-
Notifications
You must be signed in to change notification settings - Fork 6
/
zkp_operation_group_commitment_range.h
74 lines (64 loc) · 3.34 KB
/
zkp_operation_group_commitment_range.h
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
/**
*
* Name:
* zkp_oper_group_commit_range
*
* Description:
* Paillier Homomorphic Operation against Paillier Ciphertext with Plaintext in Range Zero Knoeledge Proof.
*
* Usage:
* Constructor and destructor for zkp_<...>_t don't set any values and handles only proof fields.
* When using <...>_prove, all public and secret fields of zkp_<...>_t needs to be already populated (externally).
* Calling <...>_prove sets only the proof fields.
* When using <...>_verify, all public and proof fields of zkp_<...>_t need to be already populated.
* Calling <...>_verify return 0/1 (fail/pass).
*
*/
#ifndef __CMP20_ECDSA_MPC_ZKP_OPERATION_VS_GROUP_H__
#define __CMP20_ECDSA_MPC_ZKP_OPERATION_VS_GROUP_H__
#include "zkp_common.h"
typedef struct
{
uint64_t x_range_bytes;
uint64_t y_range_bytes;
ring_pedersen_public_t *rped_pub;
paillier_public_key_t *paillier_pub_0; // Encrypted public C
paillier_public_key_t *paillier_pub_1; // Encrypted secret y
ec_group_t G;
gr_elem_t g; // GROUP_ELEMENT_BYTES
scalar_t C; // PAILLIER_MODULUS_BYTES * 2
scalar_t D; // PAILLIER_MODULUS_BYTES * 2
scalar_t Y; // PAILLIER_MODULUS_BYTES * 2
gr_elem_t X; // GROUP_ELEMENT_BYTES
} zkp_oper_group_commit_range_public_t;
typedef struct
{
scalar_t x; // x_range_bytes
scalar_t y; // y_range_bytes
scalar_t rho; // PAILLIER_MODULUS_BYTES
scalar_t rho_y; // PAILLIER_MODULUS_BYTES
} zkp_oper_group_commit_range_secret_t;
typedef struct
{
scalar_t A; // PAILLIER_MODULUS_BYTES * 2
gr_elem_t B_x; // GROUP_ELEMENT_BYTES
scalar_t B_y; // PAILLIER_MODULUS_BYTES * 2
scalar_t E; // RING_PED_MODULUS_BYTES
scalar_t F; // RING_PED_MODULUS_BYTES
scalar_t S; // RING_PED_MODULUS_BYTES
scalar_t T; // RING_PED_MODULUS_BYTES
scalar_t z_1; // x_range_bytes + EPS_ZKP_SLACK_PARAMETER_BYTES
scalar_t z_2; // y_range_bytes + EPS_ZKP_SLACK_PARAMETER_BYTES
scalar_t z_3; // RING_PED_MODULUS_BYTES + x_range_bytes + EPS_ZKP_SLACK_PARAMETER_BYTES
scalar_t z_4; // RING_PED_MODULUS_BYTES + x_range_bytes + EPS_ZKP_SLACK_PARAMETER_BYTES
scalar_t w; // PAILLIER_MODULUS_BYTES
scalar_t w_y; // PAILLIER_MODULUS_BYTES
} zkp_oper_group_commit_range_proof_t;
zkp_oper_group_commit_range_proof_t *
zkp_oper_group_commit_range_new (const ec_group_t G);
void zkp_oper_group_commit_range_free (zkp_oper_group_commit_range_proof_t *proof);
void zkp_oper_group_commit_range_prove (zkp_oper_group_commit_range_proof_t *proof, const zkp_oper_group_commit_range_secret_t *secret, const zkp_oper_group_commit_range_public_t *public, const zkp_aux_info_t *aux);
int zkp_oper_group_commit_range_verify (const zkp_oper_group_commit_range_proof_t *proof, const zkp_oper_group_commit_range_public_t *public, const zkp_aux_info_t *aux);
void zkp_oper_group_commit_range_proof_to_bytes (uint8_t **bytes, uint64_t *byte_len, const zkp_oper_group_commit_range_proof_t *proof, uint64_t x_range_bytes, uint64_t y_range_bytes, const ec_group_t G, int move_to_end);
void zkp_oper_group_commit_range_proof_from_bytes (zkp_oper_group_commit_range_proof_t *proof, uint8_t **bytes, uint64_t *byte_len, uint64_t x_range_bytes, uint64_t y_range_bytes, const scalar_t N0, const scalar_t N1, const ec_group_t G, int move_to_end);
#endif