def test_hashing(self): hash_to_point('The Human Fund: Money For People') hash_to_scalar('The Human Fund: Money For People') hash_to_point(str(G)) hash_to_scalar(str(G)) hash_to_point(str(8675309)) hash_to_scalar(str(8675309)) with self.assertRaises(TypeError): hash_to_point(8675309) with self.assertRaises(TypeError): hash_to_scalar(8675309) with self.assertRaises(TypeError): hash_to_point(G) with self.assertRaises(TypeError): hash_to_scalar(G)
def receive(private_key, account): ek = dumb25519.Scalar( int( ecies.decrypt(private_key.tsk, str(account.pk) + str(account.co), account._ek))) a = dumb25519.Scalar( int( ecies.decrypt(private_key.ssk, str(account.pk) + str(account.co), account._a))) r = dumb25519.Scalar( int( ecies.decrypt(private_key.ssk, str(account.pk) + str(account.co), account._r))) public_key = stealth.gen_public_key(private_key) s = dumb25519.hash_to_scalar( str(public_key.tpk) + str(public_key.spk) + str(ek)) if G * a + H * r != account.co: raise Exception('Bad account commitment!') if public_key.X + H * s != account.pk: raise Exception('Bad account public key!') xs = private_key.x + s return WithdrawalKey(xs, a, r, T * xs.invert())
def encrypt(m,A): k = Scalar(0) while k == Scalar(0): k = random_scalar() output = Ciphertext() output.K = G*k output.M = m + hash_to_scalar(A*k) return output
def verify(proof): xG = proof.xG xH = proof.xH C_G = proof.C_G C_H = proof.C_H e0_G = proof.e0_G e0_H = proof.e0_H a0 = proof.a0 a1 = proof.a1 b0 = proof.b0 b1 = proof.b1 # generators G = dumb25519.G G1 = dumb25519.hash_to_point('G1') H = dumb448.hash_to_point('H') H1 = dumb448.hash_to_point('H1') # reconstruct hashes using commitments xG_prime = dumb25519.Z xH_prime = dumb448.Z for i in range(len(C_G)): xG_prime += dumb25519.Scalar(2)**i * C_G[i] xH_prime += dumb448.Scalar(2)**i * C_H[i] if not xG_prime == xG or not xH_prime == xH: raise ArithmeticError('Commitments do not sum to hash value!') for i in range(len(C_G)): e1_G = dumb25519.hash_to_scalar(C_G[i], C_H[i], a1[i] * G - e0_G[i] * C_G[i], b1[i] * H - e0_H[i] * C_H[i]) e1_H = dumb448.hash_to_scalar(C_G[i], C_H[i], a1[i] * G - e0_G[i] * C_G[i], b1[i] * H - e0_H[i] * C_H[i]) e0_prime_G = dumb25519.hash_to_scalar(C_G[i], C_H[i], a0[i] * G - e1_G * (C_G[i] - G1), b0[i] * H - e1_H * (C_H[i] - H1)) e0_prime_H = dumb448.hash_to_scalar(C_G[i], C_H[i], a0[i] * G - e1_G * (C_G[i] - G1), b0[i] * H - e1_H * (C_H[i] - H1)) if not e0_G[i] == e0_prime_G or not e0_H[i] == e0_prime_H: raise ArithmeticError( 'Bitwise ring signature verification failed!')
def spend(withdrawal_keys, deposit_keys, tx, mu): witness = prepare_witness(withdrawal_keys, deposit_keys) witness_list = [ witness.d_ijk, witness.x_i, witness.a_in, witness.a_ij, witness.r_in, witness.r_out ] # this is so we can flatten for commitment t = dumb25519.random_scalar() C = dumb25519.pedersen_commit(dumb25519.flatten(witness_list), t) s = dumb25519.hash_to_scalar(str(C) + str(tx) + str(mu))
def gen_account(public_key,a): r = dumb25519.random_scalar() co = G*a + H*r ek = dumb25519.random_scalar() s = dumb25519.hash_to_scalar(str(public_key.tpk)+str(public_key.spk)+str(public_key.X)+str(ek)) pk = public_key.X + H*s _ek = ecies.encrypt(public_key.tpk,str(pk)+str(co),str(ek)) _a = ecies.encrypt(public_key.spk,str(pk)+str(co),str(a)) _r = ecies.encrypt(public_key.spk,str(pk)+str(co),str(r)) return Account(pk,co,_ek,_a,_r),DepositKey(a,r)
def mash(s): global cache cache = hash_to_scalar(cache,s)
def mash(s): global cache cache = hash_to_scalar(str(cache) + str(s))
def prove(x): if not x < max_x: raise ValueError('Discrete log is too large!') if not x >= 0: raise ValueError('Discrete log must not be negative!') b = nary(x, 2) # generate blinders that sum to zero r = dumb25519.ScalarVector([]) r_sum = dumb25519.Scalar(0) s = dumb448.ScalarVector([]) s_sum = dumb448.Scalar(0) for i in range(len(b) - 1): r.append(dumb25519.random_scalar()) r_sum += dumb25519.Scalar(2)**i * r[-1] s.append(dumb448.random_scalar()) s_sum += dumb448.Scalar(2)**i * s[-1] temp_2inv_25519 = (dumb25519.Scalar(2)**(len(b) - 1)).invert() temp_2inv_448 = (dumb448.Scalar(2)**(len(b) - 1)).invert() r.append(-temp_2inv_25519 * r_sum) s.append(-temp_2inv_448 * s_sum) # sanity check on blinder sums temp_r = dumb25519.Scalar(0) temp_s = dumb448.Scalar(0) for i in range(len(b)): temp_r += dumb25519.Scalar(2)**i * r[i] temp_s += dumb448.Scalar(2)**i * s[i] if not temp_r == dumb25519.Scalar(0) or not temp_s == dumb448.Scalar(0): raise ArithmeticError('Blinder sum check failed!') # generators G = dumb25519.G G1 = dumb25519.hash_to_point('G1') H = dumb448.hash_to_point('H') H1 = dumb448.hash_to_point('H1') # commitments to bits of x C_G = dumb25519.PointVector([]) C_H = dumb448.PointVector([]) for i in range(len(b)): C_G.append(dumb25519.Scalar(b[i]) * G1 + r[i] * G) C_H.append(dumb448.Scalar(b[i]) * H1 + s[i] * H) # sanity check on commitment sums temp_C_G = dumb25519.Z temp_C_H = dumb448.Z for i in range(len(b)): temp_C_G += dumb25519.Scalar(2)**i * C_G[i] temp_C_H += dumb448.Scalar(2)**i * C_H[i] if not temp_C_G == dumb25519.Scalar( x) * G1 or not temp_C_H == dumb448.Scalar(x) * H1: raise ArithmeticError('Bit construction check failed!') # proof elements e0_G = dumb25519.ScalarVector([]) e0_H = dumb448.ScalarVector([]) a0 = dumb25519.ScalarVector([]) a1 = dumb25519.ScalarVector([]) b0 = dumb448.ScalarVector([]) b1 = dumb448.ScalarVector([]) # construct the proof for i in range(len(b)): # the current bit is 0 if b[i] == 0: j = dumb25519.random_scalar() k = dumb448.random_scalar() e1_G = dumb25519.hash_to_scalar(C_G[i], C_H[i], j * G, k * H) e1_H = dumb448.hash_to_scalar(C_G[i], C_H[i], j * G, k * H) a0.append(dumb25519.random_scalar()) b0.append(dumb448.random_scalar()) e0_G.append( dumb25519.hash_to_scalar(C_G[i], C_H[i], a0[i] * G - e1_G * (C_G[i] - G1), b0[i] * H - e1_H * (C_H[i] - H1))) e0_H.append( dumb448.hash_to_scalar(C_G[i], C_H[i], a0[i] * G - e1_G * (C_G[i] - G1), b0[i] * H - e1_H * (C_H[i] - H1))) a1.append(j + e0_G[i] * r[i]) b1.append(k + e0_H[i] * s[i]) # the current bit is 1 elif b[i] == 1: j = dumb25519.random_scalar() k = dumb448.random_scalar() e0_G.append(dumb25519.hash_to_scalar(C_G[i], C_H[i], j * G, k * H)) e0_H.append(dumb448.hash_to_scalar(C_G[i], C_H[i], j * G, k * H)) a1.append(dumb25519.random_scalar()) b1.append(dumb448.random_scalar()) e1_G = dumb25519.hash_to_scalar(C_G[i], C_H[i], a1[i] * G - e0_G[i] * C_G[i], b1[i] * H - e0_H[i] * C_H[i]) e1_H = dumb448.hash_to_scalar(C_G[i], C_H[i], a1[i] * G - e0_G[i] * C_G[i], b1[i] * H - e0_H[i] * C_H[i]) a0.append(j + e1_G * r[i]) b0.append(k + e1_H * s[i]) # somehow the bit is something else else: raise ArithmeticError('Bit decomposition must be 0 or 1!') return Proof( dumb25519.Scalar(x) * G1, dumb448.Scalar(x) * H1, C_G, C_H, e0_G, e0_H, a0, a1, b0, b1)
def decrypt(c,a): return c.M - hash_to_scalar(c.K*a)