Navigation: DEDIS :: Cothority :: Applications :: Calypso
Calypso is the implementation of the upcoming "Calypso - Auditable Sharing of Private Data over Blockchains". The paper can be found here.
In short, Calypso allows to store symmetric keys in ByzCoin, protected by a sharded key, and controls access to this symmetric keys using Darcs, Distributed Access Rights Control.
It implements both the access-control cothority and the secret-management cothority:
- The access-control cothority is implemented using ByzCoin with two
contracts,
calypsoWrite
andcalypsoRead
- The secret-management cothority uses an onet service with methods to set up a Long Term Secret (LTS) distributed key and to request a re-encryption
The workflow is the following:
- secret-management: Administrator sets up a new LTS for all his clients. It
does so by calling the
CreateLTS
service endpoint. The resultingLTSID
will be used by all clients. - access-control: Administrator gives document creation rights to a writer
- access-control: Writer creates new Darcs for customers and for documents.
- access-control: Writer spawns a
Write
instance from a document Darc - access-control: Reader requests that a
Read
instance is spawned from aWrite
instance - secret-management: Reader requests a re-encryption to the
DecryptKey
service endpoint.
Here is a very short overview of the three most important elements of ByzCoin. For a more thorough documentation, refer to ByzCoin documentation.
The current ByzCoin service is a batching implementation of the previous skipchain service. It has a global state that holds Instances, where every instance is tied to a Contract and holds a blob of data. The contract defines how the data is to be interpreted and allows different Instructions sent from the user.
Access control is done using Darcs, which define what public keys can verify an action. Each instruction received by ByzCoin is mapped to an action and then verified if the given signature is correct. Also, every instance is linked to one darc that defines what actions are allowed to be done to that instance.
All instructions sent to ByzCoin are batched in a new block that is created
every blockInterval
seconds.
The CreateLTS endpoint is only usable when connecting to the conode
via localhost. It is possible to relax this restriction, but it should
only be done in testing environments; see service.go
's init()
function
for how.
The client that initiates CreateLTS
should hold two rosters. One roster for
storing the secret shares of LTS (long term secret), the other for a ByzCoin
instance for storing the LTS roster (using the LTS contract).
If the LTS roster does not exist on ByzCoin, the client is responsible for creating it. Which can be done by sending a ByzCoin transaction. The transaction should spawn a new LTS instance.
After the LTS roster is on ByzCoin but before the creation of LTS shares. The
client should make a CreateLTS
request to a node in the LTS roster. The
request should contain the instance ID that contains the LTS roster. Then,
every Calypso node should check that the instance ID that holds the LTS roster
exists before starting the DKG. For this operation, all nodes must be online.
By default, a threshold of 2/3 of the nodes must be present for the
decryption.
The CreateLTS service endpoint returns a LTSID
in the form of a 32 byte
slice. This ID represents the group that created the distributed key. Any node
can participate in as many DKGs as you want and will get a random LTSID
assigned.
The write contract verifies that the request has been correctly created, so that no malicious writer can send an encrypted key without knowing the secret. It then creates a new write-instance that contains the write request.
A read request must also be sent to the write contract, which will forward it to the read contract. This is so that every instruction sent to ByzCoin has as a target an existing instance.
The read contract verifies that the request is valid and points to the write instance. It stores the reader's public key in the instance, so that the secret-management cothority can re-encrypt to this reader's public key.
It is possible that the roster might change and the LTS shares must be re-distributed but without changing the LTS itself. We accomplish this in two steps.
- The authorised client(s) must update the LTS roster in the blockchain (an instance of the LTS smart contract).
- Then, the client instructs the calypso conodes to run the resharing protocol. The nodes in the new roster find and check the proof of roster-change in ByzCoin, and then start the protocol to reshare the secret between themselves.
For this operation, all nodes must be online. By default, a threshold of 2/3 of the nodes must be present for the decryption.