snarkvm_console_program/data/record/
decrypt.rs1use super::*;
17
18impl<N: Network> Record<N, Ciphertext<N>> {
19 pub fn decrypt(&self, view_key: &ViewKey<N>) -> Result<Record<N, Plaintext<N>>> {
21 let record_view_key = (self.nonce * **view_key).to_x_coordinate();
23 let record = self.decrypt_symmetric_unchecked(&record_view_key)?;
25 match view_key.to_address() == **record.owner() {
27 true => Ok(record),
28 false => bail!("Illegal operation: Record::decrypt() view key does not correspond to the record owner."),
29 }
30 }
31
32 pub fn decrypt_symmetric_unchecked(&self, record_view_key: &Field<N>) -> Result<Record<N, Plaintext<N>>> {
36 let num_randomizers = self.num_randomizers()?;
38 let randomizers = N::hash_many_psd8(&[N::encryption_domain(), *record_view_key], num_randomizers);
40 self.decrypt_with_randomizers(&randomizers)
42 }
43
44 fn decrypt_with_randomizers(&self, randomizers: &[Field<N>]) -> Result<Record<N, Plaintext<N>>> {
46 let mut index: usize = 0;
48
49 let owner = match self.owner.is_public() {
51 true => self.owner.decrypt_with_randomizer(&[])?,
52 false => self.owner.decrypt_with_randomizer(&[randomizers[index]])?,
53 };
54
55 if owner.is_private() {
57 index += 1;
58 }
59
60 let mut decrypted_data = IndexMap::with_capacity(self.data.len());
62 for (id, entry, num_randomizers) in self.data.iter().map(|(id, entry)| (id, entry, entry.num_randomizers())) {
63 let num_randomizers = num_randomizers? as usize;
65 let randomizers = &randomizers[index..index + num_randomizers];
67 let entry = match entry {
69 Entry::Constant(plaintext) => Entry::Constant(plaintext.clone()),
71 Entry::Public(plaintext) => Entry::Public(plaintext.clone()),
73 Entry::Private(private) => Entry::Private(Plaintext::from_fields(
75 &private
76 .iter()
77 .zip_eq(randomizers)
78 .map(|(ciphertext, randomizer)| *ciphertext - randomizer)
79 .collect::<Vec<_>>(),
80 )?),
81 };
82 if decrypted_data.insert(*id, entry).is_some() {
84 bail!("Duplicate identifier in record: {}", id);
85 }
86 index += num_randomizers;
88 }
89
90 Self::from_plaintext(owner, decrypted_data, self.nonce)
92 }
93}
94
95#[cfg(test)]
96mod tests {
97 use super::*;
98 use crate::Literal;
99 use snarkvm_console_account::PrivateKey;
100 use snarkvm_console_network::MainnetV0;
101 use snarkvm_console_types::Field;
102
103 type CurrentNetwork = MainnetV0;
104
105 const ITERATIONS: u64 = 1000;
106
107 fn check_encrypt_and_decrypt<N: Network>(
108 view_key: ViewKey<N>,
109 owner: Owner<N, Plaintext<N>>,
110 rng: &mut TestRng,
111 ) -> Result<()> {
112 let randomizer = Scalar::rand(rng);
114 let record = Record {
115 owner,
116 data: IndexMap::from_iter(vec![
117 (Identifier::from_str("a")?, Entry::Private(Plaintext::from(Literal::Field(Field::rand(rng))))),
118 (Identifier::from_str("b")?, Entry::Private(Plaintext::from(Literal::Scalar(Scalar::rand(rng))))),
119 ]),
120 nonce: N::g_scalar_multiply(&randomizer),
121 };
122 let ciphertext = record.encrypt(randomizer)?;
124 assert_eq!(record, ciphertext.decrypt(&view_key)?);
126
127 let incorrect_private_key = PrivateKey::<N>::new(rng)?;
129 let incorrect_view_key = ViewKey::try_from(&incorrect_private_key)?;
131 assert!(ciphertext.decrypt(&incorrect_view_key).is_err());
133
134 Ok(())
135 }
136
137 #[test]
138 fn test_encrypt_and_decrypt() -> Result<()> {
139 let mut rng = TestRng::default();
140
141 for _ in 0..ITERATIONS {
142 let private_key = PrivateKey::<CurrentNetwork>::new(&mut rng)?;
144 let view_key = ViewKey::try_from(&private_key)?;
145 let address = Address::try_from(&private_key)?;
146
147 let owner = Owner::Public(address);
149 check_encrypt_and_decrypt::<CurrentNetwork>(view_key, owner, &mut rng)?;
150
151 let owner = Owner::Private(Plaintext::from(Literal::Address(address)));
153 check_encrypt_and_decrypt::<CurrentNetwork>(view_key, owner, &mut rng)?;
154 }
155 Ok(())
156 }
157}