From 8ac609a129fcbc1af448061c99e7fdd8a9302f92 Mon Sep 17 00:00:00 2001 From: msinkec Date: Mon, 23 Oct 2023 10:38:28 +0200 Subject: [PATCH] Add partial HE example. --- src/contracts/partialHE.ts | 23 +++++++++ tests/partialHE.test.ts | 97 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 120 insertions(+) create mode 100644 src/contracts/partialHE.ts create mode 100644 tests/partialHE.test.ts diff --git a/src/contracts/partialHE.ts b/src/contracts/partialHE.ts new file mode 100644 index 00000000..91a1695f --- /dev/null +++ b/src/contracts/partialHE.ts @@ -0,0 +1,23 @@ +import { SmartContract, assert, method, prop } from 'scrypt-ts' +import { Point, SECP256K1 } from 'scrypt-ts-lib' + +export class PartialHE extends SmartContract { + @prop(true) + c1: Point + + @prop(true) + c2: Point + + constructor(c1: Point, c2: Point) { + super(...arguments) + this.c1 = c1 + this.c2 = c2 + } + + @method() + public add(_c1: Point, _c2: Point) { + this.c1 = SECP256K1.addPoints(this.c1, _c1) + this.c2 = SECP256K1.addPoints(this.c2, _c2) + assert(true) + } +} diff --git a/tests/partialHE.test.ts b/tests/partialHE.test.ts new file mode 100644 index 00000000..b516635e --- /dev/null +++ b/tests/partialHE.test.ts @@ -0,0 +1,97 @@ +import { expect, use } from 'chai' +import { PartialHE } from '../src/contracts/partialHE' +import { getDefaultSigner } from './utils/helper' +import { MethodCallOptions, PubKey, bsv } from 'scrypt-ts' +import { Point, SECP256K1 } from 'scrypt-ts-lib' + +import chaiAsPromised from 'chai-as-promised' +use(chaiAsPromised) + +function encryptNumber(m: bigint, Q: Point): [Point, Point, bigint] { + const r = BigInt(bsv.PrivateKey.fromRandom().toBigNumber().toString()) + + const c1 = SECP256K1.mulByScalar(SECP256K1.G, r) + const c2_0 = SECP256K1.mulByScalar(Q, r) + const c2_1 = SECP256K1.mulByScalar(SECP256K1.G, m) + const c2 = SECP256K1.addPoints(c2_0, c2_1) + + return [c1, c2, r] +} + +function decrypt(c1: Point, c2: Point, k: bigint): Point { + const negc1 = SECP256K1.negatePoint(c1) + const kNegc1 = SECP256K1.mulByScalar(negc1, k) + return SECP256K1.addPoints(c2, kNegc1) +} + +describe('Test SmartContract `PartialHE`', () => { + // For mG maps mG.x to m + let lookupTable: Map + + before(() => { + PartialHE.loadArtifact() + + // Construct lookup table mG for m: [0, 10] + lookupTable = new Map() + for (let i = 0; i <= 10; i++) { + const mG = SECP256K1.mulByScalar(SECP256K1.G, BigInt(i)) + lookupTable.set(mG.x, BigInt(i)) + } + }) + + it('should pass the public method unit test successfully.', async () => { + const priv = bsv.PrivateKey.fromRandom() + const pub = new bsv.PublicKey(priv.publicKey.point, { + compressed: false, // Make sure the public key is in uncompressed form. + }) + + const k = BigInt(priv.toBigNumber().toString()) + const Q = SECP256K1.pubKey2Point(PubKey(pub.toByteString())) + + const _Q = SECP256K1.mulByScalar(SECP256K1.G, k) + + const [c1, c2] = encryptNumber(0n, Q) + + const instance = new PartialHE(c1, c2) + await instance.connect(getDefaultSigner()) + + await instance.deploy(1) + + // set current instance to be the deployed one + let currentInstance = instance + + // call the method of current instance to apply the updates on chain + for (let i = 0; i < 5; ++i) { + // create the next instance from the current + const nextInstance = currentInstance.next() + + // apply updates on the next instance off chain + const [_c1, _c2] = encryptNumber(1n, Q) + nextInstance.c1 = SECP256K1.addPoints(nextInstance.c1, _c1) + nextInstance.c2 = SECP256K1.addPoints(nextInstance.c2, _c2) + + // call the method of current instance to apply the updates on chain + const callContract = async () => + currentInstance.methods.add(_c1, _c2, { + next: { + instance: nextInstance, + balance: 1, + }, + } as MethodCallOptions) + await expect(callContract()).not.rejected + + // update the current instance reference + currentInstance = nextInstance + } + + // Decrypt and check end result. + const mG = decrypt(currentInstance.c1, currentInstance.c2, k) + const _mG = SECP256K1.mulByScalar(SECP256K1.G, 5n) + expect(mG.x === _mG.x && mG.y === _mG.y).to.be.true + + // Since decryption only gives us mG, we need to solve ECDLP to get the actual m. + // For small values of m we can utilize a lookup table. + const m = lookupTable.get(mG.x) + expect(m == 5n).to.be.true + }) +})