1
  2
  3
  4
  5
  6
  7
  8
  9
 10
 11
 12
 13
 14
 15
 16
 17
 18
 19
 20
 21
 22
 23
 24
 25
 26
 27
 28
 29
 30
 31
 32
 33
 34
 35
 36
 37
 38
 39
 40
 41
 42
 43
 44
 45
 46
 47
 48
 49
 50
 51
 52
 53
 54
 55
 56
 57
 58
 59
 60
 61
 62
 63
 64
 65
 66
 67
 68
 69
 70
 71
 72
 73
 74
 75
 76
 77
 78
 79
 80
 81
 82
 83
 84
 85
 86
 87
 88
 89
 90
 91
 92
 93
 94
 95
 96
 97
 98
 99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188

//! Parameters for the cryptographic primitives supported by the system.

use helpers::Binary;

/// Encryption (or ciphertext).
#[derive(Clone, Debug, PartialEq, Serialize, Deserialize)]
pub enum Encryption {
    /// Standard sodium encryption (Curve25519, XSalsa20, Poly1305).
    Sodium(Binary)
}

/// Encryption key (aka public key).
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum EncryptionKey {
    /// Standard sodium encryption key (Curve25519, XSalsa20, Poly1305).
    Sodium(::byte_arrays::B32)
}

/// Signature.
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum Signature {
    /// Standard sodium signature (Ed25519).
    Sodium(::byte_arrays::B64)
}

/// Signing key for signatures.
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum SigningKey {
    /// Standard sodium signature key (Ed25519).
    Sodium(::byte_arrays::B64)
}

/// Verification key for signatures.
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum VerificationKey {
    /// Standard sodium verifacation key (Ed25519).
    Sodium(::byte_arrays::B32)
}

/// Supported masking schemes and their parameters.
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum LinearMaskingScheme {

    /// No masking, i.e. secrets are shared direction to the clerks.
    None,

    /// Secure masking, using fresh randomness from the underlying operation system for each secret.
    Full {
        modulus: i64
    },

    /// Secure masking, using a small random seed to derive masks (`rand::chacha::ChaChaRng`).
    ///
    /// Compared to `LinearMaskingScheme::Full` this reduces the amount of mask data to be uploaded
    /// and downloaded by respectively participants and recipients. On the other hand, more computation
    /// has to be performed since seeds must be expanded on both participant and recipient side.
    ChaCha {
        modulus: i64,
        dimension: usize,
        seed_bitsize: usize,
    }

}

impl LinearMaskingScheme {
    /// Derived property indicating whether or not this scheme results in masks being generated or not.
    pub fn has_mask(&self) -> bool {
        match *self {
            LinearMaskingScheme::None => false,
            LinearMaskingScheme::Full {..} => true,
            LinearMaskingScheme::ChaCha {..} => true,
        }
    }
}

/// Supported secret sharing schemes and their parameters.
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum LinearSecretSharingScheme {

    /// Computionally efficient basic scheme.
    Additive {
        /// Number of shares to generate for each secret.
        share_count: usize,
        /// Modulus specifying the additive group in which to operate.
        modulus: i64,
    },

    // BasicShamir {
    //     /// Number of shares to generate for each secret.
    //     share_count: usize,
    //     /// Number of shares needed to reconstruct.
    //     privacy_threshold: usize,
    //     /// Prime number specifying the prime field in which to operate.
    //     prime_modulus: i64,
    // },

    /// Packed Shamir scheme allowing for work to be distributed across many clerks.
    PackedShamir {
        /// Dimension of secrets, i.e. number of components in vector.
        secret_count: usize,
        /// Number of shares to generate for each vector of secrets.
        share_count: usize,
        /// Number of shares needed to reconstruct.
        privacy_threshold: usize,
        /// Prime number specifying the prime field in which to operate.
        prime_modulus: i64,
        /// TODO
        omega_secrets: i64,
        /// TODO
        omega_shares: i64,
    },

}

/// Derived properties of the secret sharing schemes.
impl LinearSecretSharingScheme {

    /// Number of secrets shared together.
    pub fn input_size(&self) -> usize {
        match *self {
            LinearSecretSharingScheme::Additive {..} => 1,
            // LinearSecretSharingScheme::BasicShamir {..} => 1,
            LinearSecretSharingScheme::PackedShamir { secret_count, .. } => secret_count,
        }
    }

    /// Number of shares output by the scheme, which must match the number of clerks in the aggregation's committee.
    pub fn output_size(&self) -> usize {
        match *self {
            LinearSecretSharingScheme::Additive { share_count, .. } => share_count,
            // LinearSecretSharingScheme::BasicShamir { share_count, .. } => share_count,
            LinearSecretSharingScheme::PackedShamir { share_count, .. } => share_count,
        }
    }

    /// Upper bound for the number of clerks that must collaborate with the server before privacy is leaked.
    pub fn privacy_threshold(&self) -> usize {
        match *self {
            LinearSecretSharingScheme::Additive { share_count, .. } => share_count - 1,
            // LinearSecretSharingScheme::BasicShamir { privacy_threshold, .. } => privacy_threshold,
            LinearSecretSharingScheme::PackedShamir { privacy_threshold, .. } => privacy_threshold,
        }
    }

    /// Lower bound for the number of clerks needed to correctly reconstruct.
    pub fn reconstruction_threshold(&self) -> usize {
        match *self {
            LinearSecretSharingScheme::Additive { share_count, .. } => share_count,
            // LinearSecretSharingScheme::BasicShamir { privacy_threshold, .. } => privacy_threshold + 1,
            LinearSecretSharingScheme::PackedShamir { privacy_threshold, secret_count, .. } => privacy_threshold + secret_count,
        }
    }

}

/// Supported additive encryption schemes and their parameters.
#[derive(Clone, Debug, Eq, PartialEq, Serialize, Deserialize)]
pub enum AdditiveEncryptionScheme {

    /// Standard sodium encryption (Curve25519, XSalsa20, Poly1305).
    Sodium,

    // PackedPaillier {
    //     /// Number of components in a plaintext/ciphertext.
    //     component_count: usize,
    //     /// Number of bits allocated to each component in a ciphertext.
    //     component_bitsize: usize,
    //     /// Maximum number of bits each component value may occupy in a fresh ciphertext, i.e.
    //     /// in a fresh ciphertext each value must be strictly upper bounded by 2^value_max_bitsize.
    //     max_value_bitsize: usize,
    //     /// Minimum size of the (plaintext) modulus in bits.
    //     min_modulus_bitsize: usize,
    // }

}

/// Derived properties of the additive encryption schemes.
impl AdditiveEncryptionScheme {

    pub fn batch_size(&self) -> usize {
        match self {
            &AdditiveEncryptionScheme::Sodium {..} => 1,
            // &AdditiveEncryptionScheme::PackedPaillier { component_count, .. } => component_count
        }
    }

}