2021-05-01 22:25:32 -04:00
|
|
|
/*! A module for the protocol for the user to increase their trust level
|
|
|
|
(from a level at least 1; use the trust promotion protocol to go from
|
|
|
|
untrusted (level 0) to minimally trusted (level 1).
|
|
|
|
|
|
|
|
They are allowed to do this as long as some amount of time (depending on
|
|
|
|
their current level) has elapsed since their last level change, and they
|
|
|
|
have a Bucket Reachability credential for their current bucket and
|
|
|
|
today's date. (Such credentials are placed daily in the encrypted
|
|
|
|
bridge table.)
|
|
|
|
|
|
|
|
The user presents their current Lox credential:
|
|
|
|
- id: revealed
|
|
|
|
- bucket: blinded
|
|
|
|
- trust_level: revealed, and must be at least 1
|
|
|
|
- level_since: blinded, but proved in ZK that it's at least the
|
|
|
|
appropriate number of days ago
|
|
|
|
- invites_remaining: blinded
|
2021-05-03 14:27:11 -04:00
|
|
|
- blockages: blinded, but proved in ZK that it's at most the appropriate
|
|
|
|
blockage limit for the target trust level
|
2021-05-01 22:25:32 -04:00
|
|
|
|
|
|
|
and a Bucket Reachability credential:
|
|
|
|
- date: revealed to be today
|
|
|
|
- bucket: blinded, but proved in ZK that it's the same as in the Lox
|
|
|
|
credential above
|
|
|
|
|
|
|
|
and a new Lox credential to be issued:
|
|
|
|
|
|
|
|
- id: jointly chosen by the user and BA
|
|
|
|
- bucket: blinded, but proved in ZK that it's the same as in the Lox
|
|
|
|
credential above
|
|
|
|
- trust_level: revealed to be one more than the trust level above
|
|
|
|
- level_since: today
|
2021-05-02 18:10:59 -04:00
|
|
|
- invites_remaining: revealed to be the number of invites for the new
|
|
|
|
level (note that the invites_remaining from the previous credential
|
|
|
|
are _not_ carried over)
|
2021-05-03 14:27:11 -04:00
|
|
|
- blockages: blinded, but proved in ZK that it's the same as in the
|
2021-05-01 22:25:32 -04:00
|
|
|
Lox credential above
|
|
|
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
use curve25519_dalek::ristretto::RistrettoBasepointTable;
|
|
|
|
use curve25519_dalek::ristretto::RistrettoPoint;
|
|
|
|
use curve25519_dalek::scalar::Scalar;
|
|
|
|
use curve25519_dalek::traits::IsIdentity;
|
|
|
|
|
|
|
|
use zkp::CompactProof;
|
|
|
|
use zkp::ProofError;
|
|
|
|
use zkp::Transcript;
|
|
|
|
|
2021-05-26 18:15:13 -04:00
|
|
|
use serde::{Deserialize, Serialize};
|
2021-05-26 13:16:14 -04:00
|
|
|
|
2021-05-01 22:25:32 -04:00
|
|
|
use super::super::cred;
|
|
|
|
use super::super::dup_filter::SeenType;
|
|
|
|
use super::super::{pt_dbl, scalar_dbl, scalar_u32};
|
|
|
|
use super::super::{BridgeAuth, IssuerPubKey};
|
|
|
|
use super::super::{CMZ_A, CMZ_A_TABLE, CMZ_B, CMZ_B_TABLE};
|
|
|
|
|
2021-05-02 18:10:59 -04:00
|
|
|
/// The maximum trust level in the system. A user can run this level
|
|
|
|
/// upgrade protocol when they're already at the max level; they will
|
|
|
|
/// get a fresh invites_remaining batch, and reset their level_since
|
|
|
|
/// field to today's date, but will remain in the max level.
|
2021-05-03 14:59:55 -04:00
|
|
|
pub const MAX_LEVEL: usize = 4;
|
2021-05-02 18:10:59 -04:00
|
|
|
|
2021-05-01 22:25:32 -04:00
|
|
|
/// LEVEL_INTERVAL\[i\] for i >= 1 is the minimum number of days a user
|
2021-05-02 18:10:59 -04:00
|
|
|
/// must be at trust level i before advancing to level i+1 (or as above,
|
|
|
|
/// remain at level i if i == MAX_LEVEL). Note that the
|
|
|
|
/// LEVEL_INTERVAL\[0\] entry is a dummy; the trust_promotion protocol
|
|
|
|
/// is used instead of this one to move from level 0 to level 1.
|
2021-05-03 14:59:55 -04:00
|
|
|
pub const LEVEL_INTERVAL: [u32; MAX_LEVEL + 1] = [0, 14, 28, 56, 84];
|
2021-05-02 18:10:59 -04:00
|
|
|
|
|
|
|
/// LEVEL_INVITATIONS\[i\] for i >= 1 is the number of invitations a
|
|
|
|
/// user will be eligible to issue upon advancing from level i to level
|
|
|
|
/// i+1. Again the LEVEL_INVITATIONS\[0\] entry is a dummy, as for
|
|
|
|
/// LEVEL_INTERVAL.
|
2021-05-03 14:59:55 -04:00
|
|
|
pub const LEVEL_INVITATIONS: [u32; MAX_LEVEL + 1] = [0, 2, 4, 6, 8];
|
|
|
|
|
|
|
|
/// MAX_BLOCKAGES\[i\] for i >= 1 is the maximum number of bucket
|
|
|
|
/// blockages this credential is allowed to have recorded in order to
|
|
|
|
/// advance from level i to level i+1. Again the LEVEL_INVITATIONS\[0\]
|
|
|
|
/// entry is a dummy, as for LEVEL_INTERVAL.
|
2021-05-03 19:05:42 -04:00
|
|
|
// If you change this to have a number greater than 7, you need to add
|
|
|
|
// one or more bits to the ZKP.
|
2021-05-03 14:59:55 -04:00
|
|
|
pub const MAX_BLOCKAGES: [u32; MAX_LEVEL + 1] = [0, 4, 3, 2, 2];
|
2021-05-01 22:25:32 -04:00
|
|
|
|
2021-05-26 13:16:14 -04:00
|
|
|
#[derive(Serialize, Deserialize)]
|
2021-05-01 22:25:32 -04:00
|
|
|
pub struct Request {
|
|
|
|
// Fields for blind showing the Lox credential
|
|
|
|
P: RistrettoPoint,
|
|
|
|
id: Scalar,
|
|
|
|
CBucket: RistrettoPoint,
|
|
|
|
level: Scalar,
|
|
|
|
CSince: RistrettoPoint,
|
|
|
|
CInvRemain: RistrettoPoint,
|
2021-05-03 14:27:11 -04:00
|
|
|
CBlockages: RistrettoPoint,
|
2021-05-01 22:25:32 -04:00
|
|
|
CQ: RistrettoPoint,
|
|
|
|
|
|
|
|
// Fields for blind showing the Bucket Reachability credential
|
|
|
|
P_reach: RistrettoPoint,
|
|
|
|
CBucket_reach: RistrettoPoint,
|
|
|
|
CQ_reach: RistrettoPoint,
|
|
|
|
|
2021-05-03 14:59:55 -04:00
|
|
|
// Fields for the inequality proof
|
|
|
|
// level_since + LEVEL_INTERVAL[level] <= today
|
2021-05-01 22:25:32 -04:00
|
|
|
CG1: RistrettoPoint,
|
|
|
|
CG2: RistrettoPoint,
|
|
|
|
CG3: RistrettoPoint,
|
|
|
|
CG4: RistrettoPoint,
|
|
|
|
CG5: RistrettoPoint,
|
|
|
|
CG6: RistrettoPoint,
|
|
|
|
CG7: RistrettoPoint,
|
|
|
|
CG8: RistrettoPoint,
|
|
|
|
CG0sq: RistrettoPoint,
|
|
|
|
CG1sq: RistrettoPoint,
|
|
|
|
CG2sq: RistrettoPoint,
|
|
|
|
CG3sq: RistrettoPoint,
|
|
|
|
CG4sq: RistrettoPoint,
|
|
|
|
CG5sq: RistrettoPoint,
|
|
|
|
CG6sq: RistrettoPoint,
|
|
|
|
CG7sq: RistrettoPoint,
|
|
|
|
CG8sq: RistrettoPoint,
|
|
|
|
|
2021-05-03 14:59:55 -04:00
|
|
|
// Fields for the inequality proof
|
|
|
|
// blockages <= MAX_BLOCKAGES[level]
|
|
|
|
CH1: RistrettoPoint,
|
|
|
|
CH2: RistrettoPoint,
|
|
|
|
CH0sq: RistrettoPoint,
|
|
|
|
CH1sq: RistrettoPoint,
|
|
|
|
CH2sq: RistrettoPoint,
|
|
|
|
|
2021-05-01 22:25:32 -04:00
|
|
|
// Fields for user blinding of the Lox credential to be issued
|
|
|
|
D: RistrettoPoint,
|
|
|
|
EncIdClient: (RistrettoPoint, RistrettoPoint),
|
|
|
|
EncBucket: (RistrettoPoint, RistrettoPoint),
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages: (RistrettoPoint, RistrettoPoint),
|
2021-05-01 22:25:32 -04:00
|
|
|
|
|
|
|
// The combined ZKP
|
|
|
|
piUser: CompactProof,
|
|
|
|
}
|
|
|
|
|
|
|
|
#[derive(Debug)]
|
|
|
|
pub struct State {
|
|
|
|
d: Scalar,
|
|
|
|
D: RistrettoPoint,
|
|
|
|
EncIdClient: (RistrettoPoint, RistrettoPoint),
|
|
|
|
EncBucket: (RistrettoPoint, RistrettoPoint),
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages: (RistrettoPoint, RistrettoPoint),
|
2021-05-01 22:25:32 -04:00
|
|
|
id_client: Scalar,
|
|
|
|
bucket: Scalar,
|
|
|
|
level: Scalar,
|
|
|
|
invremain: Scalar,
|
2021-05-03 14:27:11 -04:00
|
|
|
blockages: Scalar,
|
2021-05-01 22:25:32 -04:00
|
|
|
}
|
|
|
|
|
2021-05-26 13:16:14 -04:00
|
|
|
#[derive(Serialize, Deserialize)]
|
2021-05-01 22:25:32 -04:00
|
|
|
pub struct Response {
|
|
|
|
// The fields for the new Lox credential; the new trust level is one
|
|
|
|
// more than the old trust level, so we don't have to include it
|
|
|
|
// here explicitly
|
|
|
|
P: RistrettoPoint,
|
|
|
|
EncQ: (RistrettoPoint, RistrettoPoint),
|
|
|
|
id_server: Scalar,
|
|
|
|
level_since: Scalar,
|
|
|
|
TId: RistrettoPoint,
|
|
|
|
TBucket: RistrettoPoint,
|
2021-05-03 14:27:11 -04:00
|
|
|
TBlockages: RistrettoPoint,
|
2021-05-01 22:25:32 -04:00
|
|
|
|
|
|
|
// The ZKP
|
|
|
|
piBlindIssue: CompactProof,
|
|
|
|
}
|
|
|
|
|
|
|
|
define_proof! {
|
|
|
|
requestproof,
|
|
|
|
"Level Upgrade Request",
|
2021-05-03 14:27:11 -04:00
|
|
|
(bucket, since, invremain, blockages, zbucket, zsince, zinvremain,
|
|
|
|
zblockages, negzQ,
|
2021-05-01 22:25:32 -04:00
|
|
|
zbucket_reach, negzQ_reach,
|
2021-05-03 14:27:11 -04:00
|
|
|
d, eid_client, ebucket, eblockages, id_client,
|
2021-05-01 22:25:32 -04:00
|
|
|
g0, g1, g2, g3, g4, g5, g6, g7, g8,
|
|
|
|
zg0, zg1, zg2, zg3, zg4, zg5, zg6, zg7, zg8,
|
|
|
|
wg0, wg1, wg2, wg3, wg4, wg5, wg6, wg7, wg8,
|
2021-05-03 14:59:55 -04:00
|
|
|
yg0, yg1, yg2, yg3, yg4, yg5, yg6, yg7, yg8,
|
|
|
|
h0, h1, h2,
|
|
|
|
zh0, zh1, zh2,
|
|
|
|
wh0, wh1, wh2,
|
|
|
|
yh0, yh1, yh2),
|
2021-05-03 14:27:11 -04:00
|
|
|
(P, CBucket, CSince, CInvRemain, CBlockages, V, Xbucket, Xsince,
|
|
|
|
Xinvremain, Xblockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
P_reach, CBucket_reach, V_reach, Xbucket_reach,
|
|
|
|
D, EncIdClient0, EncIdClient1, EncBucket0, EncBucket1,
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages0, EncBlockages1,
|
2021-05-01 22:25:32 -04:00
|
|
|
CG0, CG1, CG2, CG3, CG4, CG5, CG6, CG7, CG8,
|
2021-05-03 14:59:55 -04:00
|
|
|
CG0sq, CG1sq, CG2sq, CG3sq, CG4sq, CG5sq, CG6sq, CG7sq, CG8sq,
|
|
|
|
CH0, CH1, CH2,
|
|
|
|
CH0sq, CH1sq, CH2sq),
|
2021-05-01 22:25:32 -04:00
|
|
|
(A, B) :
|
|
|
|
// Blind showing of the Lox credential
|
|
|
|
CBucket = (bucket*P + zbucket*A),
|
|
|
|
CSince = (since*P + zsince*A),
|
|
|
|
CInvRemain = (invremain*P + zinvremain*A),
|
2021-05-03 14:27:11 -04:00
|
|
|
CBlockages = (blockages*P + zblockages*A),
|
2021-05-01 22:25:32 -04:00
|
|
|
// Blind showing of the Bucket Reachability credential; note the
|
|
|
|
// same bucket is used in the proof
|
|
|
|
CBucket_reach = (bucket*P_reach + zbucket_reach*A),
|
|
|
|
// User blinding of the Lox credential to be issued
|
|
|
|
D = (d*B),
|
|
|
|
EncIdClient0 = (eid_client*B),
|
|
|
|
EncIdClient1 = (id_client*B + eid_client*D),
|
|
|
|
EncBucket0 = (ebucket*B),
|
|
|
|
EncBucket1 = (bucket*B + ebucket*D),
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages0 = (eblockages*B),
|
|
|
|
EncBlockages1 = (blockages*B + eblockages*D),
|
2021-05-01 22:25:32 -04:00
|
|
|
// Prove CSince encodes a value at least LEVEL_INTERVAL
|
2021-05-03 14:59:55 -04:00
|
|
|
// days ago (and technically at most LEVEL_INTERVAL+511 days
|
2021-05-01 22:25:32 -04:00
|
|
|
// ago): first prove each of g0, ..., g8 is a bit by proving that
|
|
|
|
// gi = gi^2
|
|
|
|
CG0 = (g0*P + zg0*A), CG0sq = (g0*CG0 + wg0*A), CG0sq = (g0*P + yg0*A),
|
|
|
|
CG1 = (g1*P + zg1*A), CG1sq = (g1*CG1 + wg1*A), CG1sq = (g1*P + yg1*A),
|
|
|
|
CG2 = (g2*P + zg2*A), CG2sq = (g2*CG2 + wg2*A), CG2sq = (g2*P + yg2*A),
|
|
|
|
CG3 = (g3*P + zg3*A), CG3sq = (g3*CG3 + wg3*A), CG3sq = (g3*P + yg3*A),
|
|
|
|
CG4 = (g4*P + zg4*A), CG4sq = (g4*CG4 + wg4*A), CG4sq = (g4*P + yg4*A),
|
|
|
|
CG5 = (g5*P + zg5*A), CG5sq = (g5*CG5 + wg5*A), CG5sq = (g5*P + yg5*A),
|
|
|
|
CG6 = (g6*P + zg6*A), CG6sq = (g6*CG6 + wg6*A), CG6sq = (g6*P + yg6*A),
|
|
|
|
CG7 = (g7*P + zg7*A), CG7sq = (g7*CG7 + wg7*A), CG7sq = (g7*P + yg7*A),
|
2021-05-03 14:59:55 -04:00
|
|
|
CG8 = (g8*P + zg8*A), CG8sq = (g8*CG8 + wg8*A), CG8sq = (g8*P + yg8*A),
|
2021-05-01 22:25:32 -04:00
|
|
|
// Then we'll check that CSince + LEVEL_INTERVAL*P + CG0 + 2*CG1
|
|
|
|
// + 4*CG2 + 8*CG3 + ... + 256*CG8 = today*P by having the verifier
|
|
|
|
// plug in today*P - (CSince + LEVEL_INTERVAL*P + 2*CG1 + 4*CG2
|
|
|
|
// + ... + 256*CG8) as its value of CG0.
|
2021-05-03 14:59:55 -04:00
|
|
|
|
|
|
|
// Prove CBlockage encodes a value at most MAX_BLOCKAGES (and at least
|
|
|
|
// MAX_BLOCKAGES-7)
|
|
|
|
CH0 = (h0*P + zh0*A), CH0sq = (h0*CH0 + wh0*A), CH0sq = (h0*P + yh0*A),
|
|
|
|
CH1 = (h1*P + zh1*A), CH1sq = (h1*CH1 + wh1*A), CH1sq = (h1*P + yh1*A),
|
|
|
|
CH2 = (h2*P + zh2*A), CH2sq = (h2*CH2 + wh2*A), CH2sq = (h2*P + yh2*A)
|
|
|
|
// Then we'll check that CBlockage + CH0 + 2*CH1 + 4*CH2 =
|
|
|
|
// MAX_BLOCKAGES*P by having the verifier plug in MAX_BLOCKAGES*P -
|
|
|
|
// (CBlockage - 2*CH1 - 4*CH2) as its value of CH0.
|
2021-05-01 22:25:32 -04:00
|
|
|
}
|
|
|
|
|
2021-05-02 21:44:33 -04:00
|
|
|
define_proof! {
|
|
|
|
blindissue,
|
|
|
|
"Level Upgrade Issuing",
|
2021-05-03 14:27:11 -04:00
|
|
|
(x0, x0tilde, xid, xbucket, xlevel, xsince, xinvremain, xblockages,
|
|
|
|
s, b, tid, tbucket, tblockages),
|
2021-05-02 21:44:33 -04:00
|
|
|
(P, EncQ0, EncQ1, X0, Xid, Xbucket, Xlevel, Xsince, Xinvremain,
|
2021-05-03 14:27:11 -04:00
|
|
|
Xblockages, Plevel, Psince, Pinvremain, TId, TBucket, TBlockages,
|
|
|
|
D, EncId0, EncId1, EncBucket0, EncBucket1, EncBlockages0, EncBlockages1),
|
2021-05-02 21:44:33 -04:00
|
|
|
(A, B):
|
|
|
|
Xid = (xid*A),
|
|
|
|
Xbucket = (xbucket*A),
|
2021-05-04 12:02:43 -04:00
|
|
|
Xlevel = (xlevel*A),
|
2021-05-02 21:44:33 -04:00
|
|
|
Xsince = (xsince*A),
|
|
|
|
Xinvremain = (xinvremain*A),
|
2021-05-03 14:27:11 -04:00
|
|
|
Xblockages = (xblockages*A),
|
2021-05-02 21:44:33 -04:00
|
|
|
X0 = (x0*B + x0tilde*A),
|
|
|
|
P = (b*B),
|
|
|
|
TId = (b*Xid),
|
|
|
|
TId = (tid*A),
|
|
|
|
TBucket = (b*Xbucket),
|
|
|
|
TBucket = (tbucket*A),
|
2021-05-03 14:27:11 -04:00
|
|
|
TBlockages = (b*Xblockages),
|
|
|
|
TBlockages = (tblockages*A),
|
|
|
|
EncQ0 = (s*B + tid*EncId0 + tbucket*EncBucket0 + tblockages*EncBlockages0),
|
2021-05-02 21:44:33 -04:00
|
|
|
EncQ1 = (s*D + tid*EncId1 + tbucket*EncBucket1
|
2021-05-03 14:27:11 -04:00
|
|
|
+ tblockages*EncBlockages1 + x0*P + xlevel*Plevel + xsince*Psince
|
2021-05-03 14:13:13 -04:00
|
|
|
+ xinvremain*Pinvremain)
|
2021-05-02 21:44:33 -04:00
|
|
|
}
|
|
|
|
|
2021-05-01 22:25:32 -04:00
|
|
|
pub fn request(
|
|
|
|
lox_cred: &cred::Lox,
|
|
|
|
reach_cred: &cred::BucketReachability,
|
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
|
reach_pub: &IssuerPubKey,
|
|
|
|
today: u32,
|
|
|
|
) -> Result<(Request, State), ProofError> {
|
|
|
|
let A: &RistrettoPoint = &CMZ_A;
|
|
|
|
let B: &RistrettoPoint = &CMZ_B;
|
|
|
|
let Atable: &RistrettoBasepointTable = &CMZ_A_TABLE;
|
|
|
|
let Btable: &RistrettoBasepointTable = &CMZ_B_TABLE;
|
|
|
|
|
|
|
|
// Ensure the credential can be correctly shown: it must be the case
|
|
|
|
// that level_since + LEVEL_INTERVAL[level] <= today.
|
|
|
|
let level_since: u32 = match scalar_u32(&lox_cred.level_since) {
|
|
|
|
Some(v) => v,
|
|
|
|
None => return Err(ProofError::VerificationFailure),
|
|
|
|
};
|
|
|
|
// The trust level has to be at least 1
|
|
|
|
let trust_level: u32 = match scalar_u32(&lox_cred.trust_level) {
|
|
|
|
Some(v) => v,
|
|
|
|
None => return Err(ProofError::VerificationFailure),
|
|
|
|
};
|
2021-05-02 21:44:33 -04:00
|
|
|
if trust_level < 1 || (trust_level as usize) > MAX_LEVEL {
|
2021-05-01 22:25:32 -04:00
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
// The trust level has to be no higher than the highest level
|
|
|
|
let level_interval: u32 = match LEVEL_INTERVAL.get(trust_level as usize) {
|
|
|
|
Some(&v) => v,
|
|
|
|
None => return Err(ProofError::VerificationFailure),
|
|
|
|
};
|
|
|
|
if level_since + level_interval > today {
|
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
// The credential can't be _too_ old
|
|
|
|
let diffdays = today - (level_since + level_interval);
|
|
|
|
if diffdays > 511 {
|
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
2021-05-03 14:59:55 -04:00
|
|
|
// The current number of blockages
|
|
|
|
let blockages: u32 = match scalar_u32(&lox_cred.blockages) {
|
|
|
|
Some(v) => v,
|
|
|
|
None => return Err(ProofError::VerificationFailure),
|
|
|
|
};
|
|
|
|
if blockages > MAX_BLOCKAGES[trust_level as usize] {
|
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
let blockage_diff = MAX_BLOCKAGES[trust_level as usize] - blockages;
|
2021-05-01 22:25:32 -04:00
|
|
|
// The buckets in the Lox and Bucket Reachability credentials have
|
|
|
|
// to match
|
|
|
|
if lox_cred.bucket != reach_cred.bucket {
|
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
// The Bucket Reachability credential has to be dated today
|
|
|
|
let reach_date: u32 = match scalar_u32(&reach_cred.date) {
|
|
|
|
Some(v) => v,
|
|
|
|
None => return Err(ProofError::VerificationFailure),
|
|
|
|
};
|
|
|
|
if reach_date != today {
|
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
2021-05-02 21:44:33 -04:00
|
|
|
// The new trust level
|
|
|
|
let new_level = if (trust_level as usize) < MAX_LEVEL {
|
|
|
|
trust_level + 1
|
|
|
|
} else {
|
|
|
|
trust_level
|
|
|
|
};
|
2021-05-01 22:25:32 -04:00
|
|
|
|
|
|
|
// Blind showing the Lox credential
|
|
|
|
|
|
|
|
// Reblind P and Q
|
|
|
|
let mut rng = rand::thread_rng();
|
|
|
|
let t = Scalar::random(&mut rng);
|
|
|
|
let P = t * lox_cred.P;
|
|
|
|
let Q = t * lox_cred.Q;
|
|
|
|
|
|
|
|
// Form Pedersen commitments to the blinded attributes
|
|
|
|
let zbucket = Scalar::random(&mut rng);
|
|
|
|
let zsince = Scalar::random(&mut rng);
|
|
|
|
let zinvremain = Scalar::random(&mut rng);
|
2021-05-03 14:27:11 -04:00
|
|
|
let zblockages = Scalar::random(&mut rng);
|
2021-05-01 22:25:32 -04:00
|
|
|
let CBucket = lox_cred.bucket * P + &zbucket * Atable;
|
|
|
|
let CSince = lox_cred.level_since * P + &zsince * Atable;
|
|
|
|
let CInvRemain = lox_cred.invites_remaining * P + &zinvremain * Atable;
|
2021-05-03 14:27:11 -04:00
|
|
|
let CBlockages = lox_cred.blockages * P + &zblockages * Atable;
|
2021-05-01 22:25:32 -04:00
|
|
|
|
|
|
|
// Form a Pedersen commitment to the MAC Q
|
|
|
|
// We flip the sign of zQ from that of the Hyphae paper so that
|
|
|
|
// the ZKP has a "+" instead of a "-", as that's what the zkp
|
|
|
|
// macro supports.
|
|
|
|
let negzQ = Scalar::random(&mut rng);
|
|
|
|
let CQ = Q - &negzQ * Atable;
|
|
|
|
|
|
|
|
// Compute the "error factor"
|
|
|
|
let V = zbucket * lox_pub.X[2]
|
|
|
|
+ zsince * lox_pub.X[4]
|
|
|
|
+ zinvremain * lox_pub.X[5]
|
2021-05-03 14:27:11 -04:00
|
|
|
+ zblockages * lox_pub.X[6]
|
2021-05-01 22:25:32 -04:00
|
|
|
+ &negzQ * Atable;
|
|
|
|
|
|
|
|
// Blind showing the Bucket Reachability credential
|
|
|
|
|
|
|
|
// Reblind P and Q
|
|
|
|
let t_reach = Scalar::random(&mut rng);
|
|
|
|
let P_reach = t_reach * reach_cred.P;
|
|
|
|
let Q_reach = t_reach * reach_cred.Q;
|
|
|
|
|
|
|
|
// Form Pedersen commitments to the blinded attributes
|
|
|
|
let zbucket_reach = Scalar::random(&mut rng);
|
|
|
|
let CBucket_reach = reach_cred.bucket * P_reach + &zbucket_reach * Atable;
|
|
|
|
|
|
|
|
// Form a Pedersen commitment to the MAC Q
|
|
|
|
// We flip the sign of zQ from that of the Hyphae paper so that
|
|
|
|
// the ZKP has a "+" instead of a "-", as that's what the zkp
|
|
|
|
// macro supports.
|
|
|
|
let negzQ_reach = Scalar::random(&mut rng);
|
|
|
|
let CQ_reach = Q_reach - &negzQ_reach * Atable;
|
|
|
|
|
|
|
|
// Compute the "error factor"
|
|
|
|
let V_reach = zbucket_reach * reach_pub.X[2] + &negzQ_reach * Atable;
|
|
|
|
|
|
|
|
// User blinding for the Lox certificate to be issued
|
|
|
|
|
|
|
|
// Pick an ElGamal keypair
|
|
|
|
let d = Scalar::random(&mut rng);
|
|
|
|
let D = &d * Btable;
|
|
|
|
|
|
|
|
// Pick a random client component of the id
|
|
|
|
let id_client = Scalar::random(&mut rng);
|
|
|
|
|
|
|
|
// Encrypt it (times the basepoint B) to the ElGamal public key D we
|
|
|
|
// just created
|
|
|
|
let eid_client = Scalar::random(&mut rng);
|
|
|
|
let EncIdClient = (&eid_client * Btable, &id_client * Btable + eid_client * D);
|
|
|
|
|
|
|
|
// Encrypt the other blinded fields (times B) to D as well
|
|
|
|
let ebucket = Scalar::random(&mut rng);
|
|
|
|
let EncBucket = (&ebucket * Btable, &lox_cred.bucket * Btable + ebucket * D);
|
2021-05-03 19:05:42 -04:00
|
|
|
let newinvites: Scalar = LEVEL_INVITATIONS[trust_level as usize].into();
|
2021-05-03 14:27:11 -04:00
|
|
|
let eblockages = Scalar::random(&mut rng);
|
|
|
|
let EncBlockages = (
|
|
|
|
&eblockages * Btable,
|
|
|
|
&lox_cred.blockages * Btable + eblockages * D,
|
2021-05-01 22:25:32 -04:00
|
|
|
);
|
|
|
|
|
|
|
|
// The range proof that 0 <= diffdays <= 511
|
|
|
|
|
|
|
|
// Extract the 9 bits from diffdays
|
|
|
|
let g0: Scalar = (diffdays & 1).into();
|
|
|
|
let g1: Scalar = ((diffdays >> 1) & 1).into();
|
|
|
|
let g2: Scalar = ((diffdays >> 2) & 1).into();
|
|
|
|
let g3: Scalar = ((diffdays >> 3) & 1).into();
|
|
|
|
let g4: Scalar = ((diffdays >> 4) & 1).into();
|
|
|
|
let g5: Scalar = ((diffdays >> 5) & 1).into();
|
|
|
|
let g6: Scalar = ((diffdays >> 6) & 1).into();
|
|
|
|
let g7: Scalar = ((diffdays >> 7) & 1).into();
|
|
|
|
let g8: Scalar = ((diffdays >> 8) & 1).into();
|
|
|
|
|
|
|
|
// Pick random factors for the Pedersen commitments
|
|
|
|
let wg0 = Scalar::random(&mut rng);
|
|
|
|
let zg1 = Scalar::random(&mut rng);
|
|
|
|
let wg1 = Scalar::random(&mut rng);
|
|
|
|
let zg2 = Scalar::random(&mut rng);
|
|
|
|
let wg2 = Scalar::random(&mut rng);
|
|
|
|
let zg3 = Scalar::random(&mut rng);
|
|
|
|
let wg3 = Scalar::random(&mut rng);
|
|
|
|
let zg4 = Scalar::random(&mut rng);
|
|
|
|
let wg4 = Scalar::random(&mut rng);
|
|
|
|
let zg5 = Scalar::random(&mut rng);
|
|
|
|
let wg5 = Scalar::random(&mut rng);
|
|
|
|
let zg6 = Scalar::random(&mut rng);
|
|
|
|
let wg6 = Scalar::random(&mut rng);
|
|
|
|
let zg7 = Scalar::random(&mut rng);
|
|
|
|
let wg7 = Scalar::random(&mut rng);
|
|
|
|
let zg8 = Scalar::random(&mut rng);
|
|
|
|
let wg8 = Scalar::random(&mut rng);
|
|
|
|
|
|
|
|
// Compute zg0 to cancel things out as
|
|
|
|
// zg0 = -(zsince + 2*zg1 + 4*zg2 + 8*zg3 + 16*zg4 + 32*zg5 + 64*zg6 + 128*zg7 + 256*zg8)
|
|
|
|
// but use Horner's method
|
|
|
|
let zg0 = -(scalar_dbl(
|
|
|
|
&(scalar_dbl(
|
|
|
|
&(scalar_dbl(
|
|
|
|
&(scalar_dbl(
|
|
|
|
&(scalar_dbl(
|
|
|
|
&(scalar_dbl(&(scalar_dbl(&(scalar_dbl(&zg8) + zg7)) + zg6)) + zg5),
|
|
|
|
) + zg4),
|
|
|
|
) + zg3),
|
|
|
|
) + zg2),
|
|
|
|
) + zg1),
|
|
|
|
) + zsince);
|
|
|
|
|
|
|
|
let yg0 = wg0 + g0 * zg0;
|
|
|
|
let yg1 = wg1 + g1 * zg1;
|
|
|
|
let yg2 = wg2 + g2 * zg2;
|
|
|
|
let yg3 = wg3 + g3 * zg3;
|
|
|
|
let yg4 = wg4 + g4 * zg4;
|
|
|
|
let yg5 = wg5 + g5 * zg5;
|
|
|
|
let yg6 = wg6 + g6 * zg6;
|
|
|
|
let yg7 = wg7 + g7 * zg7;
|
|
|
|
let yg8 = wg8 + g8 * zg8;
|
|
|
|
|
|
|
|
let CG0 = g0 * P + &zg0 * Atable;
|
|
|
|
let CG1 = g1 * P + &zg1 * Atable;
|
|
|
|
let CG2 = g2 * P + &zg2 * Atable;
|
|
|
|
let CG3 = g3 * P + &zg3 * Atable;
|
|
|
|
let CG4 = g4 * P + &zg4 * Atable;
|
|
|
|
let CG5 = g5 * P + &zg5 * Atable;
|
|
|
|
let CG6 = g6 * P + &zg6 * Atable;
|
|
|
|
let CG7 = g7 * P + &zg7 * Atable;
|
|
|
|
let CG8 = g8 * P + &zg8 * Atable;
|
|
|
|
|
|
|
|
let CG0sq = g0 * P + &yg0 * Atable;
|
|
|
|
let CG1sq = g1 * P + &yg1 * Atable;
|
|
|
|
let CG2sq = g2 * P + &yg2 * Atable;
|
|
|
|
let CG3sq = g3 * P + &yg3 * Atable;
|
|
|
|
let CG4sq = g4 * P + &yg4 * Atable;
|
|
|
|
let CG5sq = g5 * P + &yg5 * Atable;
|
|
|
|
let CG6sq = g6 * P + &yg6 * Atable;
|
|
|
|
let CG7sq = g7 * P + &yg7 * Atable;
|
|
|
|
let CG8sq = g8 * P + &yg8 * Atable;
|
|
|
|
|
2021-05-03 14:59:55 -04:00
|
|
|
// The range proof that 0 <= blockage_diff <= 7
|
|
|
|
|
|
|
|
// Extract the 3 bits from blockage_diff
|
|
|
|
let h0: Scalar = (blockage_diff & 1).into();
|
|
|
|
let h1: Scalar = ((blockage_diff >> 1) & 1).into();
|
|
|
|
let h2: Scalar = ((blockage_diff >> 2) & 1).into();
|
|
|
|
|
|
|
|
// Pick random factors for the Pedersen commitments
|
|
|
|
let wh0 = Scalar::random(&mut rng);
|
|
|
|
let zh1 = Scalar::random(&mut rng);
|
|
|
|
let wh1 = Scalar::random(&mut rng);
|
|
|
|
let zh2 = Scalar::random(&mut rng);
|
|
|
|
let wh2 = Scalar::random(&mut rng);
|
|
|
|
|
|
|
|
// Compute zh0 to cancel things out as
|
|
|
|
// zh0 = -(zblockages + 2*zh1 + 4*zh2)
|
|
|
|
// but use Horner's method
|
|
|
|
let zh0 = -(scalar_dbl(&(scalar_dbl(&zh2) + zh1)) + zblockages);
|
|
|
|
|
|
|
|
let yh0 = wh0 + h0 * zh0;
|
|
|
|
let yh1 = wh1 + h1 * zh1;
|
|
|
|
let yh2 = wh2 + h2 * zh2;
|
|
|
|
|
|
|
|
let CH0 = h0 * P + &zh0 * Atable;
|
|
|
|
let CH1 = h1 * P + &zh1 * Atable;
|
|
|
|
let CH2 = h2 * P + &zh2 * Atable;
|
|
|
|
|
|
|
|
let CH0sq = h0 * P + &yh0 * Atable;
|
|
|
|
let CH1sq = h1 * P + &yh1 * Atable;
|
|
|
|
let CH2sq = h2 * P + &yh2 * Atable;
|
|
|
|
|
2021-05-01 22:25:32 -04:00
|
|
|
// Construct the proof
|
|
|
|
let mut transcript = Transcript::new(b"level upgrade request");
|
|
|
|
let piUser = requestproof::prove_compact(
|
|
|
|
&mut transcript,
|
|
|
|
requestproof::ProveAssignments {
|
2022-10-18 00:51:17 -04:00
|
|
|
A,
|
|
|
|
B,
|
2021-05-01 22:25:32 -04:00
|
|
|
P: &P,
|
|
|
|
CBucket: &CBucket,
|
|
|
|
CSince: &CSince,
|
|
|
|
CInvRemain: &CInvRemain,
|
2021-05-03 14:27:11 -04:00
|
|
|
CBlockages: &CBlockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
V: &V,
|
|
|
|
Xbucket: &lox_pub.X[2],
|
|
|
|
Xsince: &lox_pub.X[4],
|
|
|
|
Xinvremain: &lox_pub.X[5],
|
2021-05-03 14:27:11 -04:00
|
|
|
Xblockages: &lox_pub.X[6],
|
2021-05-01 22:25:32 -04:00
|
|
|
P_reach: &P_reach,
|
|
|
|
CBucket_reach: &CBucket_reach,
|
|
|
|
V_reach: &V_reach,
|
|
|
|
Xbucket_reach: &reach_pub.X[2],
|
|
|
|
D: &D,
|
|
|
|
EncIdClient0: &EncIdClient.0,
|
|
|
|
EncIdClient1: &EncIdClient.1,
|
|
|
|
EncBucket0: &EncBucket.0,
|
|
|
|
EncBucket1: &EncBucket.1,
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages0: &EncBlockages.0,
|
|
|
|
EncBlockages1: &EncBlockages.1,
|
2021-05-01 22:25:32 -04:00
|
|
|
CG0: &CG0,
|
|
|
|
CG1: &CG1,
|
|
|
|
CG2: &CG2,
|
|
|
|
CG3: &CG3,
|
|
|
|
CG4: &CG4,
|
|
|
|
CG5: &CG5,
|
|
|
|
CG6: &CG6,
|
|
|
|
CG7: &CG7,
|
|
|
|
CG8: &CG8,
|
|
|
|
CG0sq: &CG0sq,
|
|
|
|
CG1sq: &CG1sq,
|
|
|
|
CG2sq: &CG2sq,
|
|
|
|
CG3sq: &CG3sq,
|
|
|
|
CG4sq: &CG4sq,
|
|
|
|
CG5sq: &CG5sq,
|
|
|
|
CG6sq: &CG6sq,
|
|
|
|
CG7sq: &CG7sq,
|
|
|
|
CG8sq: &CG8sq,
|
2021-05-03 14:59:55 -04:00
|
|
|
CH0: &CH0,
|
|
|
|
CH1: &CH1,
|
|
|
|
CH2: &CH2,
|
|
|
|
CH0sq: &CH0sq,
|
|
|
|
CH1sq: &CH1sq,
|
|
|
|
CH2sq: &CH2sq,
|
2021-05-01 22:25:32 -04:00
|
|
|
bucket: &lox_cred.bucket,
|
|
|
|
since: &lox_cred.level_since,
|
|
|
|
invremain: &lox_cred.invites_remaining,
|
2021-05-03 14:27:11 -04:00
|
|
|
blockages: &lox_cred.blockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
zbucket: &zbucket,
|
|
|
|
zsince: &zsince,
|
|
|
|
zinvremain: &zinvremain,
|
2021-05-03 14:27:11 -04:00
|
|
|
zblockages: &zblockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
negzQ: &negzQ,
|
|
|
|
zbucket_reach: &zbucket_reach,
|
|
|
|
negzQ_reach: &negzQ_reach,
|
|
|
|
d: &d,
|
|
|
|
eid_client: &eid_client,
|
|
|
|
ebucket: &ebucket,
|
2021-05-03 14:27:11 -04:00
|
|
|
eblockages: &eblockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
id_client: &id_client,
|
|
|
|
g0: &g0,
|
|
|
|
g1: &g1,
|
|
|
|
g2: &g2,
|
|
|
|
g3: &g3,
|
|
|
|
g4: &g4,
|
|
|
|
g5: &g5,
|
|
|
|
g6: &g6,
|
|
|
|
g7: &g7,
|
|
|
|
g8: &g8,
|
|
|
|
zg0: &zg0,
|
|
|
|
zg1: &zg1,
|
|
|
|
zg2: &zg2,
|
|
|
|
zg3: &zg3,
|
|
|
|
zg4: &zg4,
|
|
|
|
zg5: &zg5,
|
|
|
|
zg6: &zg6,
|
|
|
|
zg7: &zg7,
|
|
|
|
zg8: &zg8,
|
|
|
|
wg0: &wg0,
|
|
|
|
wg1: &wg1,
|
|
|
|
wg2: &wg2,
|
|
|
|
wg3: &wg3,
|
|
|
|
wg4: &wg4,
|
|
|
|
wg5: &wg5,
|
|
|
|
wg6: &wg6,
|
|
|
|
wg7: &wg7,
|
|
|
|
wg8: &wg8,
|
|
|
|
yg0: &yg0,
|
|
|
|
yg1: &yg1,
|
|
|
|
yg2: &yg2,
|
|
|
|
yg3: &yg3,
|
|
|
|
yg4: &yg4,
|
|
|
|
yg5: &yg5,
|
|
|
|
yg6: &yg6,
|
|
|
|
yg7: &yg7,
|
|
|
|
yg8: &yg8,
|
2021-05-03 14:59:55 -04:00
|
|
|
h0: &h0,
|
|
|
|
h1: &h1,
|
|
|
|
h2: &h2,
|
|
|
|
zh0: &zh0,
|
|
|
|
zh1: &zh1,
|
|
|
|
zh2: &zh2,
|
|
|
|
wh0: &wh0,
|
|
|
|
wh1: &wh1,
|
|
|
|
wh2: &wh2,
|
|
|
|
yh0: &yh0,
|
|
|
|
yh1: &yh1,
|
|
|
|
yh2: &yh2,
|
2021-05-01 22:25:32 -04:00
|
|
|
},
|
|
|
|
)
|
|
|
|
.0;
|
|
|
|
|
|
|
|
Ok((
|
|
|
|
Request {
|
|
|
|
P,
|
|
|
|
id: lox_cred.id,
|
|
|
|
CBucket,
|
|
|
|
level: lox_cred.trust_level,
|
|
|
|
CSince,
|
|
|
|
CInvRemain,
|
2021-05-03 14:27:11 -04:00
|
|
|
CBlockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
CQ,
|
|
|
|
P_reach,
|
|
|
|
CBucket_reach,
|
|
|
|
CQ_reach,
|
|
|
|
D,
|
|
|
|
EncIdClient,
|
|
|
|
EncBucket,
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
CG1,
|
|
|
|
CG2,
|
|
|
|
CG3,
|
|
|
|
CG4,
|
|
|
|
CG5,
|
|
|
|
CG6,
|
|
|
|
CG7,
|
|
|
|
CG8,
|
|
|
|
CG0sq,
|
|
|
|
CG1sq,
|
|
|
|
CG2sq,
|
|
|
|
CG3sq,
|
|
|
|
CG4sq,
|
|
|
|
CG5sq,
|
|
|
|
CG6sq,
|
|
|
|
CG7sq,
|
|
|
|
CG8sq,
|
2021-05-03 14:59:55 -04:00
|
|
|
CH1,
|
|
|
|
CH2,
|
|
|
|
CH0sq,
|
|
|
|
CH1sq,
|
|
|
|
CH2sq,
|
2021-05-01 22:25:32 -04:00
|
|
|
piUser,
|
|
|
|
},
|
|
|
|
State {
|
|
|
|
d,
|
|
|
|
D,
|
|
|
|
EncIdClient,
|
|
|
|
EncBucket,
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
id_client,
|
|
|
|
bucket: lox_cred.bucket,
|
2021-05-02 21:44:33 -04:00
|
|
|
level: new_level.into(),
|
2021-05-02 18:10:59 -04:00
|
|
|
invremain: newinvites,
|
2021-05-03 14:27:11 -04:00
|
|
|
blockages: lox_cred.blockages,
|
2021-05-01 22:25:32 -04:00
|
|
|
},
|
|
|
|
))
|
|
|
|
}
|
2021-05-02 21:44:33 -04:00
|
|
|
|
|
|
|
impl BridgeAuth {
|
|
|
|
/// Receive a level up request
|
|
|
|
pub fn handle_level_up(&mut self, req: Request) -> Result<Response, ProofError> {
|
|
|
|
let A: &RistrettoPoint = &CMZ_A;
|
|
|
|
let B: &RistrettoPoint = &CMZ_B;
|
|
|
|
let Atable: &RistrettoBasepointTable = &CMZ_A_TABLE;
|
|
|
|
let Btable: &RistrettoBasepointTable = &CMZ_B_TABLE;
|
|
|
|
|
2021-05-04 12:02:43 -04:00
|
|
|
if req.P.is_identity() || req.P_reach.is_identity() {
|
2021-05-02 21:44:33 -04:00
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
|
|
|
|
let today: Scalar = self.today().into();
|
|
|
|
|
|
|
|
// Get the level and ensure it's at most MAX_LEVEL
|
|
|
|
let level: usize = match scalar_u32(&req.level) {
|
|
|
|
Some(l) if l as usize <= MAX_LEVEL => l as usize,
|
|
|
|
_ => return Err(ProofError::VerificationFailure),
|
|
|
|
};
|
|
|
|
|
|
|
|
// Recompute the "error factors" using knowledge of our own
|
|
|
|
// (the issuer's) private key instead of knowledge of the
|
|
|
|
// hidden attributes
|
|
|
|
let Vprime =
|
|
|
|
(self.lox_priv.x[0] + self.lox_priv.x[1] * req.id + self.lox_priv.x[3] * req.level)
|
|
|
|
* req.P
|
|
|
|
+ self.lox_priv.x[2] * req.CBucket
|
|
|
|
+ self.lox_priv.x[4] * req.CSince
|
|
|
|
+ self.lox_priv.x[5] * req.CInvRemain
|
2021-05-03 14:27:11 -04:00
|
|
|
+ self.lox_priv.x[6] * req.CBlockages
|
2021-05-02 21:44:33 -04:00
|
|
|
- req.CQ;
|
|
|
|
|
|
|
|
let Vprime_reach = (self.reachability_priv.x[0] + self.reachability_priv.x[1] * today)
|
|
|
|
* req.P_reach
|
|
|
|
+ self.reachability_priv.x[2] * req.CBucket_reach
|
|
|
|
- req.CQ_reach;
|
|
|
|
|
|
|
|
// Recompute CG0 using Horner's method
|
2021-05-04 17:48:15 -04:00
|
|
|
let interval: Scalar = LEVEL_INTERVAL[level].into();
|
|
|
|
let CG0prime = (today - interval) * req.P
|
2021-05-02 21:44:33 -04:00
|
|
|
- req.CSince
|
|
|
|
- pt_dbl(
|
|
|
|
&(pt_dbl(
|
|
|
|
&(pt_dbl(
|
|
|
|
&(pt_dbl(
|
|
|
|
&(pt_dbl(
|
|
|
|
&(pt_dbl(&(pt_dbl(&(pt_dbl(&req.CG8) + req.CG7)) + req.CG6))
|
|
|
|
+ req.CG5),
|
|
|
|
) + req.CG4),
|
|
|
|
) + req.CG3),
|
|
|
|
) + req.CG2),
|
|
|
|
) + req.CG1),
|
|
|
|
);
|
|
|
|
|
2021-05-03 14:59:55 -04:00
|
|
|
// Recompute CH0 using Horner's method
|
|
|
|
let mblk: Scalar = MAX_BLOCKAGES[level].into();
|
|
|
|
let CH0prime = mblk * req.P - req.CBlockages - pt_dbl(&(pt_dbl(&req.CH2) + req.CH1));
|
|
|
|
|
2021-05-02 21:44:33 -04:00
|
|
|
// Verify the ZKP
|
|
|
|
let mut transcript = Transcript::new(b"level upgrade request");
|
|
|
|
requestproof::verify_compact(
|
|
|
|
&req.piUser,
|
|
|
|
&mut transcript,
|
|
|
|
requestproof::VerifyAssignments {
|
|
|
|
A: &A.compress(),
|
|
|
|
B: &B.compress(),
|
|
|
|
P: &req.P.compress(),
|
|
|
|
CBucket: &req.CBucket.compress(),
|
|
|
|
CSince: &req.CSince.compress(),
|
|
|
|
CInvRemain: &req.CInvRemain.compress(),
|
2021-05-03 14:27:11 -04:00
|
|
|
CBlockages: &req.CBlockages.compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
V: &Vprime.compress(),
|
|
|
|
Xbucket: &self.lox_pub.X[2].compress(),
|
|
|
|
Xsince: &self.lox_pub.X[4].compress(),
|
|
|
|
Xinvremain: &self.lox_pub.X[5].compress(),
|
2021-05-03 14:27:11 -04:00
|
|
|
Xblockages: &self.lox_pub.X[6].compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
P_reach: &req.P_reach.compress(),
|
|
|
|
CBucket_reach: &req.CBucket_reach.compress(),
|
|
|
|
V_reach: &Vprime_reach.compress(),
|
|
|
|
Xbucket_reach: &self.reachability_pub.X[2].compress(),
|
|
|
|
D: &req.D.compress(),
|
|
|
|
EncIdClient0: &req.EncIdClient.0.compress(),
|
|
|
|
EncIdClient1: &req.EncIdClient.1.compress(),
|
|
|
|
EncBucket0: &req.EncBucket.0.compress(),
|
|
|
|
EncBucket1: &req.EncBucket.1.compress(),
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages0: &req.EncBlockages.0.compress(),
|
|
|
|
EncBlockages1: &req.EncBlockages.1.compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
CG0: &CG0prime.compress(),
|
|
|
|
CG1: &req.CG1.compress(),
|
|
|
|
CG2: &req.CG2.compress(),
|
|
|
|
CG3: &req.CG3.compress(),
|
|
|
|
CG4: &req.CG4.compress(),
|
|
|
|
CG5: &req.CG5.compress(),
|
|
|
|
CG6: &req.CG6.compress(),
|
|
|
|
CG7: &req.CG7.compress(),
|
|
|
|
CG8: &req.CG8.compress(),
|
|
|
|
CG0sq: &req.CG0sq.compress(),
|
|
|
|
CG1sq: &req.CG1sq.compress(),
|
|
|
|
CG2sq: &req.CG2sq.compress(),
|
|
|
|
CG3sq: &req.CG3sq.compress(),
|
|
|
|
CG4sq: &req.CG4sq.compress(),
|
|
|
|
CG5sq: &req.CG5sq.compress(),
|
|
|
|
CG6sq: &req.CG6sq.compress(),
|
|
|
|
CG7sq: &req.CG7sq.compress(),
|
|
|
|
CG8sq: &req.CG8sq.compress(),
|
2021-05-03 14:59:55 -04:00
|
|
|
CH0: &CH0prime.compress(),
|
|
|
|
CH1: &req.CH1.compress(),
|
|
|
|
CH2: &req.CH2.compress(),
|
|
|
|
CH0sq: &req.CH0sq.compress(),
|
|
|
|
CH1sq: &req.CH1sq.compress(),
|
|
|
|
CH2sq: &req.CH2sq.compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
},
|
|
|
|
)?;
|
|
|
|
|
|
|
|
// Ensure the id has not been seen before, and add it to the
|
|
|
|
// seen list.
|
|
|
|
if self.id_filter.filter(&req.id) == SeenType::Seen {
|
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Blind issuing of the new Lox credential
|
|
|
|
|
|
|
|
// Choose a random server id component to add to the client's
|
|
|
|
// (blinded) id component
|
|
|
|
let mut rng = rand::thread_rng();
|
|
|
|
let id_server = Scalar::random(&mut rng);
|
|
|
|
let EncId = (req.EncIdClient.0, req.EncIdClient.1 + &id_server * Btable);
|
|
|
|
|
|
|
|
// Create the trust_level attrubute (Scalar), which will be
|
|
|
|
// one more than the current level, unless the current level is
|
|
|
|
// MAX_LEVEL, in which case it stays the same
|
|
|
|
let new_level = if level < MAX_LEVEL { level + 1 } else { level };
|
|
|
|
let trust_level: Scalar = (new_level as u64).into();
|
|
|
|
|
|
|
|
// Create the level_since attribute (Scalar), which is today's
|
|
|
|
// Julian date
|
|
|
|
let level_since: Scalar = self.today().into();
|
|
|
|
|
|
|
|
// Create the invitations_remaining attribute (Scalar), which is
|
|
|
|
// the number of invitations at the new level
|
2021-05-03 19:05:42 -04:00
|
|
|
let invitations_remaining: Scalar = LEVEL_INVITATIONS[level].into();
|
2021-05-02 21:44:33 -04:00
|
|
|
|
|
|
|
// Compute the MAC on the visible attributes
|
|
|
|
let b = Scalar::random(&mut rng);
|
|
|
|
let P = &b * Btable;
|
|
|
|
let QHc = (self.lox_priv.x[0]
|
|
|
|
+ self.lox_priv.x[3] * trust_level
|
|
|
|
+ self.lox_priv.x[4] * level_since
|
|
|
|
+ self.lox_priv.x[5] * invitations_remaining)
|
|
|
|
* P;
|
|
|
|
|
|
|
|
// El Gamal encrypt it to the public key req.D
|
|
|
|
let s = Scalar::random(&mut rng);
|
|
|
|
let EncQHc = (&s * Btable, QHc + s * req.D);
|
|
|
|
|
|
|
|
// Homomorphically compute the part of the MAC corresponding to
|
|
|
|
// the blinded attributes
|
|
|
|
let tid = self.lox_priv.x[1] * b;
|
|
|
|
let TId = &tid * Atable;
|
|
|
|
let EncQId = (tid * EncId.0, tid * EncId.1);
|
|
|
|
let tbucket = self.lox_priv.x[2] * b;
|
|
|
|
let TBucket = &tbucket * Atable;
|
|
|
|
let EncQBucket = (tbucket * req.EncBucket.0, tbucket * req.EncBucket.1);
|
2021-05-03 14:27:11 -04:00
|
|
|
let tblockages = self.lox_priv.x[6] * b;
|
|
|
|
let TBlockages = &tblockages * Atable;
|
|
|
|
let EncQBlockages = (
|
|
|
|
tblockages * req.EncBlockages.0,
|
|
|
|
tblockages * req.EncBlockages.1,
|
2021-05-02 21:44:33 -04:00
|
|
|
);
|
|
|
|
|
|
|
|
let EncQ = (
|
2021-05-03 14:27:11 -04:00
|
|
|
EncQHc.0 + EncQId.0 + EncQBucket.0 + EncQBlockages.0,
|
|
|
|
EncQHc.1 + EncQId.1 + EncQBucket.1 + EncQBlockages.1,
|
2021-05-02 21:44:33 -04:00
|
|
|
);
|
|
|
|
|
|
|
|
let mut transcript = Transcript::new(b"level upgrade issuing");
|
|
|
|
let piBlindIssue = blindissue::prove_compact(
|
|
|
|
&mut transcript,
|
|
|
|
blindissue::ProveAssignments {
|
2022-10-18 00:51:17 -04:00
|
|
|
A,
|
|
|
|
B,
|
2021-05-02 21:44:33 -04:00
|
|
|
P: &P,
|
|
|
|
EncQ0: &EncQ.0,
|
|
|
|
EncQ1: &EncQ.1,
|
|
|
|
X0: &self.lox_pub.X[0],
|
|
|
|
Xid: &self.lox_pub.X[1],
|
|
|
|
Xbucket: &self.lox_pub.X[2],
|
|
|
|
Xlevel: &self.lox_pub.X[3],
|
|
|
|
Xsince: &self.lox_pub.X[4],
|
|
|
|
Xinvremain: &self.lox_pub.X[5],
|
2021-05-03 14:27:11 -04:00
|
|
|
Xblockages: &self.lox_pub.X[6],
|
2021-05-02 21:44:33 -04:00
|
|
|
Plevel: &(trust_level * P),
|
|
|
|
Psince: &(level_since * P),
|
|
|
|
Pinvremain: &(invitations_remaining * P),
|
|
|
|
TId: &TId,
|
|
|
|
TBucket: &TBucket,
|
2021-05-03 14:27:11 -04:00
|
|
|
TBlockages: &TBlockages,
|
2021-05-02 21:44:33 -04:00
|
|
|
D: &req.D,
|
|
|
|
EncId0: &EncId.0,
|
|
|
|
EncId1: &EncId.1,
|
|
|
|
EncBucket0: &req.EncBucket.0,
|
|
|
|
EncBucket1: &req.EncBucket.1,
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages0: &req.EncBlockages.0,
|
|
|
|
EncBlockages1: &req.EncBlockages.1,
|
2021-05-02 21:44:33 -04:00
|
|
|
x0: &self.lox_priv.x[0],
|
|
|
|
x0tilde: &self.lox_priv.x0tilde,
|
|
|
|
xid: &self.lox_priv.x[1],
|
|
|
|
xbucket: &self.lox_priv.x[2],
|
|
|
|
xlevel: &self.lox_priv.x[3],
|
|
|
|
xsince: &self.lox_priv.x[4],
|
|
|
|
xinvremain: &self.lox_priv.x[5],
|
2021-05-03 14:27:11 -04:00
|
|
|
xblockages: &self.lox_priv.x[6],
|
2021-05-02 21:44:33 -04:00
|
|
|
s: &s,
|
|
|
|
b: &b,
|
|
|
|
tid: &tid,
|
|
|
|
tbucket: &tbucket,
|
2021-05-03 14:27:11 -04:00
|
|
|
tblockages: &tblockages,
|
2021-05-02 21:44:33 -04:00
|
|
|
},
|
|
|
|
)
|
|
|
|
.0;
|
|
|
|
|
|
|
|
Ok(Response {
|
|
|
|
P,
|
|
|
|
EncQ,
|
|
|
|
id_server,
|
|
|
|
level_since,
|
|
|
|
TId,
|
|
|
|
TBucket,
|
2021-05-03 14:27:11 -04:00
|
|
|
TBlockages,
|
2021-05-02 21:44:33 -04:00
|
|
|
piBlindIssue,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Handle the response to the request, producing the new Lox credential
|
|
|
|
/// if successful.
|
|
|
|
pub fn handle_response(
|
|
|
|
state: State,
|
|
|
|
resp: Response,
|
|
|
|
lox_pub: &IssuerPubKey,
|
|
|
|
) -> Result<cred::Lox, ProofError> {
|
|
|
|
let A: &RistrettoPoint = &CMZ_A;
|
|
|
|
let B: &RistrettoPoint = &CMZ_B;
|
|
|
|
let Btable: &RistrettoBasepointTable = &CMZ_B_TABLE;
|
|
|
|
|
2021-05-03 14:13:13 -04:00
|
|
|
if resp.P.is_identity() {
|
2021-05-02 21:44:33 -04:00
|
|
|
return Err(ProofError::VerificationFailure);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Add the server's contribution to the id to our own, both in plain
|
|
|
|
// and encrypted form
|
|
|
|
let id = state.id_client + resp.id_server;
|
|
|
|
let EncId = (
|
|
|
|
state.EncIdClient.0,
|
|
|
|
state.EncIdClient.1 + &resp.id_server * Btable,
|
|
|
|
);
|
|
|
|
|
|
|
|
// Verify the proof
|
|
|
|
let mut transcript = Transcript::new(b"level upgrade issuing");
|
|
|
|
blindissue::verify_compact(
|
|
|
|
&resp.piBlindIssue,
|
|
|
|
&mut transcript,
|
|
|
|
blindissue::VerifyAssignments {
|
|
|
|
A: &A.compress(),
|
|
|
|
B: &B.compress(),
|
|
|
|
P: &resp.P.compress(),
|
|
|
|
EncQ0: &resp.EncQ.0.compress(),
|
|
|
|
EncQ1: &resp.EncQ.1.compress(),
|
|
|
|
X0: &lox_pub.X[0].compress(),
|
|
|
|
Xid: &lox_pub.X[1].compress(),
|
|
|
|
Xbucket: &lox_pub.X[2].compress(),
|
|
|
|
Xlevel: &lox_pub.X[3].compress(),
|
|
|
|
Xsince: &lox_pub.X[4].compress(),
|
|
|
|
Xinvremain: &lox_pub.X[5].compress(),
|
2021-05-03 14:27:11 -04:00
|
|
|
Xblockages: &lox_pub.X[6].compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
Plevel: &(state.level * resp.P).compress(),
|
|
|
|
Psince: &(resp.level_since * resp.P).compress(),
|
|
|
|
Pinvremain: &(state.invremain * resp.P).compress(),
|
|
|
|
TId: &resp.TId.compress(),
|
|
|
|
TBucket: &resp.TBucket.compress(),
|
2021-05-03 14:27:11 -04:00
|
|
|
TBlockages: &resp.TBlockages.compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
D: &state.D.compress(),
|
|
|
|
EncId0: &EncId.0.compress(),
|
|
|
|
EncId1: &EncId.1.compress(),
|
|
|
|
EncBucket0: &state.EncBucket.0.compress(),
|
|
|
|
EncBucket1: &state.EncBucket.1.compress(),
|
2021-05-03 14:27:11 -04:00
|
|
|
EncBlockages0: &state.EncBlockages.0.compress(),
|
|
|
|
EncBlockages1: &state.EncBlockages.1.compress(),
|
2021-05-02 21:44:33 -04:00
|
|
|
},
|
|
|
|
)?;
|
|
|
|
|
|
|
|
// Decrypt EncQ
|
|
|
|
let Q = resp.EncQ.1 - (state.d * resp.EncQ.0);
|
|
|
|
|
|
|
|
Ok(cred::Lox {
|
|
|
|
P: resp.P,
|
|
|
|
Q,
|
|
|
|
id,
|
|
|
|
bucket: state.bucket,
|
|
|
|
trust_level: state.level,
|
|
|
|
level_since: resp.level_since,
|
|
|
|
invites_remaining: state.invremain,
|
2021-05-03 14:27:11 -04:00
|
|
|
blockages: state.blockages,
|
2021-05-02 21:44:33 -04:00
|
|
|
})
|
|
|
|
}
|