1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
//! This module defines HPKE-based double encryption and decryption for use in
//! individual data tranformations as defined in
//! [`data_transformations`](crate::data_transformations).
//!
//! A plain text data value can be encrypted once to obtain a level-1
//! encryption of the data value.
//!
//! A level-1 encrypted data value can be encrypted a second time to obtain a
//! level-2 encryption of the data value.
//!
//! Only level-2 encrypted data values can be decrypted, and only if both
//! encryptions were performed towards the same receiver.

use libcrux::hpke::kem::Nsk;

use libcrux::hpke::{HpkeOpen, HpkeSeal};

use crate::SerializedHPKE;

use crate::data_types::{DataValue, EncryptedDataValue};

use libcrux::hpke::HPKEConfig;

use crate::error::Error;

use hacspec_lib::Randomness;

/// HPKE double encryption level 1 `info` string.
const HPKE_LEVEL_1_INFO: &[u8] = b"Hpke-Level-1";

/// HPKE double encryption level 2 `info` string.
const HPKE_LEVEL_2_INFO: &[u8] = b"Hpke-Level-2";

/// Level-1 encrypt a plain text data value.
///
/// Inputs:
/// - `data_value`: A plain text data value
/// - `ek`: The receivers public encryption key
/// - `randomness`: Random bytes
///
/// Output:
/// A level-1 encrypted data value.
///
/// Raises:
/// - `CorruptedData`: If the internal encryption fails.
///
/// Panics:
/// - on insufficient randomness
pub(crate) fn hpke_seal_level_1(
    data_value: &DataValue,
    ek: &[u8],
    randomness: &mut Randomness,
) -> Result<EncryptedDataValue, Error> {
    let HPKEConfig(_, kem, _, _) = crate::HPKE_CONF;
    let encrypted_data_value = EncryptedDataValue {
        attribute_name: data_value.attribute_name.clone(),
        value: SerializedHPKE::from_hpke_ct(&HpkeSeal(
            crate::HPKE_CONF,
            ek,
            HPKE_LEVEL_1_INFO,
            b"",
            &data_value.value,
            None,
            None,
            None,
            randomness.bytes(Nsk(kem)).unwrap().to_vec(),
        )?)
        .to_bytes(),
        encryption_level: 1u8,
    };
    Ok(encrypted_data_value)
}

/// Level-2 encrypt a level-1 encrypted data value.
///
/// Inputs:
/// - `data_value`: A level-1 encrypted data value
/// - `ek`: The receivers public encryption key
/// - `randomness`: Random bytes
///
/// Output:
/// A level-2 encrypted data value.
///
/// Raises:
/// - `InvalidInput`: If the input data value is not level-1 encrypted.
/// - `CorruptedData`: If the internal encryption fails.
///
/// Panics:
/// - on insufficient randomness
pub(crate) fn hpke_seal_level_2(
    data_value: &EncryptedDataValue,
    ek: &[u8],
    randomness: &mut Randomness,
) -> Result<EncryptedDataValue, Error> {
    if data_value.encryption_level != 1u8 {
        return Err(Error::InvalidInput);
    }

    let HPKEConfig(_, kem, _, _) = crate::HPKE_CONF;
    let data_value = EncryptedDataValue {
        attribute_name: data_value.attribute_name.clone(),
        value: SerializedHPKE::from_hpke_ct(&HpkeSeal(
            crate::HPKE_CONF,
            ek,
            HPKE_LEVEL_2_INFO,
            b"",
            &data_value.value,
            None,
            None,
            None,
            randomness.bytes(Nsk(kem)).unwrap().to_vec(),
        )?)
        .to_bytes(),
        encryption_level: 2u8,
    };
    Ok(data_value)
}

/// Decrypt a level-2 encrypted data value.
///
/// Inputs:
/// - `data_value`: A Level-2 encrypted data value
/// - `sk`: The receiver's decryption key
///
/// Outputs:
/// A plain text data value.
///
/// Raises:
/// - `InvalidInput`: If the input data value is not level-2 encrypted.
/// - `CorruptedData`: If the internal decryption fails, e.g. because of
///   inconsistent level-1 and level-2 receivers.
pub(crate) fn hpke_open_level_2(
    data_value: &EncryptedDataValue,
    sk: &[u8],
) -> Result<DataValue, Error> {
    if data_value.encryption_level != 2u8 {
        return Err(Error::InvalidInput);
    }

    let outer_encryption = SerializedHPKE::from_bytes(&data_value.value).to_hpke_ct();
    let inner_encryption = SerializedHPKE::from_bytes(&HpkeOpen(
        crate::HPKE_CONF,
        &outer_encryption,
        sk,
        HPKE_LEVEL_2_INFO,
        b"",
        None,
        None,
        None,
    )?)
    .to_hpke_ct();
    let data_value = DataValue {
        attribute_name: data_value.attribute_name.clone(),
        value: HpkeOpen(
            crate::HPKE_CONF,
            &inner_encryption,
            sk,
            HPKE_LEVEL_1_INFO,
            b"",
            None,
            None,
            None,
        )?,
    };
    Ok(data_value)
}