charm-crypto-framework 0.61.1__cp313-cp313-macosx_10_13_universal2.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- charm/__init__.py +5 -0
- charm/adapters/__init__.py +0 -0
- charm/adapters/abenc_adapt_hybrid.py +90 -0
- charm/adapters/dabenc_adapt_hybrid.py +145 -0
- charm/adapters/ibenc_adapt_hybrid.py +72 -0
- charm/adapters/ibenc_adapt_identityhash.py +80 -0
- charm/adapters/kpabenc_adapt_hybrid.py +91 -0
- charm/adapters/pkenc_adapt_bchk05.py +121 -0
- charm/adapters/pkenc_adapt_chk04.py +91 -0
- charm/adapters/pkenc_adapt_hybrid.py +98 -0
- charm/adapters/pksig_adapt_naor01.py +89 -0
- charm/config.py +7 -0
- charm/core/__init__.py +0 -0
- charm/core/benchmark/benchmark_util.c +353 -0
- charm/core/benchmark/benchmark_util.h +61 -0
- charm/core/benchmark/benchmarkmodule.c +476 -0
- charm/core/benchmark/benchmarkmodule.h +162 -0
- charm/core/benchmark.cpython-313-darwin.so +0 -0
- charm/core/crypto/AES/AES.c +1464 -0
- charm/core/crypto/AES.cpython-313-darwin.so +0 -0
- charm/core/crypto/DES/DES.c +113 -0
- charm/core/crypto/DES.cpython-313-darwin.so +0 -0
- charm/core/crypto/DES3/DES3.c +26 -0
- charm/core/crypto/DES3.cpython-313-darwin.so +0 -0
- charm/core/crypto/__init__.py +0 -0
- charm/core/crypto/cryptobase/XOR.c +80 -0
- charm/core/crypto/cryptobase/_counter.c +496 -0
- charm/core/crypto/cryptobase/_counter.h +54 -0
- charm/core/crypto/cryptobase/block_template.c +900 -0
- charm/core/crypto/cryptobase/block_template.h +69 -0
- charm/core/crypto/cryptobase/cryptobasemodule.c +220 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt.h +90 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_argchk.h +44 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_cfg.h +186 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_cipher.h +941 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_custom.h +556 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_des.c +1912 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_hash.h +407 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_mac.h +496 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_macros.h +435 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_math.h +534 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_misc.h +103 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_pk.h +653 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_pkcs.h +90 -0
- charm/core/crypto/cryptobase/libtom/tomcrypt_prng.h +199 -0
- charm/core/crypto/cryptobase/stream_template.c +271 -0
- charm/core/crypto/cryptobase/strxor.c +229 -0
- charm/core/crypto/cryptobase.cpython-313-darwin.so +0 -0
- charm/core/engine/__init__.py +5 -0
- charm/core/engine/protocol.py +293 -0
- charm/core/engine/util.py +174 -0
- charm/core/math/__init__.py +0 -0
- charm/core/math/elliptic_curve/ecmodule.c +1986 -0
- charm/core/math/elliptic_curve/ecmodule.h +230 -0
- charm/core/math/elliptic_curve.cpython-313-darwin.so +0 -0
- charm/core/math/elliptic_curve.pyi +63 -0
- charm/core/math/integer/integermodule.c +2539 -0
- charm/core/math/integer/integermodule.h +145 -0
- charm/core/math/integer.cpython-313-darwin.so +0 -0
- charm/core/math/integer.pyi +76 -0
- charm/core/math/pairing/miracl/miracl_config.h +37 -0
- charm/core/math/pairing/miracl/miracl_interface.h +118 -0
- charm/core/math/pairing/miracl/miracl_interface2.h +126 -0
- charm/core/math/pairing/miracl/pairingmodule2.c +2094 -0
- charm/core/math/pairing/miracl/pairingmodule2.h +307 -0
- charm/core/math/pairing/pairingmodule.c +2230 -0
- charm/core/math/pairing/pairingmodule.h +241 -0
- charm/core/math/pairing/relic/pairingmodule3.c +1853 -0
- charm/core/math/pairing/relic/pairingmodule3.h +233 -0
- charm/core/math/pairing/relic/relic_interface.c +1337 -0
- charm/core/math/pairing/relic/relic_interface.h +217 -0
- charm/core/math/pairing/relic/test_relic.c +171 -0
- charm/core/math/pairing.cpython-313-darwin.so +0 -0
- charm/core/math/pairing.pyi +69 -0
- charm/core/utilities/base64.c +248 -0
- charm/core/utilities/base64.h +15 -0
- charm/schemes/__init__.py +0 -0
- charm/schemes/abenc/__init__.py +0 -0
- charm/schemes/abenc/abenc_accountability_jyjxgd20.py +647 -0
- charm/schemes/abenc/abenc_bsw07.py +146 -0
- charm/schemes/abenc/abenc_ca_cpabe_ar17.py +684 -0
- charm/schemes/abenc/abenc_dacmacs_yj14.py +298 -0
- charm/schemes/abenc/abenc_lsw08.py +159 -0
- charm/schemes/abenc/abenc_maabe_rw15.py +236 -0
- charm/schemes/abenc/abenc_maabe_yj14.py +297 -0
- charm/schemes/abenc/abenc_tbpre_lww14.py +309 -0
- charm/schemes/abenc/abenc_unmcpabe_yahk14.py +223 -0
- charm/schemes/abenc/abenc_waters09.py +144 -0
- charm/schemes/abenc/abenc_yct14.py +208 -0
- charm/schemes/abenc/abenc_yllc15.py +178 -0
- charm/schemes/abenc/ac17.py +248 -0
- charm/schemes/abenc/bsw07.py +141 -0
- charm/schemes/abenc/cgw15.py +277 -0
- charm/schemes/abenc/dabe_aw11.py +204 -0
- charm/schemes/abenc/dfa_fe12.py +144 -0
- charm/schemes/abenc/pk_hve08.py +179 -0
- charm/schemes/abenc/waters11.py +143 -0
- charm/schemes/aggrsign_MuSig.py +150 -0
- charm/schemes/aggrsign_bls.py +267 -0
- charm/schemes/blindsig_ps16.py +654 -0
- charm/schemes/chamhash_adm05.py +113 -0
- charm/schemes/chamhash_rsa_hw09.py +100 -0
- charm/schemes/commit/__init__.py +0 -0
- charm/schemes/commit/commit_gs08.py +77 -0
- charm/schemes/commit/commit_pedersen92.py +53 -0
- charm/schemes/encap_bchk05.py +62 -0
- charm/schemes/grpsig/__init__.py +0 -0
- charm/schemes/grpsig/groupsig_bgls04.py +114 -0
- charm/schemes/grpsig/groupsig_bgls04_var.py +115 -0
- charm/schemes/hibenc/__init__.py +0 -0
- charm/schemes/hibenc/hibenc_bb04.py +105 -0
- charm/schemes/hibenc/hibenc_lew11.py +193 -0
- charm/schemes/ibenc/__init__.py +0 -0
- charm/schemes/ibenc/clpkc_rp03.py +119 -0
- charm/schemes/ibenc/ibenc_CW13_z.py +168 -0
- charm/schemes/ibenc/ibenc_bb03.py +94 -0
- charm/schemes/ibenc/ibenc_bf01.py +121 -0
- charm/schemes/ibenc/ibenc_ckrs09.py +120 -0
- charm/schemes/ibenc/ibenc_cllww12_z.py +172 -0
- charm/schemes/ibenc/ibenc_lsw08.py +120 -0
- charm/schemes/ibenc/ibenc_sw05.py +238 -0
- charm/schemes/ibenc/ibenc_waters05.py +144 -0
- charm/schemes/ibenc/ibenc_waters05_z.py +164 -0
- charm/schemes/ibenc/ibenc_waters09.py +107 -0
- charm/schemes/ibenc/ibenc_waters09_z.py +147 -0
- charm/schemes/joye_scheme.py +106 -0
- charm/schemes/lem_scheme.py +207 -0
- charm/schemes/pk_fre_ccv11.py +107 -0
- charm/schemes/pk_vrf.py +127 -0
- charm/schemes/pkenc/__init__.py +0 -0
- charm/schemes/pkenc/pkenc_cs98.py +108 -0
- charm/schemes/pkenc/pkenc_elgamal85.py +122 -0
- charm/schemes/pkenc/pkenc_gm82.py +98 -0
- charm/schemes/pkenc/pkenc_paillier99.py +118 -0
- charm/schemes/pkenc/pkenc_rabin.py +254 -0
- charm/schemes/pkenc/pkenc_rsa.py +186 -0
- charm/schemes/pksig/__init__.py +0 -0
- charm/schemes/pksig/pksig_CW13_z.py +135 -0
- charm/schemes/pksig/pksig_bls04.py +87 -0
- charm/schemes/pksig/pksig_boyen.py +156 -0
- charm/schemes/pksig/pksig_chch.py +97 -0
- charm/schemes/pksig/pksig_chp.py +70 -0
- charm/schemes/pksig/pksig_cl03.py +150 -0
- charm/schemes/pksig/pksig_cl04.py +87 -0
- charm/schemes/pksig/pksig_cllww12_z.py +142 -0
- charm/schemes/pksig/pksig_cyh.py +132 -0
- charm/schemes/pksig/pksig_dsa.py +76 -0
- charm/schemes/pksig/pksig_ecdsa.py +71 -0
- charm/schemes/pksig/pksig_hess.py +104 -0
- charm/schemes/pksig/pksig_hw.py +110 -0
- charm/schemes/pksig/pksig_lamport.py +63 -0
- charm/schemes/pksig/pksig_ps01.py +135 -0
- charm/schemes/pksig/pksig_ps02.py +124 -0
- charm/schemes/pksig/pksig_ps03.py +119 -0
- charm/schemes/pksig/pksig_rsa_hw09.py +206 -0
- charm/schemes/pksig/pksig_schnorr91.py +77 -0
- charm/schemes/pksig/pksig_waters.py +115 -0
- charm/schemes/pksig/pksig_waters05.py +121 -0
- charm/schemes/pksig/pksig_waters09.py +121 -0
- charm/schemes/pre_mg07.py +150 -0
- charm/schemes/prenc/pre_afgh06.py +126 -0
- charm/schemes/prenc/pre_bbs98.py +123 -0
- charm/schemes/prenc/pre_nal16.py +216 -0
- charm/schemes/protocol_a01.py +272 -0
- charm/schemes/protocol_ao00.py +215 -0
- charm/schemes/protocol_cns07.py +274 -0
- charm/schemes/protocol_schnorr91.py +125 -0
- charm/schemes/sigma1.py +64 -0
- charm/schemes/sigma2.py +129 -0
- charm/schemes/sigma3.py +126 -0
- charm/schemes/threshold/__init__.py +59 -0
- charm/schemes/threshold/dkls23_dkg.py +556 -0
- charm/schemes/threshold/dkls23_presign.py +1089 -0
- charm/schemes/threshold/dkls23_sign.py +761 -0
- charm/schemes/threshold/xrpl_wallet.py +967 -0
- charm/test/__init__.py +0 -0
- charm/test/adapters/__init__.py +0 -0
- charm/test/adapters/abenc_adapt_hybrid_test.py +29 -0
- charm/test/adapters/dabenc_adapt_hybrid_test.py +56 -0
- charm/test/adapters/ibenc_adapt_hybrid_test.py +36 -0
- charm/test/adapters/ibenc_adapt_identityhash_test.py +32 -0
- charm/test/adapters/kpabenc_adapt_hybrid_test.py +30 -0
- charm/test/benchmark/abenc_yllc15_bench.py +92 -0
- charm/test/benchmark/benchmark_test.py +148 -0
- charm/test/benchmark_threshold.py +260 -0
- charm/test/conftest.py +38 -0
- charm/test/fuzz/__init__.py +1 -0
- charm/test/fuzz/conftest.py +5 -0
- charm/test/fuzz/fuzz_policy_parser.py +76 -0
- charm/test/fuzz/fuzz_serialization.py +83 -0
- charm/test/schemes/__init__.py +0 -0
- charm/test/schemes/abenc/__init__.py +0 -0
- charm/test/schemes/abenc/abenc_bsw07_test.py +39 -0
- charm/test/schemes/abenc/abenc_dacmacs_yj14_test.py +16 -0
- charm/test/schemes/abenc/abenc_lsw08_test.py +33 -0
- charm/test/schemes/abenc/abenc_maabe_yj14_test.py +16 -0
- charm/test/schemes/abenc/abenc_tbpre_lww14_test.py +16 -0
- charm/test/schemes/abenc/abenc_waters09_test.py +38 -0
- charm/test/schemes/abenc/abenc_yllc15_test.py +74 -0
- charm/test/schemes/chamhash_adm05_test.py +31 -0
- charm/test/schemes/chamhash_rsa_hw09_test.py +29 -0
- charm/test/schemes/commit/__init__.py +0 -0
- charm/test/schemes/commit/commit_gs08_test.py +24 -0
- charm/test/schemes/commit/commit_pedersen92_test.py +26 -0
- charm/test/schemes/dabe_aw11_test.py +45 -0
- charm/test/schemes/encap_bchk05_test.py +21 -0
- charm/test/schemes/grpsig/__init__.py +0 -0
- charm/test/schemes/grpsig/groupsig_bgls04_test.py +35 -0
- charm/test/schemes/grpsig/groupsig_bgls04_var_test.py +39 -0
- charm/test/schemes/hibenc/__init__.py +0 -0
- charm/test/schemes/hibenc/hibenc_bb04_test.py +28 -0
- charm/test/schemes/ibenc/__init__.py +0 -0
- charm/test/schemes/ibenc/ibenc_bb03_test.py +26 -0
- charm/test/schemes/ibenc/ibenc_bf01_test.py +24 -0
- charm/test/schemes/ibenc/ibenc_ckrs09_test.py +25 -0
- charm/test/schemes/ibenc/ibenc_lsw08_test.py +31 -0
- charm/test/schemes/ibenc/ibenc_sw05_test.py +32 -0
- charm/test/schemes/ibenc/ibenc_waters05_test.py +31 -0
- charm/test/schemes/ibenc/ibenc_waters09_test.py +27 -0
- charm/test/schemes/pk_vrf_test.py +29 -0
- charm/test/schemes/pkenc/__init__.py +0 -0
- charm/test/schemes/pkenc_test.py +255 -0
- charm/test/schemes/pksig/__init__.py +0 -0
- charm/test/schemes/pksig_test.py +376 -0
- charm/test/schemes/rsa_alg_test.py +340 -0
- charm/test/schemes/threshold_test.py +1792 -0
- charm/test/serialize/__init__.py +0 -0
- charm/test/serialize/serialize_test.py +40 -0
- charm/test/toolbox/__init__.py +0 -0
- charm/test/toolbox/conversion_test.py +30 -0
- charm/test/toolbox/ecgroup_test.py +53 -0
- charm/test/toolbox/integer_arithmetic_test.py +441 -0
- charm/test/toolbox/paddingschemes_test.py +238 -0
- charm/test/toolbox/policy_parser_stress_test.py +969 -0
- charm/test/toolbox/secretshare_test.py +28 -0
- charm/test/toolbox/symcrypto_test.py +108 -0
- charm/test/toolbox/test_policy_expression.py +16 -0
- charm/test/vectors/__init__.py +1 -0
- charm/test/vectors/test_bls_vectors.py +289 -0
- charm/test/vectors/test_pedersen_vectors.py +315 -0
- charm/test/vectors/test_schnorr_vectors.py +368 -0
- charm/test/zkp_compiler/__init__.py +9 -0
- charm/test/zkp_compiler/benchmark_zkp.py +258 -0
- charm/test/zkp_compiler/test_and_proof.py +240 -0
- charm/test/zkp_compiler/test_batch_verify.py +248 -0
- charm/test/zkp_compiler/test_dleq_proof.py +264 -0
- charm/test/zkp_compiler/test_or_proof.py +231 -0
- charm/test/zkp_compiler/test_proof_serialization.py +121 -0
- charm/test/zkp_compiler/test_range_proof.py +241 -0
- charm/test/zkp_compiler/test_representation_proof.py +325 -0
- charm/test/zkp_compiler/test_schnorr_proof.py +221 -0
- charm/test/zkp_compiler/test_thread_safety.py +169 -0
- charm/test/zkp_compiler/test_zkp_parser.py +139 -0
- charm/toolbox/ABEnc.py +26 -0
- charm/toolbox/ABEncMultiAuth.py +66 -0
- charm/toolbox/ABEnumeric.py +800 -0
- charm/toolbox/Commit.py +24 -0
- charm/toolbox/DFA.py +89 -0
- charm/toolbox/FSA.py +1254 -0
- charm/toolbox/Hash.py +39 -0
- charm/toolbox/IBEnc.py +62 -0
- charm/toolbox/IBSig.py +64 -0
- charm/toolbox/PKEnc.py +66 -0
- charm/toolbox/PKSig.py +56 -0
- charm/toolbox/PREnc.py +32 -0
- charm/toolbox/ZKProof.py +289 -0
- charm/toolbox/__init__.py +0 -0
- charm/toolbox/bitstring.py +49 -0
- charm/toolbox/broadcast.py +220 -0
- charm/toolbox/conversion.py +100 -0
- charm/toolbox/eccurve.py +149 -0
- charm/toolbox/ecgroup.py +143 -0
- charm/toolbox/enum.py +60 -0
- charm/toolbox/hash_module.py +91 -0
- charm/toolbox/integergroup.py +323 -0
- charm/toolbox/iterate.py +22 -0
- charm/toolbox/matrixops.py +76 -0
- charm/toolbox/mpc_utils.py +296 -0
- charm/toolbox/msp.py +175 -0
- charm/toolbox/mta.py +985 -0
- charm/toolbox/node.py +120 -0
- charm/toolbox/ot/__init__.py +22 -0
- charm/toolbox/ot/base_ot.py +374 -0
- charm/toolbox/ot/dpf.py +642 -0
- charm/toolbox/ot/mpfss.py +228 -0
- charm/toolbox/ot/ot_extension.py +589 -0
- charm/toolbox/ot/silent_ot.py +378 -0
- charm/toolbox/paddingschemes.py +423 -0
- charm/toolbox/paddingschemes_test.py +238 -0
- charm/toolbox/pairingcurves.py +85 -0
- charm/toolbox/pairinggroup.py +186 -0
- charm/toolbox/policy_expression_spec.py +70 -0
- charm/toolbox/policytree.py +189 -0
- charm/toolbox/reCompiler.py +346 -0
- charm/toolbox/redundancyschemes.py +65 -0
- charm/toolbox/schemebase.py +188 -0
- charm/toolbox/secretshare.py +104 -0
- charm/toolbox/secretutil.py +174 -0
- charm/toolbox/securerandom.py +73 -0
- charm/toolbox/sigmaprotocol.py +46 -0
- charm/toolbox/specialprimes.py +45 -0
- charm/toolbox/symcrypto.py +279 -0
- charm/toolbox/threshold_sharing.py +553 -0
- charm/toolbox/xmlserialize.py +94 -0
- charm/toolbox/zknode.py +105 -0
- charm/zkp_compiler/__init__.py +89 -0
- charm/zkp_compiler/and_proof.py +460 -0
- charm/zkp_compiler/batch_verify.py +324 -0
- charm/zkp_compiler/dleq_proof.py +423 -0
- charm/zkp_compiler/or_proof.py +305 -0
- charm/zkp_compiler/range_proof.py +417 -0
- charm/zkp_compiler/representation_proof.py +466 -0
- charm/zkp_compiler/schnorr_proof.py +273 -0
- charm/zkp_compiler/thread_safe.py +150 -0
- charm/zkp_compiler/zk_demo.py +489 -0
- charm/zkp_compiler/zkp_factory.py +330 -0
- charm/zkp_compiler/zkp_generator.py +370 -0
- charm/zkp_compiler/zkparser.py +269 -0
- charm_crypto_framework-0.61.1.dist-info/METADATA +337 -0
- charm_crypto_framework-0.61.1.dist-info/RECORD +323 -0
- charm_crypto_framework-0.61.1.dist-info/WHEEL +5 -0
- charm_crypto_framework-0.61.1.dist-info/licenses/LICENSE.txt +165 -0
- charm_crypto_framework-0.61.1.dist-info/top_level.txt +1 -0
|
@@ -0,0 +1,216 @@
|
|
|
1
|
+
'''
|
|
2
|
+
**NAL Proxy Re-Encryption (NAL16)**
|
|
3
|
+
|
|
4
|
+
*Authors:* Nuñez, Agudo, Lopez
|
|
5
|
+
|
|
6
|
+
| **Title:** "On the Application of Generic CCA-Secure Transformations to Proxy Re-Encryption"
|
|
7
|
+
| **Published in:** Security and Communication Networks, 2016
|
|
8
|
+
| **Available from:** http://onlinelibrary.wiley.com/doi/10.1002/sec.1434/full
|
|
9
|
+
| **Notes:** First-level encryption & second-level decryption not yet implemented; type annotations to-do
|
|
10
|
+
|
|
11
|
+
.. rubric:: Scheme Properties
|
|
12
|
+
|
|
13
|
+
* **Type:** proxy re-encryption
|
|
14
|
+
* **Setting:** Pairing groups (Type 1 "symmetric")
|
|
15
|
+
* **Assumption:** 3-wDBDHI (3-weak Decisional Bilinear DH Inversion)
|
|
16
|
+
* **Properties:** CCA_21-secure, unidirectional, single-hop, non-interactive, collusion-resistant
|
|
17
|
+
|
|
18
|
+
.. rubric:: Implementation
|
|
19
|
+
|
|
20
|
+
:Authors: D. Nuñez
|
|
21
|
+
:Date: 04/2016
|
|
22
|
+
'''
|
|
23
|
+
|
|
24
|
+
from charm.toolbox.pairinggroup import PairingGroup,ZR,G1,G2,GT,pair
|
|
25
|
+
from charm.toolbox.PREnc import PREnc
|
|
26
|
+
from charm.toolbox.hash_module import Hash,int2Bytes,integer
|
|
27
|
+
|
|
28
|
+
debug = False
|
|
29
|
+
class NAL16a(PREnc):
|
|
30
|
+
"""
|
|
31
|
+
Testing NAL16a implementation
|
|
32
|
+
|
|
33
|
+
>>> from charm.toolbox.pairinggroup import PairingGroup,ZR,G1,G2,GT,pair
|
|
34
|
+
>>> groupObj = PairingGroup('SS512')
|
|
35
|
+
>>> pre = NAL16a(groupObj)
|
|
36
|
+
>>> params = pre.setup()
|
|
37
|
+
>>> (pk_a, sk_a) = pre.keygen(params)
|
|
38
|
+
>>> (pk_b, sk_b) = pre.keygen(params)
|
|
39
|
+
>>> msg = groupObj.random(GT)
|
|
40
|
+
>>> c_a = pre.encrypt(params, pk_a, msg)
|
|
41
|
+
>>> rk = pre.rekeygen(params, pk_a, sk_a, pk_b, sk_b)
|
|
42
|
+
>>> c_b = pre.re_encrypt(params, rk, c_a)
|
|
43
|
+
>>> assert msg == pre.decrypt(params, sk_b, c_b), 'Decryption of re-encrypted ciphertext was incorrect'
|
|
44
|
+
"""
|
|
45
|
+
|
|
46
|
+
def __init__(self, groupObj):
|
|
47
|
+
global group
|
|
48
|
+
group = groupObj
|
|
49
|
+
|
|
50
|
+
def F(self, params, t):
|
|
51
|
+
return (params['u'] ** t) * params['v']
|
|
52
|
+
|
|
53
|
+
def setup(self):
|
|
54
|
+
g, u, v = group.random(G1), group.random(G1), group.random(G1)
|
|
55
|
+
Z = pair(g,g)
|
|
56
|
+
|
|
57
|
+
params = {'g': g, 'u': u, 'v': v, 'Z': Z}
|
|
58
|
+
if(debug):
|
|
59
|
+
print("Setup: Public parameters...")
|
|
60
|
+
group.debug(params)
|
|
61
|
+
return params
|
|
62
|
+
|
|
63
|
+
def keygen(self, params):
|
|
64
|
+
x = group.random(ZR)
|
|
65
|
+
g_x = params['g'] ** x
|
|
66
|
+
|
|
67
|
+
sk = x # { 'sk' : x }
|
|
68
|
+
pk = g_x # { 'pk' : g_x }
|
|
69
|
+
|
|
70
|
+
if(debug):
|
|
71
|
+
print('\nKeygen...')
|
|
72
|
+
print("pk => '%s'" % pk)
|
|
73
|
+
print("sk => '%s'" % sk)
|
|
74
|
+
return (pk, sk)
|
|
75
|
+
|
|
76
|
+
def rekeygen(self, params, pk_a, sk_a, pk_b, sk_b):
|
|
77
|
+
rk = pk_b ** (~sk_a)
|
|
78
|
+
if(debug):
|
|
79
|
+
print('\nReKeyGen...')
|
|
80
|
+
print("rk => '%s'" % rk)
|
|
81
|
+
return rk
|
|
82
|
+
|
|
83
|
+
def encrypt(self, params, pk, m):
|
|
84
|
+
#m = group.encode(M, GT)
|
|
85
|
+
r1, r2 = group.random(ZR), group.random(ZR)
|
|
86
|
+
|
|
87
|
+
c0 = self.F(params, r1) ** r2
|
|
88
|
+
c1 = m * (params['Z'] ** r2)
|
|
89
|
+
c2 = pk ** r2
|
|
90
|
+
|
|
91
|
+
c = {'c0': c0, 'c1': c1, 'c2': c2}
|
|
92
|
+
|
|
93
|
+
if(debug):
|
|
94
|
+
print('\nEncrypt...')
|
|
95
|
+
print('m => %s' % m)
|
|
96
|
+
print('r1 => %s' % r1)
|
|
97
|
+
print('r2 => %s' % r2)
|
|
98
|
+
print('c => %s' % c)
|
|
99
|
+
group.debug(c)
|
|
100
|
+
return c
|
|
101
|
+
|
|
102
|
+
def decrypt(self, params, sk, c):
|
|
103
|
+
|
|
104
|
+
c1 = c['c1']
|
|
105
|
+
c2 = c['c2']
|
|
106
|
+
|
|
107
|
+
m = c1 / (c2 ** (~sk))
|
|
108
|
+
|
|
109
|
+
if(debug):
|
|
110
|
+
print('\nDecrypt...')
|
|
111
|
+
print('m => %s' % m)
|
|
112
|
+
|
|
113
|
+
#return group.decode(m)
|
|
114
|
+
return m
|
|
115
|
+
|
|
116
|
+
def re_encrypt(self, params, rk, c_a):
|
|
117
|
+
|
|
118
|
+
c2 = c_a['c2']
|
|
119
|
+
|
|
120
|
+
c_b = c_a
|
|
121
|
+
c_b['c2'] = pair(c2, rk)
|
|
122
|
+
|
|
123
|
+
if(debug):
|
|
124
|
+
print('\nRe-encrypt...')
|
|
125
|
+
print('c\' => %s' % c_b)
|
|
126
|
+
return c_b
|
|
127
|
+
|
|
128
|
+
class NAL16b(NAL16a):
|
|
129
|
+
"""
|
|
130
|
+
Testing NAL16 implementation
|
|
131
|
+
|
|
132
|
+
>>> from charm.toolbox.pairinggroup import PairingGroup,ZR,G1,G2,GT,pair
|
|
133
|
+
>>> groupObj = PairingGroup('SS512')
|
|
134
|
+
>>> pre = NAL16b(groupObj)
|
|
135
|
+
>>> params = pre.setup()
|
|
136
|
+
>>> (pk_a, sk_a) = pre.keygen(params)
|
|
137
|
+
>>> (pk_b, sk_b) = pre.keygen(params)
|
|
138
|
+
>>> msg = b"Hello world!"
|
|
139
|
+
>>> c_a = pre.encrypt(params, pk_a, msg)
|
|
140
|
+
>>> rk = pre.rekeygen(params, pk_a, sk_a, pk_b, sk_b)
|
|
141
|
+
>>> c_b = pre.re_encrypt(params, rk, c_a)
|
|
142
|
+
>>> assert msg == pre.decrypt(params, sk_b, c_b), 'Decryption of re-encrypted ciphertext was incorrect'
|
|
143
|
+
"""
|
|
144
|
+
|
|
145
|
+
def __init__(self, groupObj):
|
|
146
|
+
global group, h
|
|
147
|
+
group = groupObj
|
|
148
|
+
h = Hash(group)
|
|
149
|
+
|
|
150
|
+
def H(self, gt, s):
|
|
151
|
+
h1 = group.hash((gt, s, 1), ZR)
|
|
152
|
+
h2 = group.hash((gt, s, 2), ZR)
|
|
153
|
+
if(debug):
|
|
154
|
+
print('\nH ...')
|
|
155
|
+
print("gt => '%s'" % gt)
|
|
156
|
+
print("s => '%s'" % s)
|
|
157
|
+
print("h1 => '%s'" % h1)
|
|
158
|
+
print("h2 => '%s'" % h2)
|
|
159
|
+
return (h1, h2)
|
|
160
|
+
|
|
161
|
+
def G(self, x):
|
|
162
|
+
hh = h.hashToZn(x)
|
|
163
|
+
if(debug):
|
|
164
|
+
print('\nG ...')
|
|
165
|
+
print("x => '%s'" % x)
|
|
166
|
+
print("G(x) => '%s'" % hh)
|
|
167
|
+
return hh
|
|
168
|
+
|
|
169
|
+
def encrypt(self, params, pk, m):
|
|
170
|
+
sigma = group.random(GT)
|
|
171
|
+
c3 = self.G(sigma) ^ integer(m)
|
|
172
|
+
(r1, r2) = self.H(sigma, c3)
|
|
173
|
+
|
|
174
|
+
c = super(NAL16b, self).encrypt(params, pk, sigma)
|
|
175
|
+
|
|
176
|
+
c['c3'] = c3
|
|
177
|
+
|
|
178
|
+
if(debug):
|
|
179
|
+
print('\nEncrypt...')
|
|
180
|
+
print('m => %s' % m)
|
|
181
|
+
print('r1 => %s' % r1)
|
|
182
|
+
print('r2 => %s' % r2)
|
|
183
|
+
print('c => %s' % c)
|
|
184
|
+
group.debug(c)
|
|
185
|
+
return c
|
|
186
|
+
|
|
187
|
+
def decrypt(self, params, sk, c):
|
|
188
|
+
sigma = super(NAL16b, self).decrypt(params, sk, c)
|
|
189
|
+
c3 = c['c3']
|
|
190
|
+
(r1, r2) = self.H(sigma, c3)
|
|
191
|
+
m = int2Bytes(c3 ^ self.G(sigma))
|
|
192
|
+
|
|
193
|
+
if(debug):
|
|
194
|
+
print('\nDecrypt...')
|
|
195
|
+
print('m => %s' % m)
|
|
196
|
+
return m
|
|
197
|
+
|
|
198
|
+
def re_encrypt(self, params, rk, c_a):
|
|
199
|
+
c_b = super(NAL16b, self).re_encrypt(params, rk, c_a)
|
|
200
|
+
c_b['c3'] = c_a['c3']
|
|
201
|
+
if(debug):
|
|
202
|
+
print('\nRe-encrypt...')
|
|
203
|
+
print('c\' => %s' % c_b)
|
|
204
|
+
return c_b
|
|
205
|
+
|
|
206
|
+
# groupObj = PairingGroup('SS512')
|
|
207
|
+
# pre = NAL16b(groupObj)
|
|
208
|
+
# params = pre.setup()
|
|
209
|
+
|
|
210
|
+
# (pk_a, sk_a) = pre.keygen(params)
|
|
211
|
+
# (pk_b, sk_b) = pre.keygen(params)
|
|
212
|
+
# msg = b"Hello world!"
|
|
213
|
+
# c_a = pre.encrypt(params, pk_a, msg)
|
|
214
|
+
# rk = pre.rekeygen(params, pk_a, sk_a, pk_b, sk_b)
|
|
215
|
+
# c_b = pre.re_encrypt(params, rk, c_a)
|
|
216
|
+
# pre.decrypt(params, sk_b, c_b)
|
|
@@ -0,0 +1,272 @@
|
|
|
1
|
+
'''
|
|
2
|
+
**Abe Blind Signature Scheme (A01)**
|
|
3
|
+
|
|
4
|
+
*Authors:* Masayuki Abe
|
|
5
|
+
|
|
6
|
+
| **Title:** "A Secure Three-move Blind Signature Scheme for Polynomially Many Signatures"
|
|
7
|
+
| **Published in:** EUROCRYPT 2001
|
|
8
|
+
| **Available from:** http://www.iacr.org/archive/eurocrypt2001/20450135.pdf
|
|
9
|
+
| **Notes:** Three-move interactive blind signature protocol
|
|
10
|
+
|
|
11
|
+
.. rubric:: Scheme Properties
|
|
12
|
+
|
|
13
|
+
* **Type:** blind signature
|
|
14
|
+
* **Setting:** integer groups
|
|
15
|
+
* **Assumption:** DL
|
|
16
|
+
|
|
17
|
+
.. rubric:: Implementation
|
|
18
|
+
|
|
19
|
+
:Authors: Antonio de la Piedra
|
|
20
|
+
:Date: 12/2013
|
|
21
|
+
'''
|
|
22
|
+
from charm.toolbox.integergroup import integer, IntegerGroupQ, randomBits
|
|
23
|
+
from charm.toolbox.conversion import Conversion
|
|
24
|
+
from charm.core.engine.protocol import *
|
|
25
|
+
from charm.toolbox.enum import Enum
|
|
26
|
+
from socket import socket,AF_INET,SOCK_STREAM,SOL_SOCKET,SO_REUSEADDR
|
|
27
|
+
import hashlib
|
|
28
|
+
import sys
|
|
29
|
+
|
|
30
|
+
party = Enum('Signer', 'User')
|
|
31
|
+
SIGNER, USER = party.Signer, party.User
|
|
32
|
+
HOST, PORT = "", 8082
|
|
33
|
+
|
|
34
|
+
def SHA1(bytes1):
|
|
35
|
+
s1 = hashlib.new('sha256')
|
|
36
|
+
s1.update(bytes1)
|
|
37
|
+
return s1.digest()
|
|
38
|
+
|
|
39
|
+
debug = False
|
|
40
|
+
class Asig(Protocol):
|
|
41
|
+
def __init__(self, groupObj, p=0, q=0, secparam=0):
|
|
42
|
+
Protocol.__init__(self, None)
|
|
43
|
+
|
|
44
|
+
signer_states = { 1:self.signer_state1, 3:self.signer_state3, 5:self.signer_state5, 7:self.signer_state7 }
|
|
45
|
+
user_states = { 2:self.user_state2, 4:self.user_state4, 6:self.user_state6, 8:self.user_state8 }
|
|
46
|
+
|
|
47
|
+
signer_trans = { 1:3, 3:5, 5:7 }
|
|
48
|
+
user_trans = { 2:4, 4:6, 6:8 }
|
|
49
|
+
|
|
50
|
+
Protocol.addPartyType(self, SIGNER, signer_states, signer_trans, True)
|
|
51
|
+
Protocol.addPartyType(self, USER, user_states, user_trans)
|
|
52
|
+
|
|
53
|
+
self.group = groupObj
|
|
54
|
+
Protocol.setSubclassVars(self, self.group)
|
|
55
|
+
|
|
56
|
+
group = groupObj
|
|
57
|
+
group.p, group.q, group.r = p, q, 2
|
|
58
|
+
|
|
59
|
+
if group.p == 0 or group.q == 0:
|
|
60
|
+
group.paramgen(secparam)
|
|
61
|
+
p = group.p
|
|
62
|
+
|
|
63
|
+
p = group.p
|
|
64
|
+
q = group.q
|
|
65
|
+
|
|
66
|
+
def signer_state1(self):
|
|
67
|
+
print("SIGNER state #1")
|
|
68
|
+
|
|
69
|
+
x, g, = self.group.random(), self.group.randomGen()
|
|
70
|
+
z, h, = self.group.randomGen(), self.group.randomGen()
|
|
71
|
+
|
|
72
|
+
y = g ** x
|
|
73
|
+
|
|
74
|
+
hs1 = hashlib.new('sha256')
|
|
75
|
+
hs1.update(Conversion.IP2OS(integer(p)))
|
|
76
|
+
hs1.update(Conversion.IP2OS(integer(q)))
|
|
77
|
+
hs1.update(Conversion.IP2OS(integer(g)))
|
|
78
|
+
hs1.update(Conversion.IP2OS(integer(h)))
|
|
79
|
+
hs1.update(Conversion.IP2OS(integer(y)))
|
|
80
|
+
|
|
81
|
+
msg = integer(hs1.digest())
|
|
82
|
+
z = (msg ** ((p - 1)/q)) % p
|
|
83
|
+
|
|
84
|
+
Protocol.store(self, ('g', g), ('y', y), ('x', x), ('h', h), ('z', z))
|
|
85
|
+
Protocol.setState(self, 3)
|
|
86
|
+
|
|
87
|
+
return { 'g':g, 'y':y, 'h':h, 'z':z }
|
|
88
|
+
|
|
89
|
+
def user_state2(self, input):
|
|
90
|
+
print("USER state #2")
|
|
91
|
+
|
|
92
|
+
g = input.get('g')
|
|
93
|
+
y = input.get('y')
|
|
94
|
+
h = input.get('h')
|
|
95
|
+
z = input.get('z')
|
|
96
|
+
|
|
97
|
+
Protocol.store(self, ('g', g), ('y', y), ('h', h), ('z', z))
|
|
98
|
+
Protocol.setState(self, 4)
|
|
99
|
+
return { 'g':g, 'y':y }
|
|
100
|
+
|
|
101
|
+
def signer_state3(self, input):
|
|
102
|
+
print("SIGNER state #3")
|
|
103
|
+
|
|
104
|
+
rnd = (integer(randomBits(80)))
|
|
105
|
+
|
|
106
|
+
msg = integer(SHA1(Conversion.IP2OS(rnd)))
|
|
107
|
+
z1 = (msg ** ((p - 1)/q)) % p
|
|
108
|
+
|
|
109
|
+
(g, y, h ,z) = Protocol.get(self, ['g', 'y', 'h', 'z'])
|
|
110
|
+
|
|
111
|
+
z2 = z/z1
|
|
112
|
+
|
|
113
|
+
u = self.group.random()
|
|
114
|
+
s1 = self.group.random()
|
|
115
|
+
s2 = self.group.random()
|
|
116
|
+
d = self.group.random()
|
|
117
|
+
|
|
118
|
+
a = g ** u
|
|
119
|
+
|
|
120
|
+
b1 = (g ** s1) * (z1 ** d)
|
|
121
|
+
b2 = (h ** s2) * (z2 ** d)
|
|
122
|
+
|
|
123
|
+
Protocol.store(self, ('u', u), ('s1', s1), ('s2', s2), ('d', d))
|
|
124
|
+
Protocol.setState(self, 5)
|
|
125
|
+
|
|
126
|
+
return { 'rnd':rnd, 'a':a, 'b1':b1, 'b2':b2 }
|
|
127
|
+
|
|
128
|
+
def user_state4(self, input):
|
|
129
|
+
print("USER state #4")
|
|
130
|
+
|
|
131
|
+
(g, y, h ,z) = Protocol.get(self, ['g', 'y', 'h', 'z'])
|
|
132
|
+
|
|
133
|
+
rnd = input.get('rnd')
|
|
134
|
+
a = input.get('a')
|
|
135
|
+
b1 = input.get('b1')
|
|
136
|
+
b2 = input.get('b2')
|
|
137
|
+
|
|
138
|
+
msg = integer(SHA1(Conversion.IP2OS(rnd)))
|
|
139
|
+
z1 = (msg ** ((p - 1)/q)) % p
|
|
140
|
+
|
|
141
|
+
gamma = self.group.random()
|
|
142
|
+
|
|
143
|
+
tau = self.group.random()
|
|
144
|
+
|
|
145
|
+
t1 = self.group.random()
|
|
146
|
+
t2 = self.group.random()
|
|
147
|
+
t3 = self.group.random()
|
|
148
|
+
t4 = self.group.random()
|
|
149
|
+
t5 = self.group.random()
|
|
150
|
+
|
|
151
|
+
zeta = z ** gamma
|
|
152
|
+
zeta1 = z1 ** gamma
|
|
153
|
+
zeta2 = zeta/zeta1
|
|
154
|
+
|
|
155
|
+
alpha = a * (g ** t1) * (y ** t2) % p
|
|
156
|
+
beta1 = (b1 ** gamma) * (g ** t3) * (zeta1 ** t4) % p
|
|
157
|
+
beta2 = (b2 ** gamma) * (h ** t5) * (zeta2 ** t4) % p
|
|
158
|
+
eta = z ** tau
|
|
159
|
+
|
|
160
|
+
epsilon = self.group.hash(zeta, zeta1, alpha, beta1, beta2, eta, "msg")
|
|
161
|
+
e = epsilon - t2 - t4
|
|
162
|
+
|
|
163
|
+
Protocol.store(self, ('z', z), ('z1', z1), ('zeta', zeta), ('zeta1', zeta1))
|
|
164
|
+
Protocol.store(self, ('zeta2', zeta2), ('alpha', alpha), ('beta1', beta1), ('beta2', beta2))
|
|
165
|
+
Protocol.store(self, ('t1', t1), ('t2', t2), ('t3', t3), ('t4', t4), ('t5', t5))
|
|
166
|
+
Protocol.store(self, ('gamma', gamma), ('tau', tau), ('eta', eta))
|
|
167
|
+
|
|
168
|
+
Protocol.setState(self, 6)
|
|
169
|
+
|
|
170
|
+
return { 'e':e }
|
|
171
|
+
|
|
172
|
+
def signer_state5(self, input):
|
|
173
|
+
print("SIGNER state #5")
|
|
174
|
+
|
|
175
|
+
e = input.get('e')
|
|
176
|
+
(d, u, x) = Protocol.get(self, ['d', 'u', 'x'])
|
|
177
|
+
|
|
178
|
+
c = e - d
|
|
179
|
+
r = u - c*x
|
|
180
|
+
|
|
181
|
+
Protocol.setState(self, 7)
|
|
182
|
+
|
|
183
|
+
return { 'r':r, 'c':c, 'd':d }
|
|
184
|
+
|
|
185
|
+
def user_state6(self, input):
|
|
186
|
+
print("USER state #6")
|
|
187
|
+
|
|
188
|
+
r = input.get('r')
|
|
189
|
+
c = input.get('c')
|
|
190
|
+
d = input.get('d')
|
|
191
|
+
|
|
192
|
+
Protocol.store(self, ('r', r), ('c', c), ('d', d))
|
|
193
|
+
|
|
194
|
+
Protocol.setState(self, 8)
|
|
195
|
+
return { 'r':r }
|
|
196
|
+
|
|
197
|
+
def signer_state7(self, input):
|
|
198
|
+
print("SIGNER state #7")
|
|
199
|
+
|
|
200
|
+
(s1, s2) = Protocol.get(self, ['s1', 's2'])
|
|
201
|
+
|
|
202
|
+
Protocol.setState(self, None)
|
|
203
|
+
|
|
204
|
+
return { 's1':s1, 's2':s2 }
|
|
205
|
+
|
|
206
|
+
def user_state8(self, input):
|
|
207
|
+
print("USER state #8")
|
|
208
|
+
|
|
209
|
+
s1 = input.get('s1')
|
|
210
|
+
s2 = input.get('s2')
|
|
211
|
+
|
|
212
|
+
(r, c, d) = Protocol.get(self, ['r', 'c', 'd'])
|
|
213
|
+
|
|
214
|
+
(alpha, beta1, beta2, g, y, z, h) = Protocol.get(self, ['alpha', 'beta1', 'beta2', 'g', 'y', 'z', 'h'])
|
|
215
|
+
(zeta, zeta1, zeta2, z, z1) = Protocol.get(self, ['zeta', 'zeta1', 'zeta2', 'z', 'z1'])
|
|
216
|
+
(t1, t2, t3, t4, t5) = Protocol.get(self, ['t1', 't2', 't3', 't4', 't5'])
|
|
217
|
+
(gamma, tau, eta) = Protocol.get(self, ['gamma', 'tau', 'eta'])
|
|
218
|
+
|
|
219
|
+
rho = r + t1
|
|
220
|
+
omega = c + t2
|
|
221
|
+
|
|
222
|
+
sigma1 = (gamma*s1) + t3
|
|
223
|
+
sigma2 = (gamma*s2) + t5
|
|
224
|
+
|
|
225
|
+
delta = d + t4
|
|
226
|
+
|
|
227
|
+
mu = tau - (delta * gamma)
|
|
228
|
+
|
|
229
|
+
# Verification
|
|
230
|
+
|
|
231
|
+
tmp1 = (g ** rho) * (y ** omega) % p
|
|
232
|
+
tmp2 = (g ** sigma1) * (zeta1 ** delta) % p
|
|
233
|
+
tmp3 = (h ** sigma2) * (zeta2 ** delta) % p
|
|
234
|
+
tmp4 = (z ** mu) * (zeta ** delta) % p
|
|
235
|
+
|
|
236
|
+
p1 = (omega + delta) % q
|
|
237
|
+
p2 = self.group.hash(zeta, zeta1, tmp1, tmp2, tmp3, tmp4, "msg")
|
|
238
|
+
|
|
239
|
+
print("Verification OK:", p1 == p2)
|
|
240
|
+
|
|
241
|
+
Protocol.setState(self, None)
|
|
242
|
+
return None
|
|
243
|
+
|
|
244
|
+
if __name__ == "__main__":
|
|
245
|
+
|
|
246
|
+
p = integer(156053402631691285300957066846581395905893621007563090607988086498527791650834395958624527746916581251903190331297268907675919283232442999706619659475326192111220545726433895802392432934926242553363253333261282122117343404703514696108330984423475697798156574052962658373571332699002716083130212467463571362679)
|
|
247
|
+
q = integer(78026701315845642650478533423290697952946810503781545303994043249263895825417197979312263873458290625951595165648634453837959641616221499853309829737663096055610272863216947901196216467463121276681626666630641061058671702351757348054165492211737848899078287026481329186785666349501358041565106233731785681339)
|
|
248
|
+
|
|
249
|
+
groupObj = IntegerGroupQ()
|
|
250
|
+
sp = Asig(groupObj, p, q, 1024)
|
|
251
|
+
|
|
252
|
+
if sys.argv[1] == "-s":
|
|
253
|
+
print("Operating as signer...")
|
|
254
|
+
svr = socket(AF_INET, SOCK_STREAM)
|
|
255
|
+
svr.setsockopt(SOL_SOCKET, SO_REUSEADDR, 1)
|
|
256
|
+
svr.bind((HOST, PORT))
|
|
257
|
+
svr.listen(1)
|
|
258
|
+
svr_sock, addr = svr.accept()
|
|
259
|
+
print("Connected by ", addr)
|
|
260
|
+
_name, _type, _sock = "signer", SIGNER, svr_sock
|
|
261
|
+
elif sys.argv[1] == "-u":
|
|
262
|
+
print("Operating as user...")
|
|
263
|
+
clt = socket(AF_INET, SOCK_STREAM)
|
|
264
|
+
clt.connect((HOST, PORT))
|
|
265
|
+
clt.settimeout(15)
|
|
266
|
+
_name, _type, _sock = "user", USER, clt
|
|
267
|
+
else:
|
|
268
|
+
print("Usage: %s [-s or -u]" % sys.argv[0])
|
|
269
|
+
exit(-1)
|
|
270
|
+
sp.setup( {'name':_name, 'type':_type, 'socket':_sock} )
|
|
271
|
+
sp.execute(_type)
|
|
272
|
+
|
|
@@ -0,0 +1,215 @@
|
|
|
1
|
+
'''
|
|
2
|
+
**Abe-Okamoto Partially Blind Signature Scheme (AO00)**
|
|
3
|
+
|
|
4
|
+
*Authors:* Masayuki Abe, Tatsuaki Okamoto
|
|
5
|
+
|
|
6
|
+
| **Title:** "Provably Secure Partially Blind Signatures"
|
|
7
|
+
| **Published in:** CRYPTO 2000
|
|
8
|
+
| **Available from:** http://www.iacr.org/archive/crypto2000/18800272/18800272.pdf
|
|
9
|
+
| **Notes:** Interactive partially blind signature protocol
|
|
10
|
+
|
|
11
|
+
.. rubric:: Scheme Properties
|
|
12
|
+
|
|
13
|
+
* **Type:** partially blind signature
|
|
14
|
+
* **Setting:** integer groups
|
|
15
|
+
* **Assumption:** DL
|
|
16
|
+
|
|
17
|
+
.. rubric:: Implementation
|
|
18
|
+
|
|
19
|
+
:Authors: Antonio de la Piedra
|
|
20
|
+
:Date: 12/2013
|
|
21
|
+
'''
|
|
22
|
+
from charm.toolbox.integergroup import integer, IntegerGroupQ
|
|
23
|
+
from charm.core.engine.protocol import *
|
|
24
|
+
from charm.toolbox.enum import Enum
|
|
25
|
+
from socket import socket,AF_INET,SOCK_STREAM,SOL_SOCKET,SO_REUSEADDR
|
|
26
|
+
import hashlib
|
|
27
|
+
import sys
|
|
28
|
+
|
|
29
|
+
party = Enum('Signer', 'User')
|
|
30
|
+
SIGNER, USER = party.Signer, party.User
|
|
31
|
+
HOST, PORT = "", 8082
|
|
32
|
+
|
|
33
|
+
def SHA2(bytes1):
|
|
34
|
+
s1 = hashlib.new('sha256')
|
|
35
|
+
s1.update(bytes1)
|
|
36
|
+
return s1.digest()
|
|
37
|
+
|
|
38
|
+
debug = False
|
|
39
|
+
class AOSig(Protocol):
|
|
40
|
+
def __init__(self, groupObj, p=0, q=0, secparam=0):
|
|
41
|
+
Protocol.__init__(self, None)
|
|
42
|
+
|
|
43
|
+
signer_states = { 1:self.signer_state1, 3:self.signer_state3, 5:self.signer_state5 }
|
|
44
|
+
user_states = { 2:self.user_state2, 4:self.user_state4, 6:self.user_state6 }
|
|
45
|
+
|
|
46
|
+
signer_trans = { 1:3, 3:5 }
|
|
47
|
+
user_trans = { 2:4, 4:6 }
|
|
48
|
+
|
|
49
|
+
Protocol.addPartyType(self, SIGNER, signer_states, signer_trans, True)
|
|
50
|
+
Protocol.addPartyType(self, USER, user_states, user_trans)
|
|
51
|
+
|
|
52
|
+
self.group = groupObj
|
|
53
|
+
Protocol.setSubclassVars(self, self.group)
|
|
54
|
+
|
|
55
|
+
group = groupObj
|
|
56
|
+
group.p, group.q, group.r = p, q, 2
|
|
57
|
+
|
|
58
|
+
if group.p == 0 or group.q == 0:
|
|
59
|
+
group.paramgen(secparam)
|
|
60
|
+
p = group.p
|
|
61
|
+
|
|
62
|
+
p = group.p
|
|
63
|
+
q = group.q
|
|
64
|
+
|
|
65
|
+
def signer_state1(self):
|
|
66
|
+
print("SIGNER state #1")
|
|
67
|
+
|
|
68
|
+
p = self.group.p
|
|
69
|
+
q = self.group.q
|
|
70
|
+
|
|
71
|
+
x, g, = self.group.random(), self.group.randomGen()
|
|
72
|
+
|
|
73
|
+
y = g ** x
|
|
74
|
+
|
|
75
|
+
Protocol.store(self, ('g', g), ('y', y), ('x', x))
|
|
76
|
+
Protocol.setState(self, 3)
|
|
77
|
+
|
|
78
|
+
return { 'g':g, 'y':y }
|
|
79
|
+
|
|
80
|
+
def user_state2(self, input):
|
|
81
|
+
print("USER state #2")
|
|
82
|
+
|
|
83
|
+
g = input.get('g')
|
|
84
|
+
y = input.get('y')
|
|
85
|
+
|
|
86
|
+
Protocol.store(self, ('g', g), ('y', y))
|
|
87
|
+
Protocol.setState(self, 4)
|
|
88
|
+
return { 'g':g, 'y':y }
|
|
89
|
+
|
|
90
|
+
def signer_state3(self, input):
|
|
91
|
+
print("SIGNER state #3")
|
|
92
|
+
|
|
93
|
+
u = self.group.random()
|
|
94
|
+
s = self.group.random()
|
|
95
|
+
d = self.group.random()
|
|
96
|
+
|
|
97
|
+
g = input.get('g')
|
|
98
|
+
y = input.get('y')
|
|
99
|
+
|
|
100
|
+
str = "info"
|
|
101
|
+
|
|
102
|
+
msg = integer(SHA2(str))
|
|
103
|
+
z = (msg ** ((p - 1)/q)) % p
|
|
104
|
+
|
|
105
|
+
a = g ** u
|
|
106
|
+
b = (g ** s) * (z ** d)
|
|
107
|
+
|
|
108
|
+
Protocol.store(self, ('u', u), ('s', s), ('d', d))
|
|
109
|
+
Protocol.setState(self, 5)
|
|
110
|
+
|
|
111
|
+
return { 'a':a, 'b':b, 's':s }
|
|
112
|
+
|
|
113
|
+
def user_state4(self, input):
|
|
114
|
+
print("USER state #4")
|
|
115
|
+
|
|
116
|
+
p = self.group.p
|
|
117
|
+
q = self.group.q
|
|
118
|
+
|
|
119
|
+
a = input.get('a')
|
|
120
|
+
b = input.get('b')
|
|
121
|
+
s = input.get('s')
|
|
122
|
+
|
|
123
|
+
g, y = Protocol.get(self, ['g', 'y'])
|
|
124
|
+
|
|
125
|
+
t1 = self.group.random()
|
|
126
|
+
t2 = self.group.random()
|
|
127
|
+
t3 = self.group.random()
|
|
128
|
+
t4 = self.group.random()
|
|
129
|
+
|
|
130
|
+
str = "info"
|
|
131
|
+
|
|
132
|
+
msg = integer(SHA2(str))
|
|
133
|
+
z = (msg ** ((p - 1)/q)) % p
|
|
134
|
+
|
|
135
|
+
alpha = a * (g ** t1) * (y ** t2) % p
|
|
136
|
+
beta = b * (g ** t3) * (z ** t4) % p
|
|
137
|
+
|
|
138
|
+
epsilon = self.group.hash(alpha, beta, z, "msg")
|
|
139
|
+
e = epsilon - t2 - t4
|
|
140
|
+
|
|
141
|
+
Protocol.store(self, ('z', z), ('s', s), ('t1', t1), ('t2', t2), ('t3', t3), ('t4', t4), ('alpha', alpha), ('beta', beta))
|
|
142
|
+
Protocol.setState(self, 6)
|
|
143
|
+
|
|
144
|
+
return { 'e':e }
|
|
145
|
+
|
|
146
|
+
def signer_state5(self, input):
|
|
147
|
+
print("SIGNER state #5")
|
|
148
|
+
|
|
149
|
+
e = input.get('e')
|
|
150
|
+
(d, u, x, s) = Protocol.get(self, ['d', 'u', 'x', 's'])
|
|
151
|
+
|
|
152
|
+
c = e - d
|
|
153
|
+
r = u - c*x
|
|
154
|
+
|
|
155
|
+
Protocol.setState(self, None)
|
|
156
|
+
|
|
157
|
+
return { 'r':r, 'c':c, 'd':d }
|
|
158
|
+
|
|
159
|
+
def user_state6(self, input):
|
|
160
|
+
print("USER state #6")
|
|
161
|
+
|
|
162
|
+
r = input.get('r')
|
|
163
|
+
c = input.get('c')
|
|
164
|
+
d = input.get('d')
|
|
165
|
+
|
|
166
|
+
(t1, t2, t3, t4, s) = Protocol.get(self, ['t1', 't2', 't3', 't4', 's'])
|
|
167
|
+
(alpha, beta, g, y, z) = Protocol.get(self, ['alpha', 'beta', 'g', 'y', 'z'])
|
|
168
|
+
|
|
169
|
+
rho = r + t1
|
|
170
|
+
omega = c + t2
|
|
171
|
+
sigma = s + t3
|
|
172
|
+
delta = d + t4
|
|
173
|
+
|
|
174
|
+
# Verification
|
|
175
|
+
|
|
176
|
+
tmp1 = (g ** rho) * (y ** omega) % p
|
|
177
|
+
tmp2 = (g ** sigma) * (z ** delta) % p
|
|
178
|
+
|
|
179
|
+
p1 = (omega + delta) % q
|
|
180
|
+
p2 = self.group.hash(tmp1, tmp2, z, "msg")
|
|
181
|
+
|
|
182
|
+
print("Verification OK:", p1 == p2)
|
|
183
|
+
|
|
184
|
+
Protocol.setState(self, None)
|
|
185
|
+
return None
|
|
186
|
+
|
|
187
|
+
if __name__ == "__main__":
|
|
188
|
+
|
|
189
|
+
p = integer(156053402631691285300957066846581395905893621007563090607988086498527791650834395958624527746916581251903190331297268907675919283232442999706619659475326192111220545726433895802392432934926242553363253333261282122117343404703514696108330984423475697798156574052962658373571332699002716083130212467463571362679)
|
|
190
|
+
q = integer(78026701315845642650478533423290697952946810503781545303994043249263895825417197979312263873458290625951595165648634453837959641616221499853309829737663096055610272863216947901196216467463121276681626666630641061058671702351757348054165492211737848899078287026481329186785666349501358041565106233731785681339)
|
|
191
|
+
|
|
192
|
+
groupObj = IntegerGroupQ()
|
|
193
|
+
sp = AOSig(groupObj, p, q, 1024)
|
|
194
|
+
|
|
195
|
+
if sys.argv[1] == "-s":
|
|
196
|
+
print("Operating as signer...")
|
|
197
|
+
svr = socket(AF_INET, SOCK_STREAM)
|
|
198
|
+
svr.setsockopt(SOL_SOCKET, SO_REUSEADDR, 1)
|
|
199
|
+
svr.bind((HOST, PORT))
|
|
200
|
+
svr.listen(1)
|
|
201
|
+
svr_sock, addr = svr.accept()
|
|
202
|
+
print("Connected by ", addr)
|
|
203
|
+
_name, _type, _sock = "signer", SIGNER, svr_sock
|
|
204
|
+
elif sys.argv[1] == "-u":
|
|
205
|
+
print("Operating as user...")
|
|
206
|
+
clt = socket(AF_INET, SOCK_STREAM)
|
|
207
|
+
clt.connect((HOST, PORT))
|
|
208
|
+
clt.settimeout(15)
|
|
209
|
+
_name, _type, _sock = "user", USER, clt
|
|
210
|
+
else:
|
|
211
|
+
print("Usage: %s [-s or -u]" % sys.argv[0])
|
|
212
|
+
exit(-1)
|
|
213
|
+
sp.setup( {'name':_name, 'type':_type, 'socket':_sock} )
|
|
214
|
+
sp.execute(_type)
|
|
215
|
+
|