use poulpy_hal::{
api::{ModuleN, ScratchArenaTakeBasic, VecZnxCopyBackend},
layouts::{
Backend, Module, ScratchArena, scalar_znx_as_vec_znx_backend_mut_from_mut, scalar_znx_as_vec_znx_backend_ref_from_mut,
},
source::Source,
};
use crate::{
EncryptionInfos, GGLWEEncryptSk, GetDistribution, ScratchArenaTakeCore,
layouts::{
GGLWEInfos, GGLWEToGGSWKeyToBackendMut, GLWEInfos, GLWESecret, GLWESecretTensor, GLWESecretTensorFactory,
GLWESecretToBackendRef, prepared::GLWESecretPreparedFactory,
},
};
#[doc(hidden)]
pub trait GGLWEToGGSWKeyEncryptSkDefault<BE: Backend> {
fn gglwe_to_ggsw_key_encrypt_sk_tmp_bytes_default<A>(&self, infos: &A) -> usize
where
A: GGLWEInfos;
fn gglwe_to_ggsw_key_encrypt_sk_default<R, S, E>(
&self,
res: &mut R,
sk: &S,
enc_infos: &E,
source_xe: &mut Source,
source_xa: &mut Source,
scratch: &mut ScratchArena<'_, BE>,
) where
R: GGLWEToGGSWKeyToBackendMut<BE>,
E: EncryptionInfos,
S: GLWESecretToBackendRef<BE> + GetDistribution + GLWEInfos;
}
impl<BE: Backend> GGLWEToGGSWKeyEncryptSkDefault<BE> for Module<BE>
where
Self: ModuleN + GGLWEEncryptSk<BE> + GLWESecretTensorFactory<BE> + GLWESecretPreparedFactory<BE> + VecZnxCopyBackend<BE>,
{
fn gglwe_to_ggsw_key_encrypt_sk_tmp_bytes_default<A>(&self, infos: &A) -> usize
where
A: GGLWEInfos,
{
assert_eq!(self.n() as u32, infos.n());
let sk_prepared: usize = self.glwe_secret_prepared_bytes_of(infos.rank());
let sk_tensor: usize = GLWESecretTensor::bytes_of_from_infos(infos);
let sk_ij: usize = GLWESecret::bytes_of(self.n().into(), infos.rank());
let lvl_0: usize = sk_prepared;
let lvl_1: usize = sk_tensor;
let lvl_2: usize = sk_ij;
let lvl_3_prepare: usize = self.glwe_secret_tensor_prepare_tmp_bytes(infos.rank());
let lvl_3: usize = lvl_3_prepare;
let lvl_4_encrypt: usize = self.gglwe_encrypt_sk_tmp_bytes(infos);
lvl_0 + lvl_1 + lvl_2 + lvl_3 + lvl_4_encrypt
}
fn gglwe_to_ggsw_key_encrypt_sk_default<R, S, E>(
&self,
res: &mut R,
sk: &S,
enc_infos: &E,
source_xe: &mut Source,
source_xa: &mut Source,
scratch: &mut ScratchArena<'_, BE>,
) where
R: GGLWEToGGSWKeyToBackendMut<BE>,
E: EncryptionInfos,
S: GLWESecretToBackendRef<BE> + GetDistribution + GLWEInfos,
{
let mut res = res.to_backend_mut();
let rank: usize = res.rank_out().as_usize();
assert!(
scratch.available() >= self.gglwe_to_ggsw_key_encrypt_sk_tmp_bytes_default(&res),
"scratch.available(): {} < GGLWEToGGSWKeyEncryptSk::gglwe_to_ggsw_key_encrypt_sk_tmp_bytes: {}",
scratch.available(),
self.gglwe_to_ggsw_key_encrypt_sk_tmp_bytes_default(&res)
);
let scratch = scratch.borrow();
let (mut sk_prepared, scratch_1) = scratch.take_glwe_secret_prepared_scratch(self, res.rank());
let (mut sk_tensor, scratch_2) = scratch_1.take_glwe_secret_tensor_scratch(self.n().into(), res.rank());
let (mut sk_ij, scratch_3) = scratch_2.take_scalar_znx_scratch(self.n(), rank);
let (mut tensor_scratch, scratch_4) = scratch_3.split_at(self.glwe_secret_tensor_prepare_tmp_bytes(res.rank()));
self.glwe_secret_prepare(&mut sk_prepared, sk);
self.glwe_secret_tensor_prepare(&mut sk_tensor, sk, &mut tensor_scratch);
let (mut enc_scratch, _scratch_5) = scratch_4.split_at(self.gglwe_encrypt_sk_tmp_bytes(&res));
let sk_tensor_backend = scalar_znx_as_vec_znx_backend_ref_from_mut::<BE>(&sk_tensor.data);
for i in 0..rank {
{
let mut sk_ij_backend = scalar_znx_as_vec_znx_backend_mut_from_mut::<BE>(&mut sk_ij);
for j in 0..rank {
let (lo, hi) = if i <= j { (i, j) } else { (j, i) };
let idx: usize = lo * rank + hi - (lo * (lo + 1) / 2);
self.vec_znx_copy_backend(&mut sk_ij_backend, j, &sk_tensor_backend, idx);
}
}
self.gglwe_encrypt_sk(
&mut res.at_view_mut(i),
&sk_ij,
&sk_prepared,
enc_infos,
source_xe,
source_xa,
&mut enc_scratch,
);
}
}
}