-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathlib.rs
182 lines (161 loc) · 5.65 KB
/
lib.rs
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
use ark_serialize::{CanonicalDeserialize, CanonicalSerialize};
use codec::Encode;
use pyo3::exceptions::PyValueError;
use pyo3::prelude::*;
use pyo3::types::PyBytes;
use rand_core::OsRng;
use sha2::Digest;
use std::time::{SystemTime, UNIX_EPOCH};
use tle::{
curves::drand::TinyBLS381, ibe::fullident::Identity,
stream_ciphers::AESGCMStreamCipherProvider, tlock::tle,
};
use tokio;
use w3f_bls::EngineBLS;
pub const SUBTENSOR_PULSE_DELAY: u64 = 24;
#[derive(Encode)]
pub struct WeightsTlockPayload {
pub uids: Vec<u16>,
pub values: Vec<u16>,
pub version_key: u64,
}
async fn generate_commit(
uids: Vec<u16>,
values: Vec<u16>,
version_key: u64,
tempo: u64,
current_block: u64,
netuid: u16,
subnet_reveal_period_epochs: u64,
block_time: u64,
) -> Result<(Vec<u8>, u64), (std::io::Error, String)> {
// Steps comes from here https://github.com/opentensor/subtensor/pull/982/files#diff-7261bf1c7f19fc66a74c1c644ec2b4b277a341609710132fb9cd5f622350a6f5R120-R131
// 1 Instantiate payload
let payload = WeightsTlockPayload {
uids,
values,
version_key,
};
// 2 Serialize payload
let serialized_payload = payload.encode();
// Calculate reveal_round
// all of 3 variables are constants for drand quicknet
let period = 3;
let genesis_time = 1692803367;
let public_key = "83cf0f2896adee7eb8b5f01fcad3912212c437e0073e911fb90022d3e760183c8c4b450b6a0a6c3ac6a5776a2d1064510d1fec758c921cc22b0e17e63aaf4bcb5ed66304de9cf809bd274ca73bab4af5a6e9c76a4bc09e76eae8991ef5ece45a";
let now = SystemTime::now()
.duration_since(UNIX_EPOCH)
.unwrap()
.as_secs();
// Compute the current epoch index
let tempo_plus_one = tempo + 1;
let netuid_plus_one = (netuid as u64) + 1;
let block_with_offset = current_block + netuid_plus_one;
// If at an exact epoch boundary, treat this as the new epoch start.
let is_epoch_boundary = (block_with_offset % tempo_plus_one) == 0;
let base_epoch = block_with_offset / tempo_plus_one;
let current_epoch = if is_epoch_boundary {
base_epoch + 1
} else {
base_epoch
};
// Compute the reveal epoch
let reveal_epoch = current_epoch + subnet_reveal_period_epochs;
// Compute the block number when the reveal epoch starts
let reveal_block_number = reveal_epoch * tempo_plus_one - netuid_plus_one;
// Compute the number of blocks until the reveal epoch
let blocks_until_reveal = reveal_block_number.saturating_sub(current_block);
// Compute the time until the reveal in seconds
let time_until_reveal = blocks_until_reveal * block_time;
// Compute the reveal time in seconds since UNIX_EPOCH
let reveal_time = now + time_until_reveal;
// Compute the reveal round, ensuring we round up
let reveal_round = ((reveal_time - genesis_time + period - 1) / period) - SUBTENSOR_PULSE_DELAY;
// 3. Deserialize the public key
let pub_key_bytes = hex::decode(public_key).map_err(|e| {
(
std::io::Error::new(std::io::ErrorKind::InvalidData, format!("{:?}", e)),
"Decoding public key failed.".to_string(),
)
})?;
let pub_key =
<TinyBLS381 as EngineBLS>::PublicKeyGroup::deserialize_compressed(&*pub_key_bytes)
.map_err(|e| {
(
std::io::Error::new(std::io::ErrorKind::InvalidData, format!("{:?}", e)),
"Deserializing public key failed.".to_string(),
)
})?;
// 4 Create identity
let message = {
let mut hasher = sha2::Sha256::new();
hasher.update(reveal_round.to_be_bytes());
hasher.finalize().to_vec()
};
let identity = Identity::new(b"", vec![message]);
// 5. Encryption via tle with t-lock under the hood
let esk = [2; 32];
let ct = tle::<TinyBLS381, AESGCMStreamCipherProvider, OsRng>(
pub_key,
esk,
&serialized_payload,
identity,
OsRng,
)
.map_err(|e| {
(
std::io::Error::new(std::io::ErrorKind::Other, format!("{:?}", e)),
"Encryption failed.".to_string(),
)
})?;
// 6. Compress ct
let mut ct_bytes: Vec<u8> = Vec::new();
ct.serialize_compressed(&mut ct_bytes).map_err(|e| {
(
std::io::Error::new(std::io::ErrorKind::Other, format!("{:?}", e)),
"Ciphertext serialization failed.".to_string(),
)
})?;
// 7. Return result
Ok((ct_bytes, reveal_round))
}
#[pyfunction]
#[pyo3(signature = (uids, weights, version_key, tempo, current_block, netuid, subnet_reveal_period_epochs, block_time=12))]
fn get_encrypted_commit(
py: Python,
uids: Vec<u16>,
weights: Vec<u16>,
version_key: u64,
tempo: u64,
current_block: u64,
netuid: u16,
subnet_reveal_period_epochs: u64,
block_time: u64,
) -> PyResult<(Py<PyBytes>, u64)> {
// create runtime to make async call
let runtime =
tokio::runtime::Runtime::new().map_err(|e| PyValueError::new_err(e.to_string()))?;
let result = runtime.block_on(generate_commit(
uids,
weights,
version_key,
tempo,
current_block,
netuid,
subnet_reveal_period_epochs,
block_time,
));
// matching the result
match result {
Ok((ciphertext, target_round)) => {
let py_bytes = PyBytes::new_bound(py, &ciphertext).into();
Ok((py_bytes, target_round))
}
Err(e) => Err(PyValueError::new_err(format!("{:?}", e))),
}
}
#[pymodule]
fn bittensor_commit_reveal(m: &Bound<'_, PyModule>) -> PyResult<()> {
m.add_function(wrap_pyfunction!(get_encrypted_commit, m)?)?;
Ok(())
}