Added balance check to MLSAG/CLSAG performance tests

pull/320/head
Sarang Noether 4 years ago committed by moneromooo-monero
parent f964a92c57
commit aff87b5f6a

@ -215,18 +215,20 @@ int main(int argc, char** argv)
TEST_PERFORMANCE1(filter, p, test_cn_fast_hash, 32); TEST_PERFORMANCE1(filter, p, test_cn_fast_hash, 32);
TEST_PERFORMANCE1(filter, p, test_cn_fast_hash, 16384); TEST_PERFORMANCE1(filter, p, test_cn_fast_hash, 16384);
TEST_PERFORMANCE2(filter, p, test_sig_mlsag, 8, 1); // MLSAG verification TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 4, 2, 2); // MLSAG verification
TEST_PERFORMANCE2(filter, p, test_sig_mlsag, 16, 1); TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 8, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_mlsag, 32, 1); TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 16, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_mlsag, 64, 1); TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 32, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_mlsag, 128, 1); TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 64, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_mlsag, 256, 1); TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 128, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_clsag, 8, 1); // CLSAG verification TEST_PERFORMANCE3(filter, p, test_sig_mlsag, 256, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_clsag, 16, 1); TEST_PERFORMANCE3(filter, p, test_sig_clsag, 4, 2, 2); // CLSAG verification
TEST_PERFORMANCE2(filter, p, test_sig_clsag, 32, 1); TEST_PERFORMANCE3(filter, p, test_sig_clsag, 8, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_clsag, 64, 1); TEST_PERFORMANCE3(filter, p, test_sig_clsag, 16, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_clsag, 128, 1); TEST_PERFORMANCE3(filter, p, test_sig_clsag, 32, 2, 2);
TEST_PERFORMANCE2(filter, p, test_sig_clsag, 256, 1); TEST_PERFORMANCE3(filter, p, test_sig_clsag, 64, 2, 2);
TEST_PERFORMANCE3(filter, p, test_sig_clsag, 128, 2, 2);
TEST_PERFORMANCE3(filter, p, test_sig_clsag, 256, 2, 2);
TEST_PERFORMANCE2(filter, p, test_ringct_mlsag, 11, false); TEST_PERFORMANCE2(filter, p, test_ringct_mlsag, 11, false);
TEST_PERFORMANCE2(filter, p, test_ringct_mlsag, 11, true); TEST_PERFORMANCE2(filter, p, test_ringct_mlsag, 11, true);

@ -1,4 +1,4 @@
// Copyright (c) 2014-2019, The Monero Project // Copyright (c) 2014-2020, The Monero Project
// //
// All rights reserved. // All rights reserved.
// //
@ -31,74 +31,142 @@
#pragma once #pragma once
#include "ringct/rctSigs.h" #include "ringct/rctSigs.h"
#include "cryptonote_basic/cryptonote_basic.h" #include "ringct/rctTypes.h"
#include "device/device.hpp" #include "device/device.hpp"
#include "single_tx_test_base.h"
using namespace rct; using namespace rct;
template<size_t ring_size, size_t index> template<size_t a_N, size_t a_T, size_t a_w>
class test_sig_clsag : public single_tx_test_base class test_sig_clsag
{ {
public: public:
static const size_t N = ring_size; static const size_t loop_count = 1000;
static const size_t loop_count = 1000; static const size_t N = a_N;
static const size_t l = index; static const size_t T = a_T;
static const size_t w = a_w;
bool init()
{ bool init()
if (!single_tx_test_base::init()) {
return false; pubs.reserve(N);
pubs.resize(N);
message = skGen();
r = keyV(w); // M[l[u]] = Com(0,r[u])
// Random signing/commitment keys
pubs.reserve(N); a = keyV(w); // P[l[u]] = Com(a[u],s[u])
for (size_t i = 0; i < N; i++) s = keyV(w);
{
key sk; Q = keyV(T); // Q[j] = Com(b[j],t[j])
ctkey tmp; b = keyV(T);
t = keyV(T);
skpkGen(sk, tmp.dest);
skpkGen(sk, tmp.mask); // Random keys
key temp;
pubs.push_back(tmp); for (size_t k = 0; k < N; k++)
} {
skpkGen(temp,pubs[k].dest);
// Signing key skpkGen(temp,pubs[k].mask);
key p; }
skpkGen(p,pubs[l].dest);
// Signing and commitment keys (assumes fixed signing indices 0,1,...,w-1 for this test)
// Commitment key // TODO: random signing indices
key t,u; C_offsets = keyV(w); // P[l[u]] - C_offsets[u] = Com(0,s[u]-s1[u])
t = skGen(); s1 = keyV(w);
u = skGen(); key a_sum = zero();
addKeys2(pubs[l].mask,t,u,H); key s1_sum = zero();
messages = keyV(w);
// Offset for (size_t u = 0; u < w; u++)
key t2; {
t2 = skGen(); skpkGen(r[u],pubs[u].dest); // M[u] = Com(0,r[u])
addKeys2(C_offset,t2,u,H);
a[u] = skGen(); // P[u] = Com(a[u],s[u])
// Final signing keys s[u] = skGen();
ctkey insk; addKeys2(pubs[u].mask,s[u],a[u],H);
insk.dest = p;
insk.mask = t; s1[u] = skGen(); // C_offsets[u] = Com(a[u],s1[u])
addKeys2(C_offsets[u],s1[u],a[u],H);
sig = proveRctCLSAGSimple(message,pubs,insk,t2,C_offset,NULL,NULL,NULL,l,hw::get_device("default"));
sc_add(a_sum.bytes,a_sum.bytes,a[u].bytes);
return true; sc_add(s1_sum.bytes,s1_sum.bytes,s1[u].bytes);
}
messages[u] = skGen();
bool test() }
{
return verRctCLSAGSimple(message,sig,pubs,C_offset); // Outputs
} key b_sum = zero();
key t_sum = zero();
private: for (size_t j = 0; j < T-1; j++)
ctkeyV pubs; {
key C_offset; b[j] = skGen(); // Q[j] = Com(b[j],t[j])
clsag sig; t[j] = skGen();
key message; addKeys2(Q[j],t[j],b[j],H);
sc_add(b_sum.bytes,b_sum.bytes,b[j].bytes);
sc_add(t_sum.bytes,t_sum.bytes,t[j].bytes);
}
// Value/mask balance for Q[T-1]
sc_sub(b[T-1].bytes,a_sum.bytes,b_sum.bytes);
sc_sub(t[T-1].bytes,s1_sum.bytes,t_sum.bytes);
addKeys2(Q[T-1],t[T-1],b[T-1],H);
// Build proofs
sigs.reserve(w);
sigs.resize(0);
ctkey sk;
for (size_t u = 0; u < w; u++)
{
sk.dest = r[u];
sk.mask = s[u];
sigs.push_back(proveRctCLSAGSimple(messages[u],pubs,sk,s1[u],C_offsets[u],NULL,NULL,NULL,u,hw::get_device("default")));
}
return true;
}
bool test()
{
for (size_t u = 0; u < w; u++)
{
if (!verRctCLSAGSimple(messages[u],sigs[u],pubs,C_offsets[u]))
{
return false;
}
}
// Check balanace
std::vector<MultiexpData> balance;
balance.reserve(w + T);
balance.resize(0);
key ZERO = zero();
key ONE = identity();
key MINUS_ONE;
sc_sub(MINUS_ONE.bytes,ZERO.bytes,ONE.bytes);
for (size_t u = 0; u < w; u++)
{
balance.push_back({ONE,C_offsets[u]});
}
for (size_t j = 0; j < T; j++)
{
balance.push_back({MINUS_ONE,Q[j]});
}
if (!(straus(balance) == ONE)) // group identity
{
return false;
}
return true;
}
private:
ctkeyV pubs;
keyV Q;
keyV r;
keyV s;
keyV s1;
keyV t;
keyV a;
keyV b;
keyV C_offsets;
keyV messages;
std::vector<clsag> sigs;
}; };

@ -1,4 +1,4 @@
// Copyright (c) 2014-2019, The Monero Project // Copyright (c) 2014-2020, The Monero Project
// //
// All rights reserved. // All rights reserved.
// //
@ -31,74 +31,142 @@
#pragma once #pragma once
#include "ringct/rctSigs.h" #include "ringct/rctSigs.h"
#include "cryptonote_basic/cryptonote_basic.h" #include "ringct/rctTypes.h"
#include "device/device.hpp" #include "device/device.hpp"
#include "single_tx_test_base.h"
using namespace rct; using namespace rct;
template<size_t ring_size, size_t index> template<size_t a_N, size_t a_T, size_t a_w>
class test_sig_mlsag : public single_tx_test_base class test_sig_mlsag
{ {
public: public:
static const size_t N = ring_size; static const size_t loop_count = 1000;
static const size_t loop_count = 1000; static const size_t N = a_N;
static const size_t l = index; static const size_t T = a_T;
static const size_t w = a_w;
bool init()
{ bool init()
if (!single_tx_test_base::init()) {
return false; pubs.reserve(N);
pubs.resize(N);
message = skGen();
r = keyV(w); // M[l[u]] = Com(0,r[u])
// Random signing/commitment keys
pubs.reserve(N); a = keyV(w); // P[l[u]] = Com(a[u],s[u])
for (size_t i = 0; i < N; i++) s = keyV(w);
{
key sk; Q = keyV(T); // Q[j] = Com(b[j],t[j])
ctkey tmp; b = keyV(T);
t = keyV(T);
skpkGen(sk, tmp.dest);
skpkGen(sk, tmp.mask); // Random keys
key temp;
pubs.push_back(tmp); for (size_t k = 0; k < N; k++)
} {
skpkGen(temp,pubs[k].dest);
// Signing key skpkGen(temp,pubs[k].mask);
key p; }
skpkGen(p,pubs[l].dest);
// Signing and commitment keys (assumes fixed signing indices 0,1,...,w-1 for this test)
// Commitment key // TODO: random signing indices
key t,u; C_offsets = keyV(w); // P[l[u]] - C_offsets[u] = Com(0,s[u]-s1[u])
t = skGen(); s1 = keyV(w);
u = skGen(); key a_sum = zero();
addKeys2(pubs[l].mask,t,u,H); key s1_sum = zero();
messages = keyV(w);
// Offset for (size_t u = 0; u < w; u++)
key t2; {
t2 = skGen(); skpkGen(r[u],pubs[u].dest); // M[u] = Com(0,r[u])
addKeys2(C_offset,t2,u,H);
a[u] = skGen(); // P[u] = Com(a[u],s[u])
// Final signing keys s[u] = skGen();
ctkey insk; addKeys2(pubs[u].mask,s[u],a[u],H);
insk.dest = p;
insk.mask = t; s1[u] = skGen(); // C_offsets[u] = Com(a[u],s1[u])
addKeys2(C_offsets[u],s1[u],a[u],H);
sig = proveRctMGSimple(message,pubs,insk,t2,C_offset,NULL,NULL,l,hw::get_device("default"));
sc_add(a_sum.bytes,a_sum.bytes,a[u].bytes);
return true; sc_add(s1_sum.bytes,s1_sum.bytes,s1[u].bytes);
}
messages[u] = skGen();
bool test() }
{
return verRctMGSimple(message,sig,pubs,C_offset); // Outputs
} key b_sum = zero();
key t_sum = zero();
private: for (size_t j = 0; j < T-1; j++)
ctkeyV pubs; {
key C_offset; b[j] = skGen(); // Q[j] = Com(b[j],t[j])
mgSig sig; t[j] = skGen();
key message; addKeys2(Q[j],t[j],b[j],H);
sc_add(b_sum.bytes,b_sum.bytes,b[j].bytes);
sc_add(t_sum.bytes,t_sum.bytes,t[j].bytes);
}
// Value/mask balance for Q[T-1]
sc_sub(b[T-1].bytes,a_sum.bytes,b_sum.bytes);
sc_sub(t[T-1].bytes,s1_sum.bytes,t_sum.bytes);
addKeys2(Q[T-1],t[T-1],b[T-1],H);
// Build proofs
sigs.reserve(w);
sigs.resize(0);
ctkey sk;
for (size_t u = 0; u < w; u++)
{
sk.dest = r[u];
sk.mask = s[u];
sigs.push_back(proveRctMGSimple(messages[u],pubs,sk,s1[u],C_offsets[u],NULL,NULL,u,hw::get_device("default")));
}
return true;
}
bool test()
{
for (size_t u = 0; u < w; u++)
{
if (!verRctMGSimple(messages[u],sigs[u],pubs,C_offsets[u]))
{
return false;
}
}
// Check balanace
std::vector<MultiexpData> balance;
balance.reserve(w + T);
balance.resize(0);
key ZERO = zero();
key ONE = identity();
key MINUS_ONE;
sc_sub(MINUS_ONE.bytes,ZERO.bytes,ONE.bytes);
for (size_t u = 0; u < w; u++)
{
balance.push_back({ONE,C_offsets[u]});
}
for (size_t j = 0; j < T; j++)
{
balance.push_back({MINUS_ONE,Q[j]});
}
if (!(straus(balance) == ONE)) // group identity
{
return false;
}
return true;
}
private:
ctkeyV pubs;
keyV Q;
keyV r;
keyV s;
keyV s1;
keyV t;
keyV a;
keyV b;
keyV C_offsets;
keyV messages;
std::vector<mgSig> sigs;
}; };

Loading…
Cancel
Save