|
| 1 | +from electionguard.auxiliary import AuxiliaryPublicKey |
| 2 | +from electionguard.election_polynomial import ElectionPolynomial |
| 3 | +from electionguard.group import int_to_q_unchecked |
| 4 | +from electionguard.key_ceremony import ( |
| 5 | + ElectionPartialKeyBackup, |
| 6 | + ElectionPartialKeyChallenge, |
| 7 | + generate_election_key_pair, |
| 8 | + generate_rsa_auxiliary_key_pair, |
| 9 | + generate_election_partial_key_backup, |
| 10 | + generate_election_partial_key_challenge, |
| 11 | + verify_election_partial_key_backup, |
| 12 | + verify_election_partial_key_challenge, |
| 13 | +) |
| 14 | +from electionguard.rsa import rsa_decrypt, rsa_encrypt |
| 15 | +from electionguard.serializable import write_json_object |
| 16 | +from fastapi import APIRouter, HTTPException |
| 17 | +from typing import Any, List |
| 18 | + |
| 19 | +from ..models import ( |
| 20 | + AuxiliaryKeyPair, |
| 21 | + BackupChallengeRequest, |
| 22 | + BackupVerificationRequest, |
| 23 | + ChallengeVerificationRequest, |
| 24 | + ElectionKeyPair, |
| 25 | + Guardian, |
| 26 | + GuardianRequest, |
| 27 | + GuardianBackup, |
| 28 | + GuardianBackupRequest, |
| 29 | +) |
| 30 | +from app.utils import read_json_object |
| 31 | +from ..tags import GUARDIAN_ONLY |
| 32 | + |
| 33 | +router = APIRouter() |
| 34 | + |
| 35 | +identity = lambda message, key: message |
| 36 | + |
| 37 | + |
| 38 | +@router.post("", response_model=Guardian, tags=[GUARDIAN_ONLY]) |
| 39 | +def create_guardian(request: GuardianRequest) -> Guardian: |
| 40 | + """ |
| 41 | + Create a guardian for the election process with the associated keys |
| 42 | + """ |
| 43 | + election_keys = generate_election_key_pair( |
| 44 | + request.quorum, |
| 45 | + int_to_q_unchecked(request.nonce) if request.nonce is not None else None, |
| 46 | + ) |
| 47 | + if request.auxiliary_key_pair is None: |
| 48 | + auxiliary_keys = generate_rsa_auxiliary_key_pair() |
| 49 | + else: |
| 50 | + auxiliary_keys = request.auxiliary_key_pair |
| 51 | + if not election_keys: |
| 52 | + raise HTTPException( |
| 53 | + status_code=500, |
| 54 | + detail="Election keys failed to be generated", |
| 55 | + ) |
| 56 | + if not auxiliary_keys: |
| 57 | + raise HTTPException( |
| 58 | + status_code=500, detail="Auxiliary keys failed to be generated" |
| 59 | + ) |
| 60 | + return Guardian( |
| 61 | + id=request.id, |
| 62 | + sequence_order=request.sequence_order, |
| 63 | + number_of_guardians=request.number_of_guardians, |
| 64 | + quorum=request.quorum, |
| 65 | + election_key_pair=ElectionKeyPair( |
| 66 | + public_key=str(election_keys.key_pair.public_key), |
| 67 | + secret_key=str(election_keys.key_pair.secret_key), |
| 68 | + proof=write_json_object(election_keys.proof), |
| 69 | + polynomial=write_json_object(election_keys.polynomial), |
| 70 | + ), |
| 71 | + auxiliary_key_pair=AuxiliaryKeyPair( |
| 72 | + public_key=auxiliary_keys.public_key, secret_key=auxiliary_keys.secret_key |
| 73 | + ), |
| 74 | + ) |
| 75 | + |
| 76 | + |
| 77 | +@router.post("/backup", response_model=GuardianBackup, tags=[GUARDIAN_ONLY]) |
| 78 | +def create_guardian_backup(request: GuardianBackupRequest) -> GuardianBackup: |
| 79 | + """ |
| 80 | + Generate all election partial key backups based on existing public keys |
| 81 | + :param request: Guardian backup request |
| 82 | + :return: Guardian backup |
| 83 | + """ |
| 84 | + encrypt = identity if request.override_rsa else rsa_encrypt |
| 85 | + backups: List[Any] = [] |
| 86 | + for auxiliary_public_key in request.auxiliary_public_keys: |
| 87 | + backup = generate_election_partial_key_backup( |
| 88 | + request.guardian_id, |
| 89 | + read_json_object(request.election_polynomial, ElectionPolynomial), |
| 90 | + AuxiliaryPublicKey( |
| 91 | + auxiliary_public_key.owner_id, |
| 92 | + auxiliary_public_key.sequence_order, |
| 93 | + auxiliary_public_key.key, |
| 94 | + ), |
| 95 | + encrypt, |
| 96 | + ) |
| 97 | + if not backup: |
| 98 | + raise HTTPException(status_code=500, detail="Backup failed to be generated") |
| 99 | + backups.append(write_json_object(backup)) |
| 100 | + |
| 101 | + return GuardianBackup( |
| 102 | + id=request.guardian_id, |
| 103 | + election_partial_key_backups=backups, |
| 104 | + ) |
| 105 | + |
| 106 | + |
| 107 | +@router.post("/backup/verify", tags=[GUARDIAN_ONLY]) |
| 108 | +def verify_backup(request: BackupVerificationRequest) -> Any: |
| 109 | + decrypt = identity if request.override_rsa else rsa_decrypt |
| 110 | + verification = verify_election_partial_key_backup( |
| 111 | + request.verifier_id, |
| 112 | + read_json_object(request.election_partial_key_backup, ElectionPartialKeyBackup), |
| 113 | + read_json_object(request.auxiliary_key_pair, AuxiliaryKeyPair), |
| 114 | + decrypt, |
| 115 | + ) |
| 116 | + if not verification: |
| 117 | + raise HTTPException( |
| 118 | + status_code=500, detail="Backup verification process failed" |
| 119 | + ) |
| 120 | + return write_json_object(verification) |
| 121 | + |
| 122 | + |
| 123 | +@router.post("/challenge", tags=[GUARDIAN_ONLY]) |
| 124 | +def create_backup_challenge(request: BackupChallengeRequest) -> Any: |
| 125 | + challenge = generate_election_partial_key_challenge( |
| 126 | + read_json_object(request.election_partial_key_backup, ElectionPartialKeyBackup), |
| 127 | + read_json_object(request.election_polynomial, ElectionPolynomial), |
| 128 | + ) |
| 129 | + if not challenge: |
| 130 | + raise HTTPException( |
| 131 | + status_code=500, detail="Backup challenge generation failed" |
| 132 | + ) |
| 133 | + # FIXME Challenge value is ElementModQ converted to int that is too large |
| 134 | + challenge._replace(value=str(challenge.value)) |
| 135 | + return write_json_object(challenge) |
| 136 | + |
| 137 | + |
| 138 | +@router.post( |
| 139 | + "/challenge/verify", |
| 140 | + tags=[GUARDIAN_ONLY], |
| 141 | +) |
| 142 | +def verify_challenge(request: ChallengeVerificationRequest) -> Any: |
| 143 | + verification = verify_election_partial_key_challenge( |
| 144 | + request.verifier_id, |
| 145 | + read_json_object( |
| 146 | + request.election_partial_key_challenge, ElectionPartialKeyChallenge |
| 147 | + ), |
| 148 | + ) |
| 149 | + if not verification: |
| 150 | + raise HTTPException( |
| 151 | + status_code=500, detail="Challenge verification process failed" |
| 152 | + ) |
| 153 | + return write_json_object(verification) |
0 commit comments