Compare commits

18 Commits

Author SHA1 Message Date
b680b4aebb Merge pull request 'main' (#7) from sangge/mimajingsai:main into main
Reviewed-on: #7
2023-10-15 15:25:13 +08:00
fd07fd9310 Merge branch 'dqy-main' 2023-10-15 14:24:12 +08:00
98685e6f44 Merge branch 'main' of https://git.mamahaha.work/dqy/mimajingsai into dqy-main 2023-10-15 14:20:29 +08:00
00425394c4 style: update readme style 2023-10-15 14:04:17 +08:00
6087762655 feat: update gitignore 2023-10-15 14:02:26 +08:00
d5527c0c8d doc: update readme 2023-10-15 14:01:31 +08:00
19298152c5 feat: temp docker file 2023-10-15 14:01:12 +08:00
b1fd853270 feat: add KDF function 2023-10-15 14:00:55 +08:00
dqy
9a767a3fa4 feat: 添加封装算法Encapsulate,修改Setup函数中的KDF函数,添加全局变量:安全参数sec, A和B的公钥和私钥,G, g, U, hash2, hash3, hash4, KDF 2023-10-14 21:59:50 +08:00
dqy
ba5289a33a feat: add GenerateRekey 2023-10-14 21:23:44 +08:00
dqy
1aaa3ee756 Merge pull request 'main' (#6) from sangge/mimajingsai:main into main
Reviewed-on: dqy/mimajingsai#6
2023-10-14 20:01:24 +08:00
dqy
478d70e2e0 Merge pull request 'main' (#5) from sangge/mimajingsai:main into main
Reviewed-on: dqy/mimajingsai#5
2023-10-14 11:42:59 +08:00
dqy
a7cd5bc0b2 Merge pull request 'main' (#4) from sangge/mimajingsai:main into main
Reviewed-on: dqy/mimajingsai#4
2023-10-13 19:08:16 +08:00
dqy
f783ce673f Merge pull request 'main' (#3) from sangge/mimajingsai:main into main
Reviewed-on: dqy/mimajingsai#3
2023-10-13 09:26:45 +08:00
dqy
057198d727 Merge branch 'main' of https://git.mamahaha.work/dqy/mimajingsai 2023-10-12 20:50:28 +08:00
dqy
d92c0063d1 test: test 2023-10-12 20:50:00 +08:00
dqy
44368d2e3f Merge pull request 'feat: add tpre lib' (#2) from sangge/mimajingsai:main into main
Reviewed-on: dqy/mimajingsai#2
2023-10-12 20:41:49 +08:00
dqy
6d3e44d582 Merge pull request 'main' (#1) from sangge/mimajingsai:main into main
Reviewed-on: dqy/mimajingsai#1
2023-10-12 19:57:00 +08:00
4 changed files with 151 additions and 16 deletions

1
.gitignore vendored
View File

@@ -6,3 +6,4 @@ test.py
example.py
ReEncrypt.py
src/demo.py

View File

@@ -6,11 +6,23 @@ This project is designed for the National Cryptography Competition and is implem
The project uses the Chinese national standard cryptography algorithm to implement distributed proxy re-encryption (TPRE).
## Project Structure
.
├── basedockerfile (being used to build base iamge)
├── dockerfile (being used to build application)
├── include (gmssl header)
├── lib (gmssl shared object)
├── LICENSE
├── README_en.md
├── README.md
├── requirements.txt
└── src (application source code)
## Environment Dependencies
System requirements:
- Linux
- Windows
- Windows(may need to complie and install gmssl yourself)
The project relies on the following software:
- Python 3.11
@@ -27,6 +39,26 @@ Visit [GmSSL](https://github.com/guanzhi/GmSSL) to learn how to install.
pip install -r requirements.txt -i https://pypi.tuna.tsinghua.edu.cn/simple
```
## Docker Installation
my docker version:
- Version: 24.0.5
- API version: 1.43
- Go version: go1.20.6
### Use base image and build yourself
```bash
docker pull git.mamahaha.work/sangge/tpre:base
docker build . -t your_image_name
docker run your_image_name
```
### Use pre-build image
```bash
docker pull git.mamahaha.work/sangge/tpre:latest
docker run git.mamahaha.work/sangge/tpre:latest
```
## Usage Instructions

10
dockerfile Normal file
View File

@@ -0,0 +1,10 @@
FROM git.mamahaha.work/sangge/tpre:base
COPY src /app
COPY requirements.txt /app/requirements.txt
WORKDIR /app
RUN pip install -r requirements.txt -i https://pypi.tuna.tsinghua.edu.cn/simple

View File

@@ -125,7 +125,6 @@ def Setup(sec: int) -> Tuple[CurveFp, Tuple[int, int],
sec: an init safety param
return:
<<<<<<< HEAD
G: sm2 curve
g: generator
U: another generator
@@ -146,7 +145,7 @@ def Setup(sec: int) -> Tuple[CurveFp, Tuple[int, int],
sm3 = Sm3() #pylint: disable=e0602
for i in double_G:
for j in i:
sm3.update(j.to_bytes())
sm3.update(j.to_bytes(32))
digest = sm3.digest()
digest = int.from_bytes(digest,'big') % sm2p256v1.P
return digest
@@ -157,9 +156,9 @@ def Setup(sec: int) -> Tuple[CurveFp, Tuple[int, int],
sm3 = Sm3() #pylint: disable=e0602
for i in triple_G:
for j in i:
sm3.update(j.to_bytes())
sm3.update(j.to_bytes(32))
digest = sm3.digest()
digest = int.from_bytes(digest,'big') % sm2p256v1.P
digest = int.from_bytes(digest, 'big') % sm2p256v1.P
return digest
def hash4(triple_G: Tuple[Tuple[int, int],
@@ -169,13 +168,21 @@ def Setup(sec: int) -> Tuple[CurveFp, Tuple[int, int],
sm3 = Sm3() #pylint: disable=e0602
for i in triple_G:
for j in i:
sm3.update(j.to_bytes())
sm3.update(Zp.to_bytes())
sm3.update(j.to_bytes(32))
sm3.update(Zp.to_bytes(32))
digest = sm3.digest()
digest = int.from_bytes(digest,'big') % sm2p256v1.P
digest = int.from_bytes(digest, 'big') % sm2p256v1.P
return digest
def KDF(G: Tuple[int, int]) -> int:
sm3 = Sm3() #pylint: disable=e0602
for i in G:
sm3.update(i.to_bytes(32))
digest = sm3.digest(32)
digest = digest
digest = int.from_bytes(digest, 'big') % sm2p256v1.P
return digest
KDF = Sm3() #pylint: disable=e0602
return G, g, U, hash2, hash3, hash4, KDF
@@ -203,16 +210,101 @@ def GenerateKeyPair(
return public_key, secret_key
def Enc(pk: Tuple[int, int], m: int) -> Tuple[Tuple[
Tuple[int, int],Tuple[int, int], int], int]:
enca = Encapsulate(pk)
K = enca[0]
K = enca[0].to_bytes()
capsule = enca[1]
sm4_enc = Sm4Cbc(key, iv, DO_ENCRYPT) #pylint: disable=e0602
plain_Data = m.to_bytes()
if len(K) != 16:
raise ValueError("invalid key length")
iv = b'tpretpretpretpre'
sm4_enc = Sm4Cbc(K, iv, DO_ENCRYPT) #pylint: disable=e0602
plain_Data = m.to_bytes(32)
enc_Data = sm4_enc.update(plain_Data)
enc_Data += sm4_enc.finish()
enc_message = (capsule, enc_Data)
return enc_message
# GenerateRekey
def H5(id: int, D: int) -> int:
sm3 = Sm3() #pylint: ignore=e0602
sm3.update(id.to_bytes(32))
sm3.update(D.to_bytes(32))
hash = sm3.digest()
hash = int.from_bytes(hash,'big') % G.P
return hash
def H6(triple_G: Tuple[Tuple[int, int],
Tuple[int, int],
Tuple[int, int]]) -> int:
sm3 = Sm3() #pylint: disable=e0602
for i in triple_G:
for j in i:
sm3.update(j.to_bytes(32))
hash = sm3.digest()
hash = int.from_bytes(hash,'big') % G.P
return hash
def f(x: int, f_modulus: list, T: int) -> int:
res = 0
for i in range(T):
res += f_modulus[i] * pow(x, i)
return res
# 生成A和B的公钥和私钥
pk_A, sk_A = GenerateKeyPair(0, ())
pk_B, sk_B = GenerateKeyPair(0, ())
# sec需要重新设置
sec = 256
# 调用Setup函数
G, g, U, hash2, hash3, hash4, KDF = Setup(sec)
def GenerateReKey(sk_A, pk_B, N: int, T: int) -> list:
'''
param: skA, pkB, N(节点总数), T(阈值)
return rki(0 <= i <= N-1)
'''
# 计算临时密钥对(x_A, X_A)
x_A = random.randint(0, G.P - 1)
X_A = multiply(g, x_A)
# d是Bob的密钥对与临时密钥对的非交互式Diffie-Hellman密钥交换的结果
d = hash3((X_A, pk_B, multiply(pk_B, x_A)))
# 计算多项式系数, 确定代理节点的ID(一个点)
f_modulus = []
# 计算f0
f0 = (sk_A * inv(d, G.P)) % G.P
f_modulus.append(f0)
# 计算fi(1 <= i <= T - 1)
for i in range(1, T):
f_modulus.append(random.randint(0, G.P - 1))
# 计算D
D = H6((X_A, pk_B, multiply(pk_B, sk_A)))
# 计算KF
KF = []
for i in range(N):
y = random.randint(0, G.P - 1)
Y = multiply(g, y)
s_x = H5(i, D) # id需要设置
r_k = f(s_x, f_modulus, T)
U1 = multiply(U, r_k)
kFrag = (i, r_k, X_A, U1)
KF.append(kFrag)
return KF
def Encapsulate(pk_A: Tuple[int, int]) -> Tuple[int, Tuple[Tuple[int, int], Tuple[int, int], int]]:
r = random.randint(0, G.P - 1)
u = random.randint(0, G.P - 1)
E = multiply(g, r)
V = multiply(g, u)
s = u + r * hash2((E, V))
pk_A_ru = multiply(pk_A, r + u)
K = KDF(pk_A_ru)
capsule = (E, V, s)
return (K, capsule)