_mpi (&c,
|
|
|
|
ec_n,
|
|
|
|
NULL,
|
|
|
|
0,
|
|
|
|
&challenge,
|
|
|
|
sizeof (challenge),
|
|
|
|
"libbrandt zkp 2dle");
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
/* r*g1 =? a + cv */
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_ec_mul (left, r, g1, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (right, c, v, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, a, right, ec_ctx);
|
|
|
|
ret = ec_point_cmp (left, right);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
/* r*g2 =? b + cw */
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_ec_mul (left, r, g2, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (right, c, w, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, b, right, ec_ctx);
|
|
|
|
ret |= ec_point_cmp (left, right);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_release (a);
|
|
|
|
gcry_mpi_point_release (b);
|
|
|
|
gcry_mpi_release (r);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_release (c);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_point_release (left);
|
|
|
|
gcry_mpi_point_release (right);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* smc_zkp_0og encrypts one of two values and creates a proof that the
|
|
|
|
* ciphertext decrypts to either one of those two values without revealing which
|
|
|
|
* one was encrypted. The two values are the zero point or the base point of the
|
|
|
|
* Ed25519 curve. Encryption is done via ElGamal: \f$(\alpha,\beta)=(m+ry,rg)\f$
|
|
|
|
* where \f$m\f$ is the value to encrypt, \f$y\f$ is the public key and \f$g\f$
|
|
|
|
* is the base point. The nonce \f$r\f$ is generated as well and can be returned
|
|
|
|
* to the caller if he needs it (e.g. for another proof).
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[in] m_is_gen if true, the base point is encrypted, else the zero point
|
|
|
|
* is encrypted.
|
|
|
|
* @param[in] y public key to use for encryption.
|
|
|
|
* @param[out] r random number used for encryption. May be NULL if caller
|
|
|
|
* doesn't need it.
|
|
|
|
* @param[out] alpha first part of the ciphertext output
|
|
|
|
* @param[out] beta second part of the ciphertext output
|
|
|
|
* @param[out] proof pointer where to save the output proof structure. Must be
|
|
|
|
* shared with the verifier.
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-06-19 22:37:31 +02:00
|
|
|
void
|
2016-06-21 23:06:15 +02:00
|
|
|
smc_zkp_0og (int m_is_gen,
|
2016-06-19 22:37:31 +02:00
|
|
|
const gcry_mpi_point_t y,
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_t r,
|
|
|
|
gcry_mpi_point_t alpha,
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_point_t beta,
|
2016-06-21 23:06:15 +02:00
|
|
|
struct proof_0og *proof)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-21 16:12:57 +02:00
|
|
|
struct zkp_challenge_0og challenge;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t a1 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t a2 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t b1 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t b2 = gcry_mpi_point_new (0);
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t d1 = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t d2 = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t r1 = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t r2 = gcry_mpi_new (256);
|
2016-08-03 12:26:27 +02:00
|
|
|
gcry_mpi_t c;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_t rr;
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t w = gcry_mpi_new (256);
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-07-13 14:01:24 +02:00
|
|
|
rr = (NULL == r) ? gcry_mpi_new (256) : r;
|
2016-06-19 22:37:31 +02:00
|
|
|
|
|
|
|
/* beta = r*g */
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_keypair_create (beta, rr);
|
|
|
|
gcry_mpi_mod (rr, rr, ec_n);
|
2016-06-19 22:37:31 +02:00
|
|
|
|
|
|
|
/* alpha = m + r*y */
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_ec_mul (alpha, rr, y, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (alpha, m_is_gen ? ec_gen : ec_zero, alpha, ec_ctx);
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
if (!m_is_gen)
|
2016-06-19 22:37:31 +02:00
|
|
|
{ /* m == 0 */
|
|
|
|
ec_keypair_create_base (a1, d1, beta);
|
|
|
|
gcry_mpi_mod (d1, d1, ec_n);
|
|
|
|
ec_keypair_create_base (b1, r1, y);
|
|
|
|
gcry_mpi_mod (r1, r1, ec_n);
|
|
|
|
|
|
|
|
/* a1 = r1*g + d1*beta */
|
|
|
|
gcry_mpi_ec_mul (a2, r1, ec_gen, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (a1, a2, a1, ec_ctx);
|
|
|
|
|
|
|
|
/* b1 = r1*y + d1*(alpha-g) */
|
|
|
|
gcry_mpi_ec_sub (b2, alpha, ec_gen, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (a2, d1, b2, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (b1, b1, a2, ec_ctx);
|
|
|
|
|
|
|
|
/* a2 = w * g */
|
|
|
|
ec_keypair_create_base (a2, w, ec_gen);
|
|
|
|
gcry_mpi_mod (w, w, ec_n);
|
|
|
|
|
|
|
|
/* b2 = w * y */
|
|
|
|
gcry_mpi_ec_mul (b2, w, y, ec_ctx);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{ /* m == g */
|
|
|
|
ec_keypair_create_base (a2, d2, beta);
|
|
|
|
gcry_mpi_mod (d2, d2, ec_n);
|
|
|
|
ec_keypair_create_base (b2, r2, y);
|
|
|
|
gcry_mpi_mod (r2, r2, ec_n);
|
|
|
|
|
|
|
|
/* a2 = r2*g + d2*beta */
|
|
|
|
gcry_mpi_ec_mul (a1, r2, ec_gen, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (a2, a1, a2, ec_ctx);
|
|
|
|
|
|
|
|
/* b2 = r2*y + d2*(alpha-0) */
|
|
|
|
/* useless subtraction to have same amount of operations as in m == 0 */
|
|
|
|
gcry_mpi_ec_sub (b1, alpha, ec_zero, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (a1, d2, b1, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (b2, b2, a1, ec_ctx);
|
|
|
|
|
|
|
|
/* a1 = w * g */
|
|
|
|
ec_keypair_create_base (a1, w, ec_gen);
|
|
|
|
gcry_mpi_mod (w, w, ec_n);
|
|
|
|
|
|
|
|
/* b1 = w * y */
|
|
|
|
gcry_mpi_ec_mul (b1, w, y, ec_ctx);
|
2016-06-21 16:12:57 +02:00
|
|
|
}
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
/* compute challenge c */
|
|
|
|
ec_point_serialize (&challenge.g, ec_gen);
|
|
|
|
ec_point_serialize (&challenge.alpha, alpha);
|
|
|
|
ec_point_serialize (&challenge.beta, beta);
|
|
|
|
ec_point_serialize (&challenge.a1, a1);
|
|
|
|
ec_point_serialize (&challenge.a2, a2);
|
|
|
|
ec_point_serialize (&challenge.b1, b1);
|
|
|
|
ec_point_serialize (&challenge.b2, b2);
|
2016-08-03 12:26:51 +02:00
|
|
|
GNUNET_CRYPTO_kdf_mod_mpi (&c,
|
|
|
|
ec_n,
|
|
|
|
NULL,
|
|
|
|
0,
|
|
|
|
&challenge,
|
|
|
|
sizeof (challenge),
|
|
|
|
"libbrandt zkp 0og");
|
2016-06-19 22:37:31 +02:00
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
if (!m_is_gen)
|
2016-06-21 16:12:57 +02:00
|
|
|
{ /* m == 0 */
|
|
|
|
/* d2 = c - d1 */
|
|
|
|
gcry_mpi_subm (d2, c, d1, ec_n);
|
|
|
|
|
|
|
|
/* r2 = w - r*d2 */
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_mulm (r2, rr, d2, ec_n);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_subm (r2, w, r2, ec_n);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{ /* m == g */
|
2016-06-19 22:37:31 +02:00
|
|
|
/* d1 = c - d2 */
|
|
|
|
gcry_mpi_subm (d1, c, d2, ec_n);
|
|
|
|
|
|
|
|
/* r1 = w - r*d1 */
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_mulm (r1, rr, d1, ec_n);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_subm (r1, w, r1, ec_n);
|
|
|
|
}
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_point_serialize (&proof->a1, a1);
|
|
|
|
ec_point_serialize (&proof->a2, a2);
|
|
|
|
ec_point_serialize (&proof->b1, b1);
|
|
|
|
ec_point_serialize (&proof->b2, b2);
|
|
|
|
mpi_serialize (&proof->d1, d1);
|
|
|
|
mpi_serialize (&proof->d2, d2);
|
|
|
|
mpi_serialize (&proof->r1, r1);
|
|
|
|
mpi_serialize (&proof->r2, r2);
|
|
|
|
|
|
|
|
gcry_mpi_point_release (a1);
|
|
|
|
gcry_mpi_point_release (a2);
|
|
|
|
gcry_mpi_point_release (b1);
|
|
|
|
gcry_mpi_point_release (b2);
|
|
|
|
gcry_mpi_release (d1);
|
|
|
|
gcry_mpi_release (d2);
|
|
|
|
gcry_mpi_release (r1);
|
|
|
|
gcry_mpi_release (r2);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_release (c);
|
2016-06-21 23:06:15 +02:00
|
|
|
if (NULL == r)
|
|
|
|
gcry_mpi_release (rr);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_release (w);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2016-06-21 00:20:47 +02:00
|
|
|
/**
|
2016-06-21 23:06:15 +02:00
|
|
|
* smc_zkp_0og_check verifies a proof that \f$(\alpha,\beta\f$ decrypts either
|
|
|
|
* to the base point \f$g\f$ or the zero point.
|
2016-06-21 00:20:47 +02:00
|
|
|
*
|
2016-06-21 23:06:15 +02:00
|
|
|
* @param[in] y the public key used for encryption
|
|
|
|
* @param[in] alpha first part of the ciphertext
|
|
|
|
* @param[in] beta second part of the ciphertext
|
|
|
|
* @param[in] proof pointer to the proof structure. Received from the prover.
|
|
|
|
* @return 0 if the proof is correct, something else otherwise
|
2016-06-21 00:20:47 +02:00
|
|
|
*/
|
2016-06-19 22:37:31 +02:00
|
|
|
int
|
2016-06-21 23:06:15 +02:00
|
|
|
smc_zkp_0og_check (const gcry_mpi_point_t y,
|
|
|
|
const gcry_mpi_point_t alpha,
|
2016-06-19 22:37:31 +02:00
|
|
|
const gcry_mpi_point_t beta,
|
2016-06-21 23:06:15 +02:00
|
|
|
const struct proof_0og *proof)
|
2016-06-19 22:37:31 +02:00
|
|
|
{
|
2016-06-21 16:12:57 +02:00
|
|
|
int ret;
|
|
|
|
struct zkp_challenge_0og challenge;
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_t a1 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t a2 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t b1 = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t b2 = gcry_mpi_point_new (0);
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t d1 = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t d2 = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t r1 = gcry_mpi_new (256);
|
|
|
|
gcry_mpi_t r2 = gcry_mpi_new (256);
|
2016-08-03 12:26:27 +02:00
|
|
|
gcry_mpi_t c;
|
2016-07-13 14:01:24 +02:00
|
|
|
gcry_mpi_t sum = gcry_mpi_new (256);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_point_t right = gcry_mpi_point_new (0);
|
|
|
|
gcry_mpi_point_t tmp = gcry_mpi_point_new (0);
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
ec_point_parse (a1, &proof->a1);
|
|
|
|
ec_point_parse (a2, &proof->a2);
|
|
|
|
ec_point_parse (b1, &proof->b1);
|
|
|
|
ec_point_parse (b2, &proof->b2);
|
|
|
|
mpi_parse (d1, &proof->d1);
|
|
|
|
mpi_parse (d2, &proof->d2);
|
|
|
|
mpi_parse (r1, &proof->r1);
|
|
|
|
mpi_parse (r2, &proof->r2);
|
|
|
|
|
2016-06-21 16:12:57 +02:00
|
|
|
/* compute challenge c */
|
|
|
|
ec_point_serialize (&challenge.g, ec_gen);
|
|
|
|
ec_point_serialize (&challenge.alpha, alpha);
|
|
|
|
ec_point_serialize (&challenge.beta, beta);
|
|
|
|
ec_point_serialize (&challenge.a1, a1);
|
|
|
|
ec_point_serialize (&challenge.a2, a2);
|
|
|
|
ec_point_serialize (&challenge.b1, b1);
|
|
|
|
ec_point_serialize (&challenge.b2, b2);
|
2016-08-03 12:26:51 +02:00
|
|
|
GNUNET_CRYPTO_kdf_mod_mpi (&c,
|
|
|
|
ec_n,
|
|
|
|
NULL,
|
|
|
|
0,
|
|
|
|
&challenge,
|
|
|
|
sizeof (challenge),
|
|
|
|
"libbrandt zkp 0og");
|
2016-06-19 22:37:31 +02:00
|
|
|
|
|
|
|
/* c == d1 + d2 */
|
|
|
|
gcry_mpi_addm (sum, d1, d2, ec_n);
|
|
|
|
ret = gcry_mpi_cmp (c, sum);
|
|
|
|
|
|
|
|
/* a1 == r1*g + d1*beta */
|
|
|
|
gcry_mpi_ec_mul (tmp, r1, ec_gen, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (right, d1, beta, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, tmp, right, ec_ctx);
|
|
|
|
ret |= ec_point_cmp (a1, right) << 1;
|
|
|
|
|
|
|
|
/* b1 == r1*y + d1*(alpha-g) */
|
|
|
|
gcry_mpi_ec_sub (right, alpha, ec_gen, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (tmp, d1, right, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (right, r1, y, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, right, tmp, ec_ctx);
|
|
|
|
ret |= ec_point_cmp (b1, right) << 2;
|
|
|
|
|
|
|
|
/* a2 == r2*g + d2*beta */
|
|
|
|
gcry_mpi_ec_mul (tmp, d2, beta, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (right, r2, ec_gen, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, right, tmp, ec_ctx);
|
|
|
|
ret |= ec_point_cmp (a2, right) << 3;
|
|
|
|
|
|
|
|
/* b2 == r2*y + d2*alpha */
|
|
|
|
gcry_mpi_ec_mul (tmp, d2, alpha, ec_ctx);
|
|
|
|
gcry_mpi_ec_mul (right, r2, y, ec_ctx);
|
|
|
|
gcry_mpi_ec_add (right, right, tmp, ec_ctx);
|
|
|
|
ret |= ec_point_cmp (b2, right) << 4;
|
|
|
|
|
2016-06-21 23:06:15 +02:00
|
|
|
gcry_mpi_point_release (a1);
|
|
|
|
gcry_mpi_point_release (a2);
|
|
|
|
gcry_mpi_point_release (b1);
|
|
|
|
gcry_mpi_point_release (b2);
|
|
|
|
gcry_mpi_release (d1);
|
|
|
|
gcry_mpi_release (d2);
|
|
|
|
gcry_mpi_release (r1);
|
|
|
|
gcry_mpi_release (r2);
|
2016-06-21 16:12:57 +02:00
|
|
|
gcry_mpi_release (c);
|
2016-06-19 22:37:31 +02:00
|
|
|
gcry_mpi_release (sum);
|
|
|
|
gcry_mpi_point_release (right);
|
|
|
|
gcry_mpi_point_release (tmp);
|
|
|
|
|
|
|
|
if (ret)
|
|
|
|
weprintf ("ret: 0x%x", ret);
|
|
|
|
return ret;
|
|
|
|
}
|