Merge pull request 'main' (#13) from sangge/mimajingsai:main into main
Reviewed-on: ccyj/mimajingsai#13
This commit is contained in:
commit
b6e4106ae1
172
src/tpre.py
172
src/tpre.py
@ -1,10 +1,12 @@
|
||||
from gmssl import * # pylint: disable = e0401
|
||||
from typing import Tuple, Callable
|
||||
import random
|
||||
import traceback
|
||||
|
||||
point = Tuple[int, int]
|
||||
capsule = Tuple[point, point, int]
|
||||
|
||||
|
||||
# 生成密钥对模块
|
||||
class CurveFp:
|
||||
def __init__(self, A, B, P, N, Gx, Gy, name):
|
||||
@ -16,6 +18,7 @@ class CurveFp:
|
||||
self.Gy = Gy
|
||||
self.name = name
|
||||
|
||||
|
||||
sm2p256v1 = CurveFp(
|
||||
name="sm2p256v1",
|
||||
A=0xFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFC,
|
||||
@ -23,7 +26,7 @@ sm2p256v1 = CurveFp(
|
||||
P=0xFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFF,
|
||||
N=0xFFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFF7203DF6B21C6052B53BBF40939D54123,
|
||||
Gx=0x32C4AE2C1F1981195F9904466A39C9948FE30BBFF2660BE1715A4589334C74C7,
|
||||
Gy=0xBC3736A2F4F6779C59BDCEE36B692153D0A9877CC62A474002DF32E52139F0A0
|
||||
Gy=0xBC3736A2F4F6779C59BDCEE36B692153D0A9877CC62A474002DF32E52139F0A0,
|
||||
)
|
||||
|
||||
# 椭圆曲线
|
||||
@ -32,17 +35,20 @@ G = sm2p256v1
|
||||
# 生成元
|
||||
g = (sm2p256v1.Gx, sm2p256v1.Gy)
|
||||
|
||||
|
||||
def multiply(a: point, n: int) -> point:
|
||||
N = sm2p256v1.N
|
||||
A = sm2p256v1.A
|
||||
P = sm2p256v1.P
|
||||
return fromJacobian(jacobianMultiply(toJacobian(a), n, N, A, P), P)
|
||||
|
||||
|
||||
def add(a: point, b: point) -> point:
|
||||
A = sm2p256v1.A
|
||||
P = sm2p256v1.P
|
||||
return fromJacobian(jacobianAdd(toJacobian(a), toJacobian(b), A, P), P)
|
||||
|
||||
|
||||
def inv(a: int, n: int) -> int:
|
||||
if a == 0:
|
||||
return 0
|
||||
@ -54,16 +60,21 @@ def inv(a: int, n: int) -> int:
|
||||
lm, low, hm, high = nm, new, lm, low
|
||||
return lm % n
|
||||
|
||||
|
||||
def toJacobian(Xp_Yp: point) -> Tuple[int, int, int]:
|
||||
Xp, Yp = Xp_Yp
|
||||
return (Xp, Yp, 1)
|
||||
|
||||
|
||||
def fromJacobian(Xp_Yp_Zp: Tuple[int, int, int], P: int) -> point:
|
||||
Xp, Yp, Zp = Xp_Yp_Zp
|
||||
z = inv(Zp, P)
|
||||
return ((Xp * z**2) % P, (Yp * z**3) % P)
|
||||
|
||||
def jacobianDouble(Xp_Yp_Zp: Tuple[int, int, int], A: int, P: int) -> Tuple[int, int, int]:
|
||||
|
||||
def jacobianDouble(
|
||||
Xp_Yp_Zp: Tuple[int, int, int], A: int, P: int
|
||||
) -> Tuple[int, int, int]:
|
||||
Xp, Yp, Zp = Xp_Yp_Zp
|
||||
if not Yp:
|
||||
return (0, 0, 0)
|
||||
@ -75,11 +86,9 @@ def jacobianDouble(Xp_Yp_Zp: Tuple[int, int, int], A: int, P: int) -> Tuple[int,
|
||||
nz = (2 * Yp * Zp) % P
|
||||
return (nx, ny, nz)
|
||||
|
||||
|
||||
def jacobianAdd(
|
||||
Xp_Yp_Zp: Tuple[int, int, int],
|
||||
Xq_Yq_Zq: Tuple[int, int, int],
|
||||
A: int,
|
||||
P: int
|
||||
Xp_Yp_Zp: Tuple[int, int, int], Xq_Yq_Zq: Tuple[int, int, int], A: int, P: int
|
||||
) -> Tuple[int, int, int]:
|
||||
Xp, Yp, Zp = Xp_Yp_Zp
|
||||
Xq, Yq, Zq = Xq_Yq_Zq
|
||||
@ -105,14 +114,10 @@ def jacobianAdd(
|
||||
nz = (H * Zp * Zq) % P
|
||||
return (nx, ny, nz)
|
||||
|
||||
def jacobianMultiply(
|
||||
Xp_Yp_Zp: Tuple[int, int, int],
|
||||
n: int,
|
||||
N: int,
|
||||
A: int,
|
||||
P: int
|
||||
) -> Tuple[int, int, int]:
|
||||
|
||||
def jacobianMultiply(
|
||||
Xp_Yp_Zp: Tuple[int, int, int], n: int, N: int, A: int, P: int
|
||||
) -> Tuple[int, int, int]:
|
||||
Xp, Yp, Zp = Xp_Yp_Zp
|
||||
if Yp == 0 or n == 0:
|
||||
return (0, 0, 1)
|
||||
@ -123,45 +128,50 @@ def jacobianMultiply(
|
||||
if (n % 2) == 0:
|
||||
return jacobianDouble(jacobianMultiply((Xp, Yp, Zp), n // 2, N, A, P), A, P)
|
||||
if (n % 2) == 1:
|
||||
return jacobianAdd(jacobianDouble(jacobianMultiply((Xp, Yp, Zp), n // 2, N, A, P), A, P), (Xp, Yp, Zp), A, P)
|
||||
return jacobianAdd(
|
||||
jacobianDouble(jacobianMultiply((Xp, Yp, Zp), n // 2, N, A, P), A, P),
|
||||
(Xp, Yp, Zp),
|
||||
A,
|
||||
P,
|
||||
)
|
||||
raise ValueError("jacobian Multiply error")
|
||||
|
||||
|
||||
# 生成元
|
||||
U = multiply(g, random.randint(0, sm2p256v1.P))
|
||||
|
||||
|
||||
def hash2(double_G: Tuple[point, point]) -> int:
|
||||
sm3 = Sm3() # pylint: disable=e0602
|
||||
for i in double_G:
|
||||
for j in i:
|
||||
sm3.update(j.to_bytes(32))
|
||||
digest = sm3.digest()
|
||||
digest = int.from_bytes(digest,'big') % sm2p256v1.P
|
||||
digest = int.from_bytes(digest, "big") % sm2p256v1.P
|
||||
return digest
|
||||
|
||||
def hash3(triple_G: Tuple[point,
|
||||
point,
|
||||
point]) -> int:
|
||||
|
||||
def hash3(triple_G: Tuple[point, point, point]) -> int:
|
||||
sm3 = Sm3() # pylint: disable=e0602
|
||||
for i in triple_G:
|
||||
for j in i:
|
||||
sm3.update(j.to_bytes(32))
|
||||
digest = sm3.digest()
|
||||
digest = int.from_bytes(digest, 'big') % sm2p256v1.P
|
||||
digest = int.from_bytes(digest, "big") % sm2p256v1.P
|
||||
return digest
|
||||
|
||||
def hash4(triple_G: Tuple[point,
|
||||
point,
|
||||
point],
|
||||
Zp: int) -> int:
|
||||
|
||||
def hash4(triple_G: Tuple[point, point, point], Zp: int) -> int:
|
||||
sm3 = Sm3() # pylint: disable=e0602
|
||||
for i in triple_G:
|
||||
for j in i:
|
||||
sm3.update(j.to_bytes(32))
|
||||
sm3.update(Zp.to_bytes(32))
|
||||
digest = sm3.digest()
|
||||
digest = int.from_bytes(digest, 'big') % sm2p256v1.P
|
||||
digest = int.from_bytes(digest, "big") % sm2p256v1.P
|
||||
return digest
|
||||
|
||||
|
||||
def KDF(G: point) -> int:
|
||||
sm3 = Sm3() # pylint: disable=e0602
|
||||
print(G)
|
||||
@ -169,24 +179,23 @@ def KDF(G: point) -> int:
|
||||
sm3.update(i.to_bytes(32))
|
||||
digest = sm3.digest()
|
||||
digest = digest
|
||||
digest = int.from_bytes(digest, 'big') % sm2p256v1.P
|
||||
digest = int.from_bytes(digest, "big") % sm2p256v1.P
|
||||
mask_128bit = (1 << 128) - 1
|
||||
digest = digest & mask_128bit
|
||||
print('key =',digest)
|
||||
print("key =", digest)
|
||||
traceback.print_stack()
|
||||
return digest
|
||||
|
||||
def GenerateKeyPair(
|
||||
lamda_parma: int,
|
||||
public_params: tuple
|
||||
) -> Tuple[point, int]:
|
||||
'''
|
||||
|
||||
def GenerateKeyPair(lamda_parma: int, public_params: tuple) -> Tuple[point, int]:
|
||||
"""
|
||||
params:
|
||||
lamda_param: an init safety param
|
||||
public_params: curve params
|
||||
|
||||
return:
|
||||
public_key, secret_key
|
||||
'''
|
||||
"""
|
||||
sm2 = Sm2Key() # pylint: disable=e0602
|
||||
sm2.generate_key()
|
||||
|
||||
@ -194,29 +203,30 @@ def GenerateKeyPair(
|
||||
public_key_y = int.from_bytes(bytes(sm2.public_key.y), "big")
|
||||
public_key = (public_key_x, public_key_y)
|
||||
|
||||
|
||||
secret_key = int.from_bytes(bytes(sm2.private_key), "big")
|
||||
|
||||
return public_key, secret_key
|
||||
|
||||
|
||||
# 生成A和B的公钥和私钥
|
||||
# pk_A, sk_A = GenerateKeyPair(0, ())
|
||||
# pk_B, sk_B = GenerateKeyPair(0, ())
|
||||
|
||||
def Encrypt(pk: point, m: bytes) -> Tuple[Tuple[
|
||||
point,point, int], bytes]:
|
||||
|
||||
def Encrypt(pk: point, m: bytes) -> Tuple[capsule, bytes]:
|
||||
enca = Encapsulate(pk)
|
||||
K = enca[0].to_bytes(16)
|
||||
capsule = enca[1]
|
||||
if len(K) != 16:
|
||||
raise ValueError("invalid key length")
|
||||
iv = b'tpretpretpretpre'
|
||||
iv = b"tpretpretpretpre"
|
||||
sm4_enc = Sm4Cbc(K, iv, DO_ENCRYPT) # pylint: disable=e0602
|
||||
enc_Data = sm4_enc.update(m)
|
||||
enc_Data += sm4_enc.finish()
|
||||
enc_message = (capsule, enc_Data)
|
||||
return enc_message
|
||||
|
||||
|
||||
def Decapsulate(ska: int, capsule: capsule) -> int:
|
||||
E, V, s = capsule
|
||||
EVa = multiply(add(E, V), ska) # (E*V)^ska
|
||||
@ -224,57 +234,57 @@ def Decapsulate(ska:int,capsule:capsule) -> int:
|
||||
|
||||
return K
|
||||
|
||||
def Decrypt(sk_A: int,C:Tuple[Tuple[
|
||||
point, point, int], bytes]) ->int:
|
||||
'''
|
||||
|
||||
def Decrypt(sk_A: int, C: Tuple[Tuple[point, point, int], bytes]) -> int:
|
||||
"""
|
||||
params:
|
||||
sk_A: secret key
|
||||
C: (capsule, enc_data)
|
||||
'''
|
||||
"""
|
||||
capsule, enc_Data = C
|
||||
K = Decapsulate(sk_A, capsule)
|
||||
iv = b'tpretpretpretpre'
|
||||
iv = b"tpretpretpretpre"
|
||||
sm4_dec = Sm4Cbc(K, iv, DO_DECRYPT) # pylint: disable= e0602
|
||||
dec_Data = sm4_dec.update(enc_Data)
|
||||
dec_Data += sm4_dec.finish()
|
||||
return dec_Data
|
||||
|
||||
|
||||
# GenerateRekey
|
||||
def hash5(id: int, D: int) -> int:
|
||||
sm3 = Sm3() # pylint: disable=e0602
|
||||
sm3.update(id.to_bytes(32))
|
||||
sm3.update(D.to_bytes(32))
|
||||
hash = sm3.digest()
|
||||
hash = int.from_bytes(hash,'big') % G.P
|
||||
hash = int.from_bytes(hash, "big") % G.P
|
||||
return hash
|
||||
|
||||
def hash6(triple_G: Tuple[point,
|
||||
point,
|
||||
point]) -> int:
|
||||
|
||||
def hash6(triple_G: Tuple[point, point, point]) -> int:
|
||||
sm3 = Sm3() # pylint: disable=e0602
|
||||
for i in triple_G:
|
||||
for j in i:
|
||||
sm3.update(j.to_bytes(32))
|
||||
hash = sm3.digest()
|
||||
hash = int.from_bytes(hash,'big') % G.P
|
||||
hash = int.from_bytes(hash, "big") % G.P
|
||||
return hash
|
||||
|
||||
def f(x: int, f_modulus: list, T: int) -> int:
|
||||
'''
|
||||
|
||||
'''
|
||||
def f(x: int, f_modulus: list, T: int) -> int:
|
||||
""" """
|
||||
res = 0
|
||||
for i in range(T):
|
||||
res += f_modulus[i] * pow(x, i)
|
||||
return res
|
||||
|
||||
|
||||
def GenerateReKey(sk_A: int, pk_B: point, N: int, T: int) -> list:
|
||||
'''
|
||||
"""
|
||||
param:
|
||||
skA, pkB, N(节点总数), T(阈值)
|
||||
return:
|
||||
rki(0 <= i <= N-1)
|
||||
'''
|
||||
"""
|
||||
# 计算临时密钥对(x_A, X_A)
|
||||
x_A = random.randint(0, G.P - 1)
|
||||
X_A = multiply(g, x_A)
|
||||
@ -307,6 +317,7 @@ def GenerateReKey(sk_A: int, pk_B: point, N: int, T: int) -> list:
|
||||
|
||||
return KF
|
||||
|
||||
|
||||
def Encapsulate(pk_A: point) -> Tuple[int, capsule]:
|
||||
r = random.randint(0, G.P - 1)
|
||||
u = random.randint(0, G.P - 1)
|
||||
@ -318,6 +329,7 @@ def Encapsulate(pk_A: point) -> Tuple[int, capsule]:
|
||||
capsule = (E, V, s)
|
||||
return (K, capsule)
|
||||
|
||||
|
||||
def Checkcapsule(capsule: capsule) -> bool: # 验证胶囊的有效性
|
||||
E, V, s = capsule
|
||||
h2 = hash2((E, V))
|
||||
@ -332,29 +344,35 @@ def Checkcapsule(capsule:capsule) -> bool: # 验证胶囊的有效性
|
||||
|
||||
return flag
|
||||
|
||||
|
||||
def ReEncapsulate(kFrag: list, capsule: capsule) -> Tuple[point, point, int, point]:
|
||||
id, rk, Xa, U1 = kFrag
|
||||
E, V, s = capsule
|
||||
if not Checkcapsule(capsule):
|
||||
raise ValueError('Invalid capsule')
|
||||
raise ValueError("Invalid capsule")
|
||||
flag = Checkcapsule(capsule)
|
||||
assert flag == True # 断言,判断胶囊capsule的有效性
|
||||
assert flag == True # 断言,判断胶囊capsule的有效性
|
||||
E1 = multiply(E, rk)
|
||||
V1 = multiply(V, rk)
|
||||
cfrag = E1, V1, id, Xa
|
||||
return cfrag # cfrag=(E1,V1,id,Xa) E1= E^rk V1=V^rk
|
||||
|
||||
# 重加密函数
|
||||
def ReEncrypt(kFrag:list,
|
||||
C:Tuple[capsule,int])->Tuple[Tuple[point,point,int,point],int] :
|
||||
|
||||
|
||||
def ReEncrypt(
|
||||
kFrag: list, C: Tuple[capsule, bytes]
|
||||
) -> Tuple[Tuple[point, point, int, point], bytes]:
|
||||
capsule, enc_Data = C
|
||||
|
||||
cFrag = ReEncapsulate(kFrag, capsule)
|
||||
return (cFrag, enc_Data) # 输出密文
|
||||
|
||||
|
||||
# capsule, enc_Data = C
|
||||
|
||||
|
||||
# 将加密节点加密后产生的t个(capsule,ct)合并在一起,产生cfrags = {{capsule1,capsule2,...},ct}
|
||||
# 将加密节点加密后产生的t个(capsule,ct)合并在一起,产生cfrags = {{capsule1,capsule2,...},ct}
|
||||
def mergecfrag(cfrag_cts: list) -> list:
|
||||
ct_list = []
|
||||
cfrags_list = []
|
||||
@ -367,28 +385,21 @@ def mergecfrag(cfrag_cts:list)->list:
|
||||
return cfrags
|
||||
|
||||
|
||||
|
||||
def DecapsulateFrags(sk_B:int,
|
||||
pk_B: point,
|
||||
pk_A:point,
|
||||
cFrags:list
|
||||
) -> int:
|
||||
'''
|
||||
def DecapsulateFrags(sk_B: int, pk_B: point, pk_A: point, cFrags: list) -> int:
|
||||
"""
|
||||
return:
|
||||
K: sm4 key
|
||||
'''
|
||||
"""
|
||||
|
||||
Elist = []
|
||||
Vlist = []
|
||||
idlist = []
|
||||
X_Alist = []
|
||||
t = 0
|
||||
for cfrag in cFrags: # Ei,Vi,id,Xa = cFrag
|
||||
Elist.append(cfrag[0])
|
||||
Vlist.append(cfrag[1])
|
||||
idlist.append(cfrag[2])
|
||||
X_Alist.append(cfrag[3])
|
||||
t = t+1 # 总共有t个片段,t为阈值
|
||||
|
||||
pkab = multiply(pk_A, sk_B) # pka^b
|
||||
D = hash6((pk_A, pk_B, pkab))
|
||||
@ -400,22 +411,23 @@ def DecapsulateFrags(sk_B:int,
|
||||
j = 1
|
||||
i = 1
|
||||
bi = 1
|
||||
for i in range(t):
|
||||
for j in range(t):
|
||||
if j == i:
|
||||
j=j+1
|
||||
else:
|
||||
bi = bi * (Sx[j]//(Sx[j]-Sx[i])) # 暂定整除
|
||||
for i in range(len(cFrags)):
|
||||
for j in range(len(cFrags)):
|
||||
if j != i:
|
||||
# bi = bi * (Sx[j] // (Sx[j] - Sx[i])) # 暂定整除
|
||||
Sxj_sub_Sxi = (Sx[j] - Sx[i]) % sm2p256v1.P
|
||||
Sxj_sub_Sxi_inv = inv(Sxj_sub_Sxi, sm2p256v1.P)
|
||||
bi = (bi * Sx[j] * Sxj_sub_Sxi_inv) % sm2p256v1.P
|
||||
bis.append(bi)
|
||||
|
||||
E2 = multiply(Elist[0], bis[0]) # E^ 便于计算
|
||||
V2 = multiply(Vlist[0], bis[0]) # V^
|
||||
for k in range(1,t):
|
||||
for k in range(1, len(cFrags)):
|
||||
Ek = multiply(Elist[k], bis[k]) # EK/Vk 是个列表
|
||||
Vk = multiply(Vlist[k], bis[k])
|
||||
E2 = add(Ek, E2)
|
||||
V2 = add(Vk, V2)
|
||||
X_Ab = multiply(X_Alist[0],sk_B) # X_A^b X_A 的值是随机生成的xa,通过椭圆曲线上的倍点运算生成的固定的值
|
||||
X_Ab = multiply(X_Alist[0], sk_B) # X_A^b X_A 的值是随机生成的xa,通过椭圆曲线上的倍点运算生成的固定的值
|
||||
d = hash3((X_Alist[0], pk_B, X_Ab))
|
||||
EV = add(E2, V2) # E2 + V2
|
||||
EVd = multiply(EV, d) # (E2 + V2)^d
|
||||
@ -423,18 +435,16 @@ def DecapsulateFrags(sk_B:int,
|
||||
|
||||
return K
|
||||
|
||||
|
||||
# M = IAEAM(K,enc_Data)
|
||||
|
||||
|
||||
# cfrags = {{capsule1,capsule2,...},ct} ,ct->en_Data
|
||||
def DecryptFrags(sk_B: int,
|
||||
pk_B: point,
|
||||
pk_A: point,
|
||||
cfrags:list
|
||||
) -> bytes:
|
||||
def DecryptFrags(sk_B: int, pk_B: point, pk_A: point, cfrags: list) -> bytes:
|
||||
capsules, enc_Data = cfrags # 加密后的密文
|
||||
K = DecapsulateFrags(sk_B, pk_B, pk_A, capsules)
|
||||
K = K.to_bytes(16)
|
||||
iv = b'tpretpretpretpre'
|
||||
iv = b"tpretpretpretpre"
|
||||
sm4_dec = Sm4Cbc(K, iv, DO_DECRYPT) # pylint: disable= e0602
|
||||
try:
|
||||
dec_Data = sm4_dec.update(enc_Data)
|
||||
@ -442,5 +452,5 @@ def DecryptFrags(sk_B: int,
|
||||
except Exception as e:
|
||||
print(e)
|
||||
print("key error")
|
||||
dec_Data = b''
|
||||
dec_Data = b""
|
||||
return dec_Data
|
Loading…
x
Reference in New Issue
Block a user