diff --git a/AUTHORS b/AUTHORS new file mode 100644 index 0000000000000000000000000000000000000000..919667d86abd4820db8e54bcef27a3f865e9b82b --- /dev/null +++ b/AUTHORS @@ -0,0 +1,9 @@ +The PBC Go Wrapper credits + +Nik Unger <pbc (at) taintedbit : com> (Original author) + +------------------------------------------------------------------------------- + +The underlying functionality of this library is provided by the PBC library. +The PBC library was originally authored by Ben Lynn, with many additional +contributors. See https://crypto.stanford.edu/pbc/ for more details. diff --git a/COPYING b/COPYING new file mode 100644 index 0000000000000000000000000000000000000000..94a9ed024d3859793618152ea559a168bbcbb5e2 --- /dev/null +++ b/COPYING @@ -0,0 +1,674 @@ + GNU GENERAL PUBLIC LICENSE + Version 3, 29 June 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + Preamble + + The GNU General Public License is a free, copyleft license for +software and other kinds of works. + + The licenses for most software and other practical works are designed +to take away your freedom to share and change the works. By contrast, +the GNU General Public License is intended to guarantee your freedom to +share and change all versions of a program--to make sure it remains free +software for all its users. We, the Free Software Foundation, use the +GNU General Public License for most of our software; it applies also to +any other work released this way by its authors. You can apply it to +your programs, too. + + When we speak of free software, we are referring to freedom, not +price. Our General Public Licenses are designed to make sure that you +have the freedom to distribute copies of free software (and charge for +them if you wish), that you receive source code or can get it if you +want it, that you can change the software or use pieces of it in new +free programs, and that you know you can do these things. + + To protect your rights, we need to prevent others from denying you +these rights or asking you to surrender the rights. Therefore, you have +certain responsibilities if you distribute copies of the software, or if +you modify it: responsibilities to respect the freedom of others. + + For example, if you distribute copies of such a program, whether +gratis or for a fee, you must pass on to the recipients the same +freedoms that you received. You must make sure that they, too, receive +or can get the source code. And you must show them these terms so they +know their rights. + + Developers that use the GNU GPL protect your rights with two steps: +(1) assert copyright on the software, and (2) offer you this License +giving you legal permission to copy, distribute and/or modify it. + + For the developers' and authors' protection, the GPL clearly explains +that there is no warranty for this free software. For both users' and +authors' sake, the GPL requires that modified versions be marked as +changed, so that their problems will not be attributed erroneously to +authors of previous versions. + + Some devices are designed to deny users access to install or run +modified versions of the software inside them, although the manufacturer +can do so. This is fundamentally incompatible with the aim of +protecting users' freedom to change the software. The systematic +pattern of such abuse occurs in the area of products for individuals to +use, which is precisely where it is most unacceptable. Therefore, we +have designed this version of the GPL to prohibit the practice for those +products. If such problems arise substantially in other domains, we +stand ready to extend this provision to those domains in future versions +of the GPL, as needed to protect the freedom of users. + + Finally, every program is threatened constantly by software patents. +States should not allow patents to restrict development and use of +software on general-purpose computers, but in those that do, we wish to +avoid the special danger that patents applied to a free program could +make it effectively proprietary. To prevent this, the GPL assures that +patents cannot be used to render the program non-free. + + The precise terms and conditions for copying, distribution and +modification follow. + + TERMS AND CONDITIONS + + 0. Definitions. + + "This License" refers to version 3 of the GNU General Public License. + + "Copyright" also means copyright-like laws that apply to other kinds of +works, such as semiconductor masks. + + "The Program" refers to any copyrightable work licensed under this +License. Each licensee is addressed as "you". "Licensees" and +"recipients" may be individuals or organizations. + + To "modify" a work means to copy from or adapt all or part of the work +in a fashion requiring copyright permission, other than the making of an +exact copy. The resulting work is called a "modified version" of the +earlier work or a work "based on" the earlier work. + + A "covered work" means either the unmodified Program or a work based +on the Program. + + To "propagate" a work means to do anything with it that, without +permission, would make you directly or secondarily liable for +infringement under applicable copyright law, except executing it on a +computer or modifying a private copy. Propagation includes copying, +distribution (with or without modification), making available to the +public, and in some countries other activities as well. + + To "convey" a work means any kind of propagation that enables other +parties to make or receive copies. Mere interaction with a user through +a computer network, with no transfer of a copy, is not conveying. + + An interactive user interface displays "Appropriate Legal Notices" +to the extent that it includes a convenient and prominently visible +feature that (1) displays an appropriate copyright notice, and (2) +tells the user that there is no warranty for the work (except to the +extent that warranties are provided), that licensees may convey the +work under this License, and how to view a copy of this License. If +the interface presents a list of user commands or options, such as a +menu, a prominent item in the list meets this criterion. + + 1. Source Code. + + The "source code" for a work means the preferred form of the work +for making modifications to it. "Object code" means any non-source +form of a work. + + A "Standard Interface" means an interface that either is an official +standard defined by a recognized standards body, or, in the case of +interfaces specified for a particular programming language, one that +is widely used among developers working in that language. + + The "System Libraries" of an executable work include anything, other +than the work as a whole, that (a) is included in the normal form of +packaging a Major Component, but which is not part of that Major +Component, and (b) serves only to enable use of the work with that +Major Component, or to implement a Standard Interface for which an +implementation is available to the public in source code form. A +"Major Component", in this context, means a major essential component +(kernel, window system, and so on) of the specific operating system +(if any) on which the executable work runs, or a compiler used to +produce the work, or an object code interpreter used to run it. + + The "Corresponding Source" for a work in object code form means all +the source code needed to generate, install, and (for an executable +work) run the object code and to modify the work, including scripts to +control those activities. However, it does not include the work's +System Libraries, or general-purpose tools or generally available free +programs which are used unmodified in performing those activities but +which are not part of the work. For example, Corresponding Source +includes interface definition files associated with source files for +the work, and the source code for shared libraries and dynamically +linked subprograms that the work is specifically designed to require, +such as by intimate data communication or control flow between those +subprograms and other parts of the work. + + The Corresponding Source need not include anything that users +can regenerate automatically from other parts of the Corresponding +Source. + + The Corresponding Source for a work in source code form is that +same work. + + 2. Basic Permissions. + + All rights granted under this License are granted for the term of +copyright on the Program, and are irrevocable provided the stated +conditions are met. This License explicitly affirms your unlimited +permission to run the unmodified Program. The output from running a +covered work is covered by this License only if the output, given its +content, constitutes a covered work. This License acknowledges your +rights of fair use or other equivalent, as provided by copyright law. + + You may make, run and propagate covered works that you do not +convey, without conditions so long as your license otherwise remains +in force. You may convey covered works to others for the sole purpose +of having them make modifications exclusively for you, or provide you +with facilities for running those works, provided that you comply with +the terms of this License in conveying all material for which you do +not control copyright. Those thus making or running the covered works +for you must do so exclusively on your behalf, under your direction +and control, on terms that prohibit them from making any copies of +your copyrighted material outside their relationship with you. + + Conveying under any other circumstances is permitted solely under +the conditions stated below. Sublicensing is not allowed; section 10 +makes it unnecessary. + + 3. Protecting Users' Legal Rights From Anti-Circumvention Law. + + No covered work shall be deemed part of an effective technological +measure under any applicable law fulfilling obligations under article +11 of the WIPO copyright treaty adopted on 20 December 1996, or +similar laws prohibiting or restricting circumvention of such +measures. + + When you convey a covered work, you waive any legal power to forbid +circumvention of technological measures to the extent such circumvention +is effected by exercising rights under this License with respect to +the covered work, and you disclaim any intention to limit operation or +modification of the work as a means of enforcing, against the work's +users, your or third parties' legal rights to forbid circumvention of +technological measures. + + 4. Conveying Verbatim Copies. + + You may convey verbatim copies of the Program's source code as you +receive it, in any medium, provided that you conspicuously and +appropriately publish on each copy an appropriate copyright notice; +keep intact all notices stating that this License and any +non-permissive terms added in accord with section 7 apply to the code; +keep intact all notices of the absence of any warranty; and give all +recipients a copy of this License along with the Program. + + You may charge any price or no price for each copy that you convey, +and you may offer support or warranty protection for a fee. + + 5. Conveying Modified Source Versions. + + You may convey a work based on the Program, or the modifications to +produce it from the Program, in the form of source code under the +terms of section 4, provided that you also meet all of these conditions: + + a) The work must carry prominent notices stating that you modified + it, and giving a relevant date. + + b) The work must carry prominent notices stating that it is + released under this License and any conditions added under section + 7. This requirement modifies the requirement in section 4 to + "keep intact all notices". + + c) You must license the entire work, as a whole, under this + License to anyone who comes into possession of a copy. This + License will therefore apply, along with any applicable section 7 + additional terms, to the whole of the work, and all its parts, + regardless of how they are packaged. This License gives no + permission to license the work in any other way, but it does not + invalidate such permission if you have separately received it. + + d) If the work has interactive user interfaces, each must display + Appropriate Legal Notices; however, if the Program has interactive + interfaces that do not display Appropriate Legal Notices, your + work need not make them do so. + + A compilation of a covered work with other separate and independent +works, which are not by their nature extensions of the covered work, +and which are not combined with it such as to form a larger program, +in or on a volume of a storage or distribution medium, is called an +"aggregate" if the compilation and its resulting copyright are not +used to limit the access or legal rights of the compilation's users +beyond what the individual works permit. Inclusion of a covered work +in an aggregate does not cause this License to apply to the other +parts of the aggregate. + + 6. Conveying Non-Source Forms. + + You may convey a covered work in object code form under the terms +of sections 4 and 5, provided that you also convey the +machine-readable Corresponding Source under the terms of this License, +in one of these ways: + + a) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by the + Corresponding Source fixed on a durable physical medium + customarily used for software interchange. + + b) Convey the object code in, or embodied in, a physical product + (including a physical distribution medium), accompanied by a + written offer, valid for at least three years and valid for as + long as you offer spare parts or customer support for that product + model, to give anyone who possesses the object code either (1) a + copy of the Corresponding Source for all the software in the + product that is covered by this License, on a durable physical + medium customarily used for software interchange, for a price no + more than your reasonable cost of physically performing this + conveying of source, or (2) access to copy the + Corresponding Source from a network server at no charge. + + c) Convey individual copies of the object code with a copy of the + written offer to provide the Corresponding Source. This + alternative is allowed only occasionally and noncommercially, and + only if you received the object code with such an offer, in accord + with subsection 6b. + + d) Convey the object code by offering access from a designated + place (gratis or for a charge), and offer equivalent access to the + Corresponding Source in the same way through the same place at no + further charge. You need not require recipients to copy the + Corresponding Source along with the object code. If the place to + copy the object code is a network server, the Corresponding Source + may be on a different server (operated by you or a third party) + that supports equivalent copying facilities, provided you maintain + clear directions next to the object code saying where to find the + Corresponding Source. Regardless of what server hosts the + Corresponding Source, you remain obligated to ensure that it is + available for as long as needed to satisfy these requirements. + + e) Convey the object code using peer-to-peer transmission, provided + you inform other peers where the object code and Corresponding + Source of the work are being offered to the general public at no + charge under subsection 6d. + + A separable portion of the object code, whose source code is excluded +from the Corresponding Source as a System Library, need not be +included in conveying the object code work. + + A "User Product" is either (1) a "consumer product", which means any +tangible personal property which is normally used for personal, family, +or household purposes, or (2) anything designed or sold for incorporation +into a dwelling. In determining whether a product is a consumer product, +doubtful cases shall be resolved in favor of coverage. For a particular +product received by a particular user, "normally used" refers to a +typical or common use of that class of product, regardless of the status +of the particular user or of the way in which the particular user +actually uses, or expects or is expected to use, the product. A product +is a consumer product regardless of whether the product has substantial +commercial, industrial or non-consumer uses, unless such uses represent +the only significant mode of use of the product. + + "Installation Information" for a User Product means any methods, +procedures, authorization keys, or other information required to install +and execute modified versions of a covered work in that User Product from +a modified version of its Corresponding Source. The information must +suffice to ensure that the continued functioning of the modified object +code is in no case prevented or interfered with solely because +modification has been made. + + If you convey an object code work under this section in, or with, or +specifically for use in, a User Product, and the conveying occurs as +part of a transaction in which the right of possession and use of the +User Product is transferred to the recipient in perpetuity or for a +fixed term (regardless of how the transaction is characterized), the +Corresponding Source conveyed under this section must be accompanied +by the Installation Information. But this requirement does not apply +if neither you nor any third party retains the ability to install +modified object code on the User Product (for example, the work has +been installed in ROM). + + The requirement to provide Installation Information does not include a +requirement to continue to provide support service, warranty, or updates +for a work that has been modified or installed by the recipient, or for +the User Product in which it has been modified or installed. Access to a +network may be denied when the modification itself materially and +adversely affects the operation of the network or violates the rules and +protocols for communication across the network. + + Corresponding Source conveyed, and Installation Information provided, +in accord with this section must be in a format that is publicly +documented (and with an implementation available to the public in +source code form), and must require no special password or key for +unpacking, reading or copying. + + 7. Additional Terms. + + "Additional permissions" are terms that supplement the terms of this +License by making exceptions from one or more of its conditions. +Additional permissions that are applicable to the entire Program shall +be treated as though they were included in this License, to the extent +that they are valid under applicable law. If additional permissions +apply only to part of the Program, that part may be used separately +under those permissions, but the entire Program remains governed by +this License without regard to the additional permissions. + + When you convey a copy of a covered work, you may at your option +remove any additional permissions from that copy, or from any part of +it. (Additional permissions may be written to require their own +removal in certain cases when you modify the work.) You may place +additional permissions on material, added by you to a covered work, +for which you have or can give appropriate copyright permission. + + Notwithstanding any other provision of this License, for material you +add to a covered work, you may (if authorized by the copyright holders of +that material) supplement the terms of this License with terms: + + a) Disclaiming warranty or limiting liability differently from the + terms of sections 15 and 16 of this License; or + + b) Requiring preservation of specified reasonable legal notices or + author attributions in that material or in the Appropriate Legal + Notices displayed by works containing it; or + + c) Prohibiting misrepresentation of the origin of that material, or + requiring that modified versions of such material be marked in + reasonable ways as different from the original version; or + + d) Limiting the use for publicity purposes of names of licensors or + authors of the material; or + + e) Declining to grant rights under trademark law for use of some + trade names, trademarks, or service marks; or + + f) Requiring indemnification of licensors and authors of that + material by anyone who conveys the material (or modified versions of + it) with contractual assumptions of liability to the recipient, for + any liability that these contractual assumptions directly impose on + those licensors and authors. + + All other non-permissive additional terms are considered "further +restrictions" within the meaning of section 10. If the Program as you +received it, or any part of it, contains a notice stating that it is +governed by this License along with a term that is a further +restriction, you may remove that term. If a license document contains +a further restriction but permits relicensing or conveying under this +License, you may add to a covered work material governed by the terms +of that license document, provided that the further restriction does +not survive such relicensing or conveying. + + If you add terms to a covered work in accord with this section, you +must place, in the relevant source files, a statement of the +additional terms that apply to those files, or a notice indicating +where to find the applicable terms. + + Additional terms, permissive or non-permissive, may be stated in the +form of a separately written license, or stated as exceptions; +the above requirements apply either way. + + 8. Termination. + + You may not propagate or modify a covered work except as expressly +provided under this License. Any attempt otherwise to propagate or +modify it is void, and will automatically terminate your rights under +this License (including any patent licenses granted under the third +paragraph of section 11). + + However, if you cease all violation of this License, then your +license from a particular copyright holder is reinstated (a) +provisionally, unless and until the copyright holder explicitly and +finally terminates your license, and (b) permanently, if the copyright +holder fails to notify you of the violation by some reasonable means +prior to 60 days after the cessation. + + Moreover, your license from a particular copyright holder is +reinstated permanently if the copyright holder notifies you of the +violation by some reasonable means, this is the first time you have +received notice of violation of this License (for any work) from that +copyright holder, and you cure the violation prior to 30 days after +your receipt of the notice. + + Termination of your rights under this section does not terminate the +licenses of parties who have received copies or rights from you under +this License. If your rights have been terminated and not permanently +reinstated, you do not qualify to receive new licenses for the same +material under section 10. + + 9. Acceptance Not Required for Having Copies. + + You are not required to accept this License in order to receive or +run a copy of the Program. Ancillary propagation of a covered work +occurring solely as a consequence of using peer-to-peer transmission +to receive a copy likewise does not require acceptance. However, +nothing other than this License grants you permission to propagate or +modify any covered work. These actions infringe copyright if you do +not accept this License. Therefore, by modifying or propagating a +covered work, you indicate your acceptance of this License to do so. + + 10. Automatic Licensing of Downstream Recipients. + + Each time you convey a covered work, the recipient automatically +receives a license from the original licensors, to run, modify and +propagate that work, subject to this License. You are not responsible +for enforcing compliance by third parties with this License. + + An "entity transaction" is a transaction transferring control of an +organization, or substantially all assets of one, or subdividing an +organization, or merging organizations. If propagation of a covered +work results from an entity transaction, each party to that +transaction who receives a copy of the work also receives whatever +licenses to the work the party's predecessor in interest had or could +give under the previous paragraph, plus a right to possession of the +Corresponding Source of the work from the predecessor in interest, if +the predecessor has it or can get it with reasonable efforts. + + You may not impose any further restrictions on the exercise of the +rights granted or affirmed under this License. For example, you may +not impose a license fee, royalty, or other charge for exercise of +rights granted under this License, and you may not initiate litigation +(including a cross-claim or counterclaim in a lawsuit) alleging that +any patent claim is infringed by making, using, selling, offering for +sale, or importing the Program or any portion of it. + + 11. Patents. + + A "contributor" is a copyright holder who authorizes use under this +License of the Program or a work on which the Program is based. The +work thus licensed is called the contributor's "contributor version". + + A contributor's "essential patent claims" are all patent claims +owned or controlled by the contributor, whether already acquired or +hereafter acquired, that would be infringed by some manner, permitted +by this License, of making, using, or selling its contributor version, +but do not include claims that would be infringed only as a +consequence of further modification of the contributor version. For +purposes of this definition, "control" includes the right to grant +patent sublicenses in a manner consistent with the requirements of +this License. + + Each contributor grants you a non-exclusive, worldwide, royalty-free +patent license under the contributor's essential patent claims, to +make, use, sell, offer for sale, import and otherwise run, modify and +propagate the contents of its contributor version. + + In the following three paragraphs, a "patent license" is any express +agreement or commitment, however denominated, not to enforce a patent +(such as an express permission to practice a patent or covenant not to +sue for patent infringement). To "grant" such a patent license to a +party means to make such an agreement or commitment not to enforce a +patent against the party. + + If you convey a covered work, knowingly relying on a patent license, +and the Corresponding Source of the work is not available for anyone +to copy, free of charge and under the terms of this License, through a +publicly available network server or other readily accessible means, +then you must either (1) cause the Corresponding Source to be so +available, or (2) arrange to deprive yourself of the benefit of the +patent license for this particular work, or (3) arrange, in a manner +consistent with the requirements of this License, to extend the patent +license to downstream recipients. "Knowingly relying" means you have +actual knowledge that, but for the patent license, your conveying the +covered work in a country, or your recipient's use of the covered work +in a country, would infringe one or more identifiable patents in that +country that you have reason to believe are valid. + + If, pursuant to or in connection with a single transaction or +arrangement, you convey, or propagate by procuring conveyance of, a +covered work, and grant a patent license to some of the parties +receiving the covered work authorizing them to use, propagate, modify +or convey a specific copy of the covered work, then the patent license +you grant is automatically extended to all recipients of the covered +work and works based on it. + + A patent license is "discriminatory" if it does not include within +the scope of its coverage, prohibits the exercise of, or is +conditioned on the non-exercise of one or more of the rights that are +specifically granted under this License. You may not convey a covered +work if you are a party to an arrangement with a third party that is +in the business of distributing software, under which you make payment +to the third party based on the extent of your activity of conveying +the work, and under which the third party grants, to any of the +parties who would receive the covered work from you, a discriminatory +patent license (a) in connection with copies of the covered work +conveyed by you (or copies made from those copies), or (b) primarily +for and in connection with specific products or compilations that +contain the covered work, unless you entered into that arrangement, +or that patent license was granted, prior to 28 March 2007. + + Nothing in this License shall be construed as excluding or limiting +any implied license or other defenses to infringement that may +otherwise be available to you under applicable patent law. + + 12. No Surrender of Others' Freedom. + + If conditions are imposed on you (whether by court order, agreement or +otherwise) that contradict the conditions of this License, they do not +excuse you from the conditions of this License. If you cannot convey a +covered work so as to satisfy simultaneously your obligations under this +License and any other pertinent obligations, then as a consequence you may +not convey it at all. For example, if you agree to terms that obligate you +to collect a royalty for further conveying from those to whom you convey +the Program, the only way you could satisfy both those terms and this +License would be to refrain entirely from conveying the Program. + + 13. Use with the GNU Affero General Public License. + + Notwithstanding any other provision of this License, you have +permission to link or combine any covered work with a work licensed +under version 3 of the GNU Affero General Public License into a single +combined work, and to convey the resulting work. The terms of this +License will continue to apply to the part which is the covered work, +but the special requirements of the GNU Affero General Public License, +section 13, concerning interaction through a network will apply to the +combination as such. + + 14. Revised Versions of this License. + + The Free Software Foundation may publish revised and/or new versions of +the GNU General Public License from time to time. Such new versions will +be similar in spirit to the present version, but may differ in detail to +address new problems or concerns. + + Each version is given a distinguishing version number. If the +Program specifies that a certain numbered version of the GNU General +Public License "or any later version" applies to it, you have the +option of following the terms and conditions either of that numbered +version or of any later version published by the Free Software +Foundation. If the Program does not specify a version number of the +GNU General Public License, you may choose any version ever published +by the Free Software Foundation. + + If the Program specifies that a proxy can decide which future +versions of the GNU General Public License can be used, that proxy's +public statement of acceptance of a version permanently authorizes you +to choose that version for the Program. + + Later license versions may give you additional or different +permissions. However, no additional obligations are imposed on any +author or copyright holder as a result of your choosing to follow a +later version. + + 15. Disclaimer of Warranty. + + THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY +APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT +HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY +OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, +THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR +PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM +IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF +ALL NECESSARY SERVICING, REPAIR OR CORRECTION. + + 16. Limitation of Liability. + + IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING +WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS +THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY +GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE +USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF +DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD +PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), +EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF +SUCH DAMAGES. + + 17. Interpretation of Sections 15 and 16. + + If the disclaimer of warranty and limitation of liability provided +above cannot be given local legal effect according to their terms, +reviewing courts shall apply local law that most closely approximates +an absolute waiver of all civil liability in connection with the +Program, unless a warranty or assumption of liability accompanies a +copy of the Program in return for a fee. + + END OF TERMS AND CONDITIONS + + How to Apply These Terms to Your New Programs + + If you develop a new program, and you want it to be of the greatest +possible use to the public, the best way to achieve this is to make it +free software which everyone can redistribute and change under these terms. + + To do so, attach the following notices to the program. It is safest +to attach them to the start of each source file to most effectively +state the exclusion of warranty; and each file should have at least +the "copyright" line and a pointer to where the full notice is found. + + <one line to give the program's name and a brief idea of what it does.> + Copyright (C) <year> <name of author> + + This program is free software: you can redistribute it and/or modify + it under the terms of the GNU General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + This program is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU General Public License for more details. + + You should have received a copy of the GNU General Public License + along with this program. If not, see <http://www.gnu.org/licenses/>. + +Also add information on how to contact you by electronic and paper mail. + + If the program does terminal interaction, make it output a short +notice like this when it starts in an interactive mode: + + <program> Copyright (C) <year> <name of author> + This program comes with ABSOLUTELY NO WARRANTY; for details type `show w'. + This is free software, and you are welcome to redistribute it + under certain conditions; type `show c' for details. + +The hypothetical commands `show w' and `show c' should show the appropriate +parts of the General Public License. Of course, your program's commands +might be different; for a GUI interface, you would use an "about box". + + You should also get your employer (if you work as a programmer) or school, +if any, to sign a "copyright disclaimer" for the program, if necessary. +For more information on this, and how to apply and follow the GNU GPL, see +<http://www.gnu.org/licenses/>. + + The GNU General Public License does not permit incorporating your program +into proprietary programs. If your program is a subroutine library, you +may consider it more useful to permit linking proprietary applications with +the library. If this is what you want to do, use the GNU Lesser General +Public License instead of this License. But first, please read +<http://www.gnu.org/philosophy/why-not-lgpl.html>. diff --git a/COPYING.LESSER b/COPYING.LESSER new file mode 100644 index 0000000000000000000000000000000000000000..65c5ca88a67c30becee01c5a8816d964b03862f9 --- /dev/null +++ b/COPYING.LESSER @@ -0,0 +1,165 @@ + GNU LESSER GENERAL PUBLIC LICENSE + Version 3, 29 June 2007 + + Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/> + Everyone is permitted to copy and distribute verbatim copies + of this license document, but changing it is not allowed. + + + This version of the GNU Lesser General Public License incorporates +the terms and conditions of version 3 of the GNU General Public +License, supplemented by the additional permissions listed below. + + 0. Additional Definitions. + + As used herein, "this License" refers to version 3 of the GNU Lesser +General Public License, and the "GNU GPL" refers to version 3 of the GNU +General Public License. + + "The Library" refers to a covered work governed by this License, +other than an Application or a Combined Work as defined below. + + An "Application" is any work that makes use of an interface provided +by the Library, but which is not otherwise based on the Library. +Defining a subclass of a class defined by the Library is deemed a mode +of using an interface provided by the Library. + + A "Combined Work" is a work produced by combining or linking an +Application with the Library. The particular version of the Library +with which the Combined Work was made is also called the "Linked +Version". + + The "Minimal Corresponding Source" for a Combined Work means the +Corresponding Source for the Combined Work, excluding any source code +for portions of the Combined Work that, considered in isolation, are +based on the Application, and not on the Linked Version. + + The "Corresponding Application Code" for a Combined Work means the +object code and/or source code for the Application, including any data +and utility programs needed for reproducing the Combined Work from the +Application, but excluding the System Libraries of the Combined Work. + + 1. Exception to Section 3 of the GNU GPL. + + You may convey a covered work under sections 3 and 4 of this License +without being bound by section 3 of the GNU GPL. + + 2. Conveying Modified Versions. + + If you modify a copy of the Library, and, in your modifications, a +facility refers to a function or data to be supplied by an Application +that uses the facility (other than as an argument passed when the +facility is invoked), then you may convey a copy of the modified +version: + + a) under this License, provided that you make a good faith effort to + ensure that, in the event an Application does not supply the + function or data, the facility still operates, and performs + whatever part of its purpose remains meaningful, or + + b) under the GNU GPL, with none of the additional permissions of + this License applicable to that copy. + + 3. Object Code Incorporating Material from Library Header Files. + + The object code form of an Application may incorporate material from +a header file that is part of the Library. You may convey such object +code under terms of your choice, provided that, if the incorporated +material is not limited to numerical parameters, data structure +layouts and accessors, or small macros, inline functions and templates +(ten or fewer lines in length), you do both of the following: + + a) Give prominent notice with each copy of the object code that the + Library is used in it and that the Library and its use are + covered by this License. + + b) Accompany the object code with a copy of the GNU GPL and this license + document. + + 4. Combined Works. + + You may convey a Combined Work under terms of your choice that, +taken together, effectively do not restrict modification of the +portions of the Library contained in the Combined Work and reverse +engineering for debugging such modifications, if you also do each of +the following: + + a) Give prominent notice with each copy of the Combined Work that + the Library is used in it and that the Library and its use are + covered by this License. + + b) Accompany the Combined Work with a copy of the GNU GPL and this license + document. + + c) For a Combined Work that displays copyright notices during + execution, include the copyright notice for the Library among + these notices, as well as a reference directing the user to the + copies of the GNU GPL and this license document. + + d) Do one of the following: + + 0) Convey the Minimal Corresponding Source under the terms of this + License, and the Corresponding Application Code in a form + suitable for, and under terms that permit, the user to + recombine or relink the Application with a modified version of + the Linked Version to produce a modified Combined Work, in the + manner specified by section 6 of the GNU GPL for conveying + Corresponding Source. + + 1) Use a suitable shared library mechanism for linking with the + Library. A suitable mechanism is one that (a) uses at run time + a copy of the Library already present on the user's computer + system, and (b) will operate properly with a modified version + of the Library that is interface-compatible with the Linked + Version. + + e) Provide Installation Information, but only if you would otherwise + be required to provide such information under section 6 of the + GNU GPL, and only to the extent that such information is + necessary to install and execute a modified version of the + Combined Work produced by recombining or relinking the + Application with a modified version of the Linked Version. (If + you use option 4d0, the Installation Information must accompany + the Minimal Corresponding Source and Corresponding Application + Code. If you use option 4d1, you must provide the Installation + Information in the manner specified by section 6 of the GNU GPL + for conveying Corresponding Source.) + + 5. Combined Libraries. + + You may place library facilities that are a work based on the +Library side by side in a single library together with other library +facilities that are not Applications and are not covered by this +License, and convey such a combined library under terms of your +choice, if you do both of the following: + + a) Accompany the combined library with a copy of the same work based + on the Library, uncombined with any other library facilities, + conveyed under the terms of this License. + + b) Give prominent notice with the combined library that part of it + is a work based on the Library, and explaining where to find the + accompanying uncombined form of the same work. + + 6. Revised Versions of the GNU Lesser General Public License. + + The Free Software Foundation may publish revised and/or new versions +of the GNU Lesser General Public License from time to time. Such new +versions will be similar in spirit to the present version, but may +differ in detail to address new problems or concerns. + + Each version is given a distinguishing version number. If the +Library as you received it specifies that a certain numbered version +of the GNU Lesser General Public License "or any later version" +applies to it, you have the option of following the terms and +conditions either of that published version or of any later version +published by the Free Software Foundation. If the Library as you +received it does not specify a version number of the GNU Lesser +General Public License, you may choose any version of the GNU Lesser +General Public License ever published by the Free Software Foundation. + + If the Library as you received it specifies that a proxy can decide +whether future versions of the GNU Lesser General Public License shall +apply, that proxy's public statement of acceptance of any version is +permanent authorization for you to choose that version for the +Library. diff --git a/INSTALL b/INSTALL new file mode 100644 index 0000000000000000000000000000000000000000..a0630de65be4b393b4e18c0b1d9473f66afa2e1d --- /dev/null +++ b/INSTALL @@ -0,0 +1,40 @@ +This package must be compiled using cgo. It also requires the installation +of GMP and PBC. During the build process, this package will attempt to +include <gmp.h> and <pbc/pbc.h>, and then dynamically link to GMP and PBC. +It also expects a POSIX-like environment for several C functions. For this +reason, this package cannot be used in Windows without a POSIX compatibility +layer and a gcc compiler. + +Most systems include a package for GMP. To install GMP in Debian / Ubuntu: + + sudo apt-get install libgmp-dev + +For an RPM installation with YUM: + + sudo yum install gmp + +For installation with Fink (http://www.finkproject.org/) on Mac OS X: + + sudo fink install gmp gmp-shlibs + +For more information or to compile from source, visit https://gmplib.org/ + +To install the PBC library, download the appropriate files for your system +from https://crypto.stanford.edu/pbc/download.html. PBC has three +dependencies: the gcc compiler, flex (http://flex.sourceforge.net/), and +bison (https://www.gnu.org/software/bison/). See the respective sites for +installation instructions. Most distributions include packages for these +libraries. For example, in Debian / Ubuntu: + + sudo apt-get install build-essential flex bison + +The PBC source can be compiled and installed using the usual GNU Build +System: + + ./configure + make + sudo make install + +After installing, you may need to rebuild the search path for libraries: + + sudo ldconfig diff --git a/README.md b/README.md new file mode 100644 index 0000000000000000000000000000000000000000..6d36ea54aff2d9906c18e36c0fb2c24292363f1b --- /dev/null +++ b/README.md @@ -0,0 +1,47 @@ +# The PBC Go Wrapper + +Package pbc provides structures for building pairing-based cryptosystems. It +is a wrapper around the Pairing-Based Cryptography (PBC) Library authored by +Ben Lynn (https://crypto.stanford.edu/pbc/). + +This wrapper provides access to all PBC functions. It supports generation of +various types of elliptic curves and pairings, element initialization, I/O, +and arithmetic. These features can be used to quickly build pairing-based or +conventional cryptosystems. + +The PBC library is designed to be extremely fast. Internally, it uses GMP +for arbitrary-precision arithmetic. It also includes a wide variety of +optimizations that make pairing-based cryptography highly efficient. To +improve performance, PBC does not perform type checking to ensure that +operations actually make sense. The Go wrapper provides the ability to add +compatibility checks to most operations, or to use unchecked elements to +maximize performance. + +Since this library provides low-level access to pairing primitives, it is +very easy to accidentally construct insecure systems. This library is +intended to be used by cryptographers or to implement well-analyzed +cryptosystems. + +## Features +* 5 different pairing types +* Pairing generation +* Parameter export and import +* Element type checking +* Fast element arithmetic and pairing +* Element randomization +* Element export and import +* Automatic garbage collection +* Integration with `fmt` +* Integration with `math/big` + +## Dependencies +This package must be compiled using cgo. It also requires the installation +of GMP and PBC. During the build process, this package will attempt to +include `gmp.h` and `pbc/pbc.h`, and then dynamically link to GMP and PBC. +It also expects a POSIX-like environment for several C functions. For this +reason, this package cannot be used in Windows without a POSIX compatibility +layer and a gcc compiler. + +## Documentation +For additional installation instructions and documentation, see +https://godoc.org/github.com/Nik-U/pbc diff --git a/c.go b/c.go index 91972e05701104803ddbb6d49558cbb32a31837c..3b21558da4c77fba2089a53f1a14d6eeb5cc3ae7 100644 --- a/c.go +++ b/c.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/doc.go b/doc.go index 07ea9d9e1cfa566224341a428f5e6a511f8edd7c..992905131486523f8b6a56a50b938ff3f8a9bf1c 100644 --- a/doc.go +++ b/doc.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + /* Package pbc provides structures for building pairing-based cryptosystems. It is a wrapper around the Pairing-Based Cryptography (PBC) Library authored by @@ -69,11 +92,32 @@ For more information or to compile from source, visit https://gmplib.org/ To install the PBC library, download the appropriate files for your system - from https://crypto.stanford.edu/pbc/download.html. The source can be - compiled and installed using the usual GNU Build System: + from https://crypto.stanford.edu/pbc/download.html. PBC has three + dependencies: the gcc compiler, flex (http://flex.sourceforge.net/), and + bison (https://www.gnu.org/software/bison/). See the respective sites for + installation instructions. Most distributions include packages for these + libraries. For example, in Debian / Ubuntu: + + sudo apt-get install build-essential flex bison + + The PBC source can be compiled and installed using the usual GNU Build + System: ./configure make make install + + After installing, you may need to rebuild the search path for libraries: + + sudo ldconfig + + License + + This package is free software: you can redistribute it and/or modify it + under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or (at your + option) any later version. + + For additional details, see the COPYING and COPYING.LESSER files. */ package pbc diff --git a/doc_bls_test.go b/doc_bls_test.go new file mode 100644 index 0000000000000000000000000000000000000000..7b4c6b0574fccf93b75890ff27e2d87c0c6ccc68 --- /dev/null +++ b/doc_bls_test.go @@ -0,0 +1,123 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + +package pbc_test + +import ( + "crypto/sha256" + "fmt" + + "github.com/Nik-U/pbc" +) + +// messageData represents a signed message sent over the network +type messageData struct { + message string + signature []byte +} + +// This example computes and verifies a Boneh-Lynn-Shacham signature in a +// simulated conversation between Alice and Bob. +func Example_signBLS() { + // The authority generates system parameters + params := pbc.GenerateA(160, 512) + pairing := params.NewPairing() + g := pairing.NewG2().Rand() + + // The authority distributes params and g to Alice and Bob + sharedParams := params.String() + sharedG := g.Bytes() + + // Channel for messages. Normally this would be a network connection. + messageChannel := make(chan *messageData) + + // Channel for public key distribution. This might be a secure out-of-band + // channel or something like a web of trust. The public key only needs to + // be transmitted and verified once. The best way to do this is beyond the + // scope of this example. + keyChannel := make(chan []byte) + + // Channel to wait until both simulations are done + finished := make(chan bool) + + // Simulate the conversation participants + go alice(sharedParams, sharedG, messageChannel, keyChannel, finished) + go bob(sharedParams, sharedG, messageChannel, keyChannel, finished) + + // Wait for the communication to finish + <-finished + <-finished + + // Output: + // Signature verified correctly +} + +// Alice generates a keypair and signs a message +func alice(sharedParams string, sharedG []byte, messageChannel chan *messageData, keyChannel chan []byte, finished chan bool) { + // Alice loads the system parameters + pairing, _ := pbc.NewPairingFromString(sharedParams) + g := pairing.NewG2().SetBytes(sharedG) + + // Generate keypair (x, g^x) + privKey := pairing.NewZr().Rand() + pubKey := pairing.NewG2().PowZn(g, privKey) + + // Send public key to Bob + keyChannel <- pubKey.Bytes() + + // Some time later, sign a message, hashed to h, as h^x + message := "some text to sign" + h := pairing.NewG1().SetFromStringHash(message, sha256.New()) + signature := pairing.NewG2().PowZn(h, privKey) + + // Send the message and signature to Bob + messageChannel <- &messageData{message: message, signature: signature.Bytes()} + + finished <- true +} + +// Bob verifies a message received from Alice +func bob(sharedParams string, sharedG []byte, messageChannel chan *messageData, keyChannel chan []byte, finished chan bool) { + // Bob loads the system parameters + pairing, _ := pbc.NewPairingFromString(sharedParams) + g := pairing.NewG2().SetBytes(sharedG) + + // Bob receives Alice's public key (and presumably verifies it manually) + pubKey := pairing.NewG2().SetBytes(<-keyChannel) + + // Some time later, Bob receives a message to verify + data := <-messageChannel + signature := pairing.NewG1().SetBytes(data.signature) + + // To verify, Bob checks that e(h,g^x)=e(sig,g) + h := pairing.NewG1().SetFromStringHash(data.message, sha256.New()) + temp1 := pairing.NewGT().Pair(h, pubKey) + temp2 := pairing.NewGT().Pair(signature, g) + if !temp1.Equals(temp2) { + fmt.Println("*BUG* Signature check failed *BUG*") + } else { + fmt.Println("Signature verified correctly") + } + + finished <- true +} diff --git a/doc_test.go b/doc_test.go new file mode 100644 index 0000000000000000000000000000000000000000..b102e52d7aeaff9aef6eded04273122ed1a96be7 --- /dev/null +++ b/doc_test.go @@ -0,0 +1,62 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + +package pbc_test + +import ( + "fmt" + + "github.com/Nik-U/pbc" +) + +// This example generates a pairing and some random group elements, then applies +// the pairing operation. +func Example() { + // In a real application, generate this once and publish it + params := pbc.GenerateA(160, 512) + + pairing := params.NewPairing() + + // Initialize group elements. pbc automatically handles garbage collection. + g := pairing.NewG1() + h := pairing.NewG2() + x := pairing.NewGT() + + // Generate random group elements and pair them + g.Rand() + h.Rand() + fmt.Printf("g = %s\n", g) + fmt.Printf("h = %s\n", h) + x.Pair(g, h) + fmt.Printf("e(g,h) = %s\n", x) +} + +// This example displays an element in a variety of formats. +func ExampleElement_Format(element *pbc.Element) { + fmt.Printf("%v", element) // Print in PBC format + fmt.Printf("%s", element) // Same as above + fmt.Printf("%36v", element) // Print in PBC format, base 36 + fmt.Printf("%#v", element) // Print metadata about element + fmt.Printf("%d", element) // Print with Go + fmt.Printf("%010o", element) // Print with Go, zero-padded width-10 octal +} diff --git a/element.go b/element.go index 0b9005a2b55538e89e9b5b15be375cf4c9b892f7..7c51b51276146b6a9f9b96a6bdae609bdacc7598 100644 --- a/element.go +++ b/element.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* @@ -23,7 +46,8 @@ import "runtime" // // x.Add(a, b).Mul(x, c).Square(x) // -// This assigns x = ((a+b)*c)^2. +// This assigns x = ((a+b)*c)^2. Whenever possible, the methods defined on +// Element use the same names as those in the math/big package. // // This technique is useful because it allows the target of operations to be // different than the operands. However, several convenience functions have @@ -33,8 +57,11 @@ import "runtime" // // x.Add(a, b).ThenMul(c).ThenSquare() // -// Whenever possible, the methods defined on Element use the same names as -// those in the math/big package. +// For some applications, it is more readable to avoid method chaining: +// +// x.Add(a, b) +// x.Mul(x, c) +// x.Square(x) // // The addition and multiplication functions perform addition and // multiplication operations in rings and fields. For groups of points on an diff --git a/element_arith.go b/element_arith.go index 210e593a17f552172079bec12e6eb32413984b15..4a233ba63dfd14b4d3971d0ed03fce4fec9c4884 100644 --- a/element_arith.go +++ b/element_arith.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/element_arith_simple.go b/element_arith_simple.go index dae9ff82097c6d13f52107c960b8488b6825c557..4285f21f91b366be7e974b8b991b8c69ecc150ec 100644 --- a/element_arith_simple.go +++ b/element_arith_simple.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc import "math/big" diff --git a/element_fmt.go b/element_fmt.go index a6f67353be7b72baf5284c39c146d3bb16e12ed4..45f157d40305a30540a1b0d144458a76b79315bc 100644 --- a/element_fmt.go +++ b/element_fmt.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/element_io.go b/element_io.go index b57c5fdfe23114d38193cce3e1513fcd590ad0c1..62169f611411cde8bdd109ff322478139304986e 100644 --- a/element_io.go +++ b/element_io.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* @@ -12,6 +35,9 @@ import ( ) // BigInt converts the Element to a big.Int if such an operation makes sense. +// Note that elements in GT cannot be converted using this method, even though +// this is possible in the original PBC library. If callers wish to convert the +// first coordinate into an integer, they should explicitly call X(). // // Requirements: // el is expressible as an integer (e.g., an element of Zn, but not a point). diff --git a/element_misc.go b/element_misc.go index 51f11c9b7093ed31b8bc045d74a627611938784c..5da5811f33d174b28393810952db6a05b3b2afcc 100644 --- a/element_misc.go +++ b/element_misc.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/errors.go b/errors.go index 5dcb89367a4b26034e9a2b46f94aa3ae3c7c3101..99aef06042d124854f4dad0b3ad60f5a35d45dc9 100644 --- a/errors.go +++ b/errors.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc import "errors" diff --git a/example_test.go b/example_test.go deleted file mode 100644 index 537f3b17ecd9dffa1873ad2ef612eecb8152b7ee..0000000000000000000000000000000000000000 --- a/example_test.go +++ /dev/null @@ -1,38 +0,0 @@ -package pbc_test - -import ( - "fmt" - - "github.com/Nik-U/pbc" -) - -// This example generates a pairing and some random group elements, then applies -// the pairing operation. -func Example() { - // In a real application, generate this once and publish it - params := pbc.GenerateA(160, 512) - - pairing := params.NewPairing() - - // Initialize group elements. pbc automatically handles garbage collection. - g := pairing.NewG1() - h := pairing.NewG2() - x := pairing.NewGT() - - // Generate random group elements and pair them - g.Rand() - h.Rand() - fmt.Printf("g = %s\n", g) - fmt.Printf("h = %s\n", h) - x.Pair(g, h) - fmt.Printf("e(g,h) = %s\n", x) -} - -func ExampleElement_Format() { - fmt.Printf("%v", element) // Print in PBC format - fmt.Printf("%s", element) // Same as above - fmt.Printf("%36v", element) // Print in PBC format, base 36 - fmt.Printf("%#v", element) // Print metadata about element - fmt.Printf("%d", element) // Print with Go - fmt.Printf("%010o", element) // Print with Go, zero-padded width-10 octal -} diff --git a/generation.go b/generation.go index 9e2a9fb2bff53383e044b023fc644041ef3b81e2..ed4d722ad7bf84866d9ef3ba5b15dfc903f1d69e 100644 --- a/generation.go +++ b/generation.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/gmp_big.go b/gmp_big.go index 11f5acb036a0f03e405640f42227d904f32697ea..48621f4ca915759e927c3adf8af22a26f115cceb 100644 --- a/gmp_big.go +++ b/gmp_big.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/pairing.go b/pairing.go index 9d49331d277be565caa6b0bc204dba0c7ec3f65c..0516c69b37f5f1ff5b45aeff9fdce3b1a6c9786c 100644 --- a/pairing.go +++ b/pairing.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/params.go b/params.go index 5d623af7ef95fe135ec29c31f1c33b91b72db2f2..2da5fd5316ff5cf694b39d996d999b6682bcd675 100644 --- a/params.go +++ b/params.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /* diff --git a/pbc_test.go b/pbc_test.go new file mode 100644 index 0000000000000000000000000000000000000000..15f06e00451067d86d02ce1cdbd49e0b086fb391 --- /dev/null +++ b/pbc_test.go @@ -0,0 +1,527 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + +package pbc + +import ( + "crypto/sha256" + "math/big" + "testing" +) + +func testPairing(t *testing.T) *Pairing { + // Generated with pbc_param_init_a_gen(p, 10, 32); + pairing, err := NewPairingFromString("type a\nq 4025338979\nh 6279780\nr 641\nexp2 9\nexp1 7\nsign1 1\nsign0 1\n") + if err != nil { + t.Fatalf("Could not instantiate test pairing") + } + return pairing +} + +func logElement(e *Element, name string, t *testing.T) { + t.Logf("%s = %s\n", name, e) +} + +// Boneh-Lynn-Shacham short signatures. +// Based on pbc/example/bls.c (C author: Ben Lynn). +func TestBLS(t *testing.T) { + pairing := testPairing(t) + + g := pairing.NewG2() + publicKey := pairing.NewG2() + h := pairing.NewG1() + sig := pairing.NewG1() + temp1 := pairing.NewGT() + temp2 := pairing.NewGT() + secretKey := pairing.NewZr() + + // Generate system parameters + g.Rand() + logElement(g, "g", t) + + // Generate private key + secretKey.Rand() + logElement(secretKey, "secret key", t) + + // Compute corresponding public key + publicKey.PowZn(g, secretKey) + logElement(publicKey, "public key", t) + + // Generate element from a hash + // For toy pairings, should check that pairing(g, h) != 1 + h.SetFromHash([]byte("hashofmessage")) + logElement(h, "message hash", t) + + // h^secret_key is the signature + // In real life: only output the first coordinate + sig.PowZn(h, secretKey) + logElement(sig, "signature", t) + + { + sigBefore := sig.NewFieldElement().Set(sig) + data := sig.CompressedBytes() + sig.SetCompressedBytes(data) + logElement(sig, "decompressed signature", t) + if !sig.Equals(sigBefore) { + t.Fatal("decompressed signature does not match") + } + } + + // Verification part 1 + temp1.Pair(sig, g) + logElement(temp1, "f(sig,g)", t) + + // Verification part 2 + // Should match above + temp2.Pair(h, publicKey) + logElement(temp2, "f(hash,pubkey)", t) + + if !temp1.Equals(temp2) { + t.Fatal("signature does not verify") + } + + { + data := sig.XBytes() + sig.SetXBytes(data) + + temp1.Pair(sig, g) + if temp1.Equals(temp2) { + t.Log("signature verified on first try") + } else { + temp1.Invert(temp1) + if temp1.Equals(temp2) { + t.Log("signature verified on second try") + } else { + t.Fatal("signature does not verify") + } + } + } + + // A random signature shouldn't verify + sig.Rand() + temp1.Pair(sig, g) + if temp1.Equals(temp2) { + t.Fatal("random signature verifies") + } +} + +// Hess ID-based signatures. +// Based on pbc/example/hess.c (C author: Dmitry Kosolapov). +// Based on paper "F. Hess. Efficient Identity Based Signature Schemes Based on +// Pairings. SAC 2002, LNCS 2595, Springer-Verlag, 2000" +func TestHess(t *testing.T) { + pairing := testPairing(t) + + p := pairing.NewG1() + p1 := pairing.NewG1() + qid := pairing.NewG1() + did := pairing.NewG1() + ppub := pairing.NewG1() + t4 := pairing.NewG1() + t5 := pairing.NewG1() + u := pairing.NewG1() + + s := pairing.NewZr() + k := pairing.NewZr() + v := pairing.NewZr() + t8 := pairing.NewZr() + + r := pairing.NewGT() + t1 := pairing.NewGT() + t6 := pairing.NewGT() + t7 := pairing.NewGT() + + // h is defined as sha256(m || r) where r is interpreted as bytes + h := func(target *Element, message []byte, element *Element) { + hash := sha256.New() + hash.Write(message) + hash.Write(element.Bytes()) + i := &big.Int{} + target.SetBig(i.SetBytes(hash.Sum([]byte{}))) + } + + // Key generation + p.Rand() + s.Rand() + qid.Rand() + ppub.MulZn(p, s) + did.MulZn(qid, s) + logElement(qid, "Qid", t) + logElement(p, "P", t) + logElement(ppub, "Ppub", t) + + // Sign + p1.Rand() + k.Rand() + t1.Pair(p1, p) + r.PowZn(t1, k) + h(v, []byte("Message"), r) + t4.MulZn(did, v) + t5.MulZn(p1, k) + u.Add(t4, t5) + logElement(u, "u", t) + logElement(v, "v", t) + + // Verify + t6.Pair(u, p) + ppub.Neg(ppub) + t7.Pair(qid, ppub) + t7.PowZn(t7, v) + r.Mul(t6, t7) + h(t8, []byte("Message"), r) + logElement(t8, "h3(m,r)", t) + if !t8.Equals(v) { + t.Fatal("signature does not verify") + } +} + +// Joux one-round protocol for tripartite Diffie-Hellman. +// Based on pbc/example/joux.c (C author: Dmitry Kosolapov). +// Based on paper "A. Joux. A One Round Protocol for Tripartie Diffie-Hellman. +// Proceedings of ANTS 4. LNCS 1838, pp. 385-394, 2000." +func TestJoux(t *testing.T) { + pairing := testPairing(t) + + p := pairing.NewG1() + t1 := pairing.NewG1() + t2 := pairing.NewG1() + t3 := pairing.NewG1() + + a := pairing.NewZr() + b := pairing.NewZr() + c := pairing.NewZr() + + t4 := pairing.NewGT() + t5 := pairing.NewGT() + t6 := pairing.NewGT() + ka := pairing.NewGT() + kb := pairing.NewGT() + kc := pairing.NewGT() + + p.Rand() + a.Rand() + b.Rand() + c.Rand() + t1.MulZn(p, a) + logElement(t1, "aP", t) + t2.MulZn(p, b) + logElement(t2, "bP", t) + t3.MulZn(p, c) + logElement(t3, "cP", t) + + t4.Pair(t2, t3) + ka.PowZn(t4, a) + logElement(ka, "Ka", t) + t5.Pair(t1, t3) + kb.PowZn(t5, b) + logElement(kb, "Kb", t) + t6.Pair(t1, t2) + kc.PowZn(t6, c) + logElement(kc, "Kc", t) + + if !ka.Equals(kb) || !kb.Equals(kc) { + t.Fatal("shared key derivation failed") + } +} + +// Paterson ID-based signature. +// Based on pbc/example/paterson.c (C author: Dmitry Kosolapov). +// Based on paper "K. G. Paterson. ID-Based Signatures from Pairings on +// Elliptic Curves. Electron. Lett., Vol. 38". Available at +// http://eprint.iacr.org/2002/004." +func TestPaterson(t *testing.T) { + pairing := testPairing(t) + + p := pairing.NewG1() + ppub := pairing.NewG1() + qid := pairing.NewG1() + did := pairing.NewG1() + r := pairing.NewG1() + s1 := pairing.NewG1() + t2 := pairing.NewG1() + t4 := pairing.NewG1() + t5 := pairing.NewG1() + t7 := pairing.NewG1() + + s2 := pairing.NewZr() + k := pairing.NewZr() + t1 := pairing.NewZr() + t3 := pairing.NewZr() + + t6 := pairing.NewGT() + t8 := pairing.NewGT() + t9 := pairing.NewGT() + t10 := pairing.NewGT() + t11 := pairing.NewGT() + + // Key generation + p.Rand() + s2.Rand() + ppub.MulZn(p, s2) + logElement(p, "P", t) + logElement(ppub, "Ppub", t) + qid.SetFromHash([]byte("ID")) + logElement(qid, "Qid", t) + did.MulZn(qid, s2) + + // Sign + k.Rand() + r.MulZn(p, k) + t1.SetFromHash([]byte("Message")) + t2.MulZn(p, t1) + h := sha256.Sum256(r.Bytes()) + t3.SetFromHash(h[:]) + t4.MulZn(did, t3) + t5.Add(t4, t2) + k.Invert(k) + s1.MulZn(t5, k) + logElement(r, "R", t) + logElement(s1, "S", t) + + // Verify + t1.SetFromHash([]byte("Message")) + t7.MulZn(p, t1) + t6.Pair(p, t7) + t8.Pair(ppub, qid) + h = sha256.Sum256(r.Bytes()) + t3.SetFromHash(h[:]) + t9.PowZn(t8, t3) + logElement(t8, "t8", t) + logElement(t9, "t9", t) + t10.Mul(t6, t9) + logElement(t10, "[e(P, P)^H2(M)][e(Ppub, Qid)^H3(R)]", t) + t11.Pair(r, s1) + logElement(t11, "e(R, S)", t) + if !t10.Equals(t11) { + t.Fatal("signature does not verify") + } +} + +// Yuan-Li protocol ID-based AKE. +// Based on pbc/example/yuanli.c (C author: Dmitry Kosolapov). +// Based on paper "A New Efficient ID-Based Authenticated Key Agreement +// Protocol, Cryptology ePrint Archive, Report 2005/309" +func TestYuanLi(t *testing.T) { + // This protocol has 2 stages: Setup and Extract. We represent them inside + // one code block. + pairing := testPairing(t) + + s := pairing.NewZr() + a := pairing.NewZr() + b := pairing.NewZr() + + p := pairing.NewG1() + ppub := pairing.NewG1() + qa := pairing.NewG1() + qb := pairing.NewG1() + sa := pairing.NewG1() + sb := pairing.NewG1() + ta := pairing.NewG1() + tb := pairing.NewG1() + temp1 := pairing.NewG1() + temp2 := pairing.NewG1() + temp3 := pairing.NewG1() + h := pairing.NewG1() + + kab := pairing.NewGT() + kba := pairing.NewGT() + k := pairing.NewGT() + temp4 := pairing.NewGT() + temp5 := pairing.NewGT() + + // SETUP: + // KGS chooses G1, G2, e: G1*G1 -> G2, P, H: {0, 1}* -> G1, s, + // H - some function for key calculation. + // KGS calculates Ppub = s*P, publishes {G1, G2, e, P, Ppub, H1, H} and + // saves s as master key. + p.Rand() + logElement(p, "P", t) + s.Rand() + ppub.MulZn(p, s) + logElement(ppub, "Ppub", t) + + // EXTRACT: + // For the user with ID public key can be calculated with Qid = H1(ID). + // KGS generates bound public key Sid = s*Qid. + // 1. A chooses random a from Z_p*, calculates Ta = a*P. + // A -> B: Ta + // 2. B chooses random b from Z_p*, calculates Tb = b*P. + // B -> A: Tb + // 3. A calculates h = a*Tb = a*b*P and shared secret key + // Kab = e(a*Ppub + Sa, Tb + Qb) + // 4. B calculates h = b*Ta = a*b*P and shared secret key + // Kba = e(Ta + Qa, b*Ppub + Sb) + // Session key is K = H(A, B, h, Kab). + // H was not defined in the original article. + // It is defined here as H(A, B, h, Kab)=e(h,H1(A)+H1(B))+Kab. + qa.SetFromHash([]byte("A")) + qb.SetFromHash([]byte("B")) + sa.MulZn(qa, s) + sb.MulZn(qb, s) + logElement(sa, "Sa", t) + logElement(sb, "Sb", t) + + // Step 1 + a.Rand() + ta.MulZn(p, a) + logElement(ta, "A->B Ta", t) + + // Step 2 + b.Rand() + tb.MulZn(p, b) + logElement(tb, "B->A Tb", t) + + // Step 3 + h.MulZn(tb, a) + logElement(h, "h", t) + temp1.MulZn(ppub, a) + temp1.Add(temp1, sa) + temp2.Add(tb, qb) + kab.Pair(temp1, temp2) + logElement(kab, "Kab", t) + + // Step 4 + h.MulZn(ta, b) + logElement(h, "h", t) + temp1.Add(ta, qa) + temp2.MulZn(ppub, b) + temp2.Add(temp2, sb) + kba.Pair(temp1, temp2) + logElement(kba, "Kba", t) + + // Conclusion + temp3.Add(qa, qb) + temp4.Pair(h, temp3) + + k.Add(temp4, kab) + logElement(k, "A's key K", t) + temp5.Set(k) + + k.Add(temp4, kba) + logElement(k, "B's key K", t) + + if !temp5.Equals(k) { + t.Fatalf("derived keys did not match") + } +} + +// Zhang-Kim ID-based Blind Signature scheme. +// Based on pbc/example/zhangkim.c (C author: Dmitry Kosolapov). +// Based on paper "F. Zang, K. Kim. ID-based Blind Signature and Ring Signature +// from Pairings. Advances in Cryptology - Asiacrypt 2002, LNCS Vol. 2510, +// Springer-Verlag, 2002" +func TestZhangKim(t *testing.T) { + pairing := testPairing(t) + + p := pairing.NewG1() + ppub := pairing.NewG1() + qid := pairing.NewG1() + sid := pairing.NewG1() + r1 := pairing.NewG1() + s1 := pairing.NewG1() + t1 := pairing.NewG1() + t2 := pairing.NewG1() + t7 := pairing.NewG1() + t8 := pairing.NewG1() + t9 := pairing.NewG1() + + rr := pairing.NewZr() + sr := pairing.NewZr() + c := pairing.NewZr() + a := pairing.NewZr() + b := pairing.NewZr() + negc := pairing.NewZr() + t6 := pairing.NewZr() + t14 := pairing.NewZr() + + t3 := pairing.NewGT() + t10 := pairing.NewGT() + t11 := pairing.NewGT() + t12 := pairing.NewGT() + + // h is defined as sha256(m || r) where r is interpreted as bytes + h := func(target *Element, message []byte, element *Element) { + hash := sha256.New() + hash.Write(message) + hash.Write(element.Bytes()) + i := &big.Int{} + target.SetBig(i.SetBytes(hash.Sum([]byte{}))) + } + + // Setup + p.Rand() + sr.Rand() + ppub.MulZn(p, sr) + logElement(p, "P", t) + logElement(ppub, "Ppub", t) + + // Extract + qid.SetFromHash([]byte("ID")) + sid.MulZn(qid, sr) + logElement(qid, "Public key Qid", t) + logElement(sid, "Private key Sid", t) + + // Issue blind signature + rr.Rand() + r1.MulZn(p, rr) + // Signer sends r1 = rr*P to user + logElement(r1, "R", t) + // Now we blind + a.Rand() + b.Rand() + t1.MulZn(p, a) + t1.Add(r1, t1) + t2.MulZn(qid, b) + t2.Add(t2, t1) + t3.Pair(t2, ppub) + h(t6, []byte("Message"), t3) + c.Add(t6, b) + // User sends c to signer + logElement(c, "c", t) + // Now we sign + t7.MulZn(ppub, rr) + t8.MulZn(sid, c) + s1.Add(t8, t7) + // Signer sends s1 + logElement(s1, "S", t) + // Now we unblind + t9.MulZn(ppub, a) + s1.Add(s1, t9) + c.Sub(c, b) + // Blind signature is now (S, c) + logElement(s1, "S1", t) + logElement(c, "c1", t) + + // Verification + t10.Pair(qid, ppub) + negc.Neg(c) + t10.PowZn(t10, negc) + t11.Pair(s1, p) + t12.Mul(t11, t10) + h(t14, []byte("Message"), t12) + logElement(c, "c1", t) + logElement(t14, "H(m, [e(S1, P)][e(Qid, Ppub)^(-c1)])", t) + if !t14.Equals(c) { + t.Fatal("signature does not verify") + } +} diff --git a/rand_hook.c b/rand_hook.c index 809c39477721ab850a5eeffdaae2bffce0f007f0..93baf1818dd30022cafed1bfce254317b1320f6d 100644 --- a/rand_hook.c +++ b/rand_hook.c @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + #include "_cgo_export.h" #include <pbc/pbc.h> diff --git a/utils.go b/utils.go index b990cea77f71361897951255d2cfa409d5214b89..555b7d1204014f8928f3d446f962fa8cda1a45db 100644 --- a/utils.go +++ b/utils.go @@ -1,3 +1,26 @@ +/* + Copyright © 2015 Nik Unger + + This file is part of The PBC Go Wrapper. + + The PBC Go Wrapper is free software: you can redistribute it and/or modify + it under the terms of the GNU Lesser General Public License as published by + the Free Software Foundation, either version 3 of the License, or + (at your option) any later version. + + The PBC Go Wrapper is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + GNU Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public License + along with The PBC Go Wrapper. If not, see <http://www.gnu.org/licenses/>. + + The PBC Go Wrapper makes use of The PBC library. The PBC Library and its + use are covered under the terms of the GNU Lesser General Public License + version 3, or (at your option) any later version. +*/ + package pbc /*