keys.h
1 /* Copyright (C) 2012-2020 IBM Corp.
2  * This program is Licensed under the Apache License, Version 2.0
3  * (the "License"); you may not use this file except in compliance
4  * with the License. You may obtain a copy of the License at
5  * http://www.apache.org/licenses/LICENSE-2.0
6  * Unless required by applicable law or agreed to in writing, software
7  * distributed under the License is distributed on an "AS IS" BASIS,
8  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
9  * See the License for the specific language governing permissions and
10  * limitations under the License. See accompanying LICENSE file.
11  */
12 
13 #ifndef HELIB_KEYS_H
14 #define HELIB_KEYS_H
15 
23 #include <helib/keySwitching.h>
24 
25 namespace helib {
26 
27 #define HELIB_KSS_UNKNOWN (0)
28 // unknown KS strategy
29 
30 #define HELIB_KSS_FULL (1)
31 // all KS matrices
32 
33 #define HELIB_KSS_BSGS (2)
34 // baby step/giant step strategy
35 
36 #define HELIB_KSS_MIN (3)
37 // minimal strategy (for g_i, and for g_i^{-ord_i} for bad dims)
38 
39 void writePubKeyBinary(std::ostream& str, const PubKey& pk);
40 void readPubKeyBinary(std::istream& str, PubKey& pk);
41 
46 class PubKey
47 { // The public key
48  const Context& context; // The context
49 
50 private:
54  Ctxt pubEncrKey;
55 
56  std::vector<double> skBounds;
57  // High-probability bounds on L-infty norm of secret keys
58 
59  std::vector<KeySwitch> keySwitching; // The key-switching matrices
60 
61  // The keySwitchMap structure contains pointers to key-switching matrices
62  // for re-linearizing automorphisms. The entry keySwitchMap[i][n] contains
63  // the index j such that keySwitching[j] is the first matrix one needs to
64  // use when re-linearizing s_i(X^n).
65  std::vector<std::vector<long>> keySwitchMap;
66 
67  NTL::Vec<long> KS_strategy; // NTL Vec's support I/O, which is more convenient
68 
69  // bootstrapping data
70 
71  long recryptKeyID; // index of the bootstrapping key
72  Ctxt recryptEkey; // the key itself, encrypted under key #0
73 
74 public:
76  PubKey();
77 
78  explicit PubKey(const Context& _context);
79 
81  PubKey(const PubKey& other);
82 
84  virtual ~PubKey() = default;
85 
87  virtual void clear();
88 
89  bool operator==(const PubKey& other) const;
90  bool operator!=(const PubKey& other) const;
91 
92  // Access methods
93  const Context& getContext() const;
94  long getPtxtSpace() const;
95  bool keyExists(long keyID) const;
96 
98  double getSKeyBound(long keyID = 0) const;
99 
102  const std::vector<KeySwitch>& keySWlist() const;
103 
106  const KeySwitch& getKeySWmatrix(const SKHandle& from, long toID = 0) const;
107  const KeySwitch& getKeySWmatrix(long fromSPower,
108  long fromXPower,
109  long fromID = 0,
110  long toID = 0) const;
111 
112  bool haveKeySWmatrix(const SKHandle& from, long toID = 0) const;
113 
114  bool haveKeySWmatrix(long fromSPower,
115  long fromXPower,
116  long fromID = 0,
117  long toID = 0) const;
118 
120  const KeySwitch& getAnyKeySWmatrix(const SKHandle& from) const;
121  bool haveAnyKeySWmatrix(const SKHandle& from) const;
122 
125  const KeySwitch& getNextKSWmatrix(long fromXPower, long fromID = 0) const;
126 
128 
131  bool isReachable(long k, long keyID = 0) const;
132 
135  void setKeySwitchMap(long keyId = 0); // Computes the keySwitchMap pointers
136 
139  long getKSStrategy(long dim) const;
140 
143  void setKSStrategy(long dim, int val);
144 
158  long Encrypt(Ctxt& ciphertxt,
159  const NTL::ZZX& plaintxt,
160  long ptxtSpace,
161  bool highNoise) const;
162  long Encrypt(Ctxt& ciphertxt,
163  const zzX& plaintxt,
164  long ptxtSpace,
165  bool highNoise) const;
166 
167  void CKKSencrypt(Ctxt& ciphertxt,
168  const NTL::ZZX& plaintxt,
169  double ptxtSize = 1.0,
170  double scaling = 0.0) const;
171  void CKKSencrypt(Ctxt& ciphertxt,
172  const zzX& plaintxt,
173  double ptxtSize = 1.0,
174  double scaling = 0.0) const;
175 
176  // These methods are overridden by secret-key Encrypt
177  virtual long Encrypt(Ctxt& ciphertxt,
178  const NTL::ZZX& plaintxt,
179  long ptxtSpace = 0) const;
180  virtual long Encrypt(Ctxt& ciphertxt,
181  const zzX& plaintxt,
182  long ptxtSpace = 0) const;
183 
191  template <typename Scheme>
192  long Encrypt(Ctxt& ciphertxt,
193  const Ptxt<Scheme>& plaintxt,
194  long ptxtSpace = 0) const;
195 
203  double securityLevel() const
204  {
205  if (isBootstrappable())
206  return context.securityLevel(context.rcData.skHwt); // a sparse key
207  else
208  return context.securityLevel(); // security level of a "dense" key
209  }
210 
211  bool isCKKS() const;
212  // NOTE: Is taking the alMod from the context the right thing to do?
213 
214  bool isBootstrappable() const;
215  void reCrypt(Ctxt& ctxt) const; // bootstrap a ciphertext to reduce noise
216  void thinReCrypt(Ctxt& ctxt) const; // bootstrap a "thin" ciphertext, where
217  // slots are assumed to contain constants
218 
219  friend class SecKey;
220  friend std::ostream& operator<<(std::ostream& str, const PubKey& pk);
221  friend std::istream& operator>>(std::istream& str, PubKey& pk);
222  friend void ::helib::writePubKeyBinary(std::ostream& str, const PubKey& pk);
223  friend void ::helib::readPubKeyBinary(std::istream& str, PubKey& pk);
224 
225  // defines plaintext space for the bootstrapping encrypted secret key
226  static long ePlusR(long p);
227 
228  // A hack to increase the plaintext space, you'd better
229  // know what you are doing when using it.
230  void hackPtxtSpace(long p2r) { pubEncrKey.ptxtSpace = p2r; }
231 };
232 
233 void writeSecKeyBinary(std::ostream& str, const SecKey& sk);
234 void readSecKeyBinary(std::istream& str, SecKey& sk);
235 
240 class SecKey : public PubKey
241 { // The secret key
242 public:
243  std::vector<DoubleCRT> sKeys; // The secret key(s) themselves
244 
245 public:
246  // Disable default constructor
247  SecKey() = delete;
248 
249  // Default destructor
250  ~SecKey() override = default;
251 
252  // Constructors just call the ones for the base class
253  explicit SecKey(const Context& _context);
254 
255  bool operator==(const SecKey& other) const;
256  bool operator!=(const SecKey& other) const;
257 
259  void clear() override;
260 
267  long ImportSecKey(const DoubleCRT& sKey,
268  double bound,
269  long ptxtSpace = 0,
270  long maxDegKswitch = 3);
271 
274  long GenSecKey(long hwt = 0, long ptxtSpace = 0, long maxDegKswitch = 3);
275 
282  void GenKeySWmatrix(long fromSPower,
283  long fromXPower,
284  long fromKeyIdx = 0,
285  long toKeyIdx = 0,
286  long ptxtSpace = 0);
287 
288  // Decryption
289  void Decrypt(NTL::ZZX& plaintxt, const Ctxt& ciphertxt) const;
290 
297  template <typename Scheme>
298  void Decrypt(Ptxt<Scheme>& plaintxt, const Ctxt& ciphertxt) const;
299 
302  void Decrypt(NTL::ZZX& plaintxt, const Ctxt& ciphertxt, NTL::ZZX& f) const;
303 
305  long skEncrypt(Ctxt& ctxt,
306  const NTL::ZZX& ptxt,
307  long ptxtSpace,
308  long skIdx) const;
309  long skEncrypt(Ctxt& ctxt, const zzX& ptxt, long ptxtSpace, long skIdx) const;
310 
311  // These methods override the public-key Encrypt methods
312  long Encrypt(Ctxt& ciphertxt,
313  const NTL::ZZX& plaintxt,
314  long ptxtSpace = 0) const override;
315  long Encrypt(Ctxt& ciphertxt,
316  const zzX& plaintxt,
317  long ptxtSpace = 0) const override;
318 
320  long genRecryptData();
321 
322  friend std::ostream& operator<<(std::ostream& str, const SecKey& sk);
323  friend std::istream& operator>>(std::istream& str, SecKey& sk);
324  friend void ::helib::writeSecKeyBinary(std::ostream& str, const SecKey& sk);
325  friend void ::helib::readSecKeyBinary(std::istream& str, SecKey& sk);
326 };
327 
331 double RLWE(DoubleCRT& c0,
332  DoubleCRT& c1,
333  const DoubleCRT& s,
334  long p,
335  NTL::ZZ* prgSeed = nullptr);
336 
338 double RLWE1(DoubleCRT& c0, const DoubleCRT& c1, const DoubleCRT& s, long p);
339 
340 } // namespace helib
341 
342 #endif // HELIB_KEYS_H
An object that mimics the functionality of the Ctxt object, and acts as a convenient entry point for ...
Definition: Ptxt.h:280
SecKey()=delete
bool haveKeySWmatrix(const SKHandle &from, long toID=0) const
Definition: keys.cpp:288
void reCrypt(Ctxt &ctxt) const
Definition: recryption.cpp:366
void readPubKeyBinary(std::istream &str, PubKey &pk)
Definition: keys.cpp:761
long getKSStrategy(long dim) const
get KS strategy for dimension dim dim == -1 is Frobenius
Definition: keys.cpp:317
NTL::Vec< long > zzX
Definition: zzX.h:24
bool haveAnyKeySWmatrix(const SKHandle &from) const
Definition: keys.cpp:301
double RLWE1(DoubleCRT &c0, const DoubleCRT &c1, const DoubleCRT &s, long p)
Same as RLWE, but assumes that c1 is already chosen by the caller.
Definition: keys.cpp:30
bool operator!=(const SecKey &other) const
Definition: keys.cpp:817
ThinRecryptData rcData
Bootstrapping-related data in the context.
Definition: Context.h:380
bool operator==(const SecKey &other) const
Definition: keys.cpp:802
friend std::ostream & operator<<(std::ostream &str, const SecKey &sk)
Definition: keys.cpp:1292
Implementing polynomials (elements in the ring R_Q) in double-CRT form.
Definition: DoubleCRT.h:76
friend void ::helib::writeSecKeyBinary(std::ostream &str, const SecKey &sk)
long Encrypt(Ctxt &ciphertxt, const Ptxt< Scheme > &plaintxt, long ptxtSpace=0) const
Encrypts a plaintext into a ciphertext.
friend std::istream & operator>>(std::istream &str, SecKey &sk)
Definition: keys.cpp:1301
void writePubKeyBinary(std::ostream &str, const PubKey &pk)
Definition: keys.cpp:726
bool isReachable(long k, long keyID=0) const
Is it possible to re-linearize the automorphism X -> X^k See Section 3.2.2 in the design document (Ke...
Definition: keys.cpp:312
friend void ::helib::readPubKeyBinary(std::istream &str, PubKey &pk)
long GenSecKey(long hwt=0, long ptxtSpace=0, long maxDegKswitch=3)
Definition: keys.cpp:871
long skHwt
Hamming weight of recryption secret key.
Definition: recryption.h:49
void Decrypt(Ptxt< Scheme > &plaintxt, const Ctxt &ciphertxt) const
Decrypt a ciphertext into a plaintext.
Key-switching matrices.
Definition: keySwitching.h:87
virtual void clear()
Clear all public-key data.
Definition: keys.cpp:108
void setKeySwitchMap(long keyId=0)
Compute the reachability graph of key-switching matrices See Section 3.2.2 in the design document (Ke...
Definition: keys.cpp:118
A handle, describing the secret-key element that "matches" a part, of the form s^r(X^t).
Definition: Ctxt.h:78
bool isBootstrappable() const
Definition: keys.cpp:631
friend void ::helib::writePubKeyBinary(std::ostream &str, const PubKey &pk)
static long ePlusR(long p)
void hackPtxtSpace(long p2r)
Definition: keys.h:230
void GenKeySWmatrix(long fromSPower, long fromXPower, long fromKeyIdx=0, long toKeyIdx=0, long ptxtSpace=0)
Definition: keys.cpp:888
virtual ~PubKey()=default
Default destructor.
friend std::ostream & operator<<(std::ostream &str, const PubKey &pk)
Definition: keys.cpp:633
void clear() override
Clear all secret-key data.
Definition: keys.cpp:819
~SecKey() override=default
long getPtxtSpace() const
Definition: keys.cpp:270
void writeSecKeyBinary(std::ostream &str, const SecKey &sk)
Definition: keys.cpp:1318
double securityLevel() const
An estimate for the security level. The estimated security level for the "worst" secret-key associate...
Definition: keys.h:203
const std::vector< KeySwitch > & keySWlist() const
Definition: keys.cpp:278
long genRecryptData()
Generate bootstrapping data if needed, returns index of key.
Definition: keys.cpp:1257
void thinReCrypt(Ctxt &ctxt) const
Definition: recryption.cpp:940
const KeySwitch & getAnyKeySWmatrix(const SKHandle &from) const
Is there a matrix from this key to any base key?
Definition: keys.cpp:191
The public key.
Definition: keys.h:47
void CKKSencrypt(Ctxt &ciphertxt, const NTL::ZZX &plaintxt, double ptxtSize=1.0, double scaling=0.0) const
Definition: keys.cpp:498
long Encrypt(Ctxt &ciphertxt, const NTL::ZZX &plaintxt, long ptxtSpace, bool highNoise) const
Definition: keys.cpp:354
Definition: apiAttributes.h:21
double RLWE(DoubleCRT &c0, DoubleCRT &c1, const DoubleCRT &s, long p, NTL::ZZ *prgSeed=nullptr)
Definition: keys.cpp:66
void setKSStrategy(long dim, int val)
set KS strategy for dimension dim dim == -1 is Frobenius
Definition: keys.cpp:331
The secret key.
Definition: keys.h:241
Maintaining the parameters.
Definition: Context.h:121
void Decrypt(NTL::ZZX &plaintxt, const Ctxt &ciphertxt) const
Definition: keys.cpp:985
friend void ::helib::readSecKeyBinary(std::istream &str, SecKey &sk)
const KeySwitch & getNextKSWmatrix(long fromXPower, long fromID=0) const
Get the next matrix to use for multi-hop automorphism See Section 3.2.2 in the design document.
Definition: keys.cpp:306
long skEncrypt(Ctxt &ctxt, const NTL::ZZX &ptxt, long ptxtSpace, long skIdx) const
Symmetric encryption using the secret key.
Definition: keys.cpp:1132
long Encrypt(Ctxt &ciphertxt, const NTL::ZZX &plaintxt, long ptxtSpace=0) const override
Definition: keys.cpp:1245
A Ctxt object holds a single ciphertext.
Definition: Ctxt.h:273
PubKey()
This constructor thorws run-time error if activeContext=nullptr.
Definition: keys.cpp:81
bool operator!=(const PubKey &other) const
Definition: keys.cpp:267
double getSKeyBound(long keyID=0) const
The size of the secret key.
Definition: keys.cpp:276
friend std::istream & operator>>(std::istream &str, PubKey &pk)
Definition: keys.cpp:671
const Context & getContext() const
Definition: keys.cpp:269
void readSecKeyBinary(std::istream &str, SecKey &sk)
Definition: keys.cpp:1333
std::vector< DoubleCRT > sKeys
Definition: keys.h:243
bool isCKKS() const
Definition: keys.cpp:625
const KeySwitch & getKeySWmatrix(const SKHandle &from, long toID=0) const
Find a key-switching matrix by its indexes. If no such matrix exists it returns a dummy matrix with t...
Definition: keys.cpp:170
bool keyExists(long keyID) const
Definition: keys.cpp:271
double securityLevel(int hwt=0) const
An estimate for the security-level. This has a lower bound of 0.
Definition: Context.h:495
bool operator==(const PubKey &other) const
Definition: keys.cpp:212
long ImportSecKey(const DoubleCRT &sKey, double bound, long ptxtSpace=0, long maxDegKswitch=3)
Definition: keys.cpp:831