From 2b847bf891b9dbb769f77ec8c2ed1163af0b1ff0 Mon Sep 17 00:00:00 2001 From: arnaucube Date: Tue, 11 Oct 2022 19:29:33 +0200 Subject: [PATCH] Add BlindSigVerifyGadget::verify impl (r1cs constraints) --- src/constraints.rs | 57 ++++++++++++++++++++++++++++++++++++++++++++++ src/lib.rs | 25 ++++++++------------ 2 files changed, 66 insertions(+), 16 deletions(-) diff --git a/src/constraints.rs b/src/constraints.rs index 28a06e4..f2b962d 100644 --- a/src/constraints.rs +++ b/src/constraints.rs @@ -124,3 +124,60 @@ where }) } } + +pub struct BlindSigVerifyGadget>> +where + for<'a> &'a GC: GroupOpsBounds<'a, C, GC>, +{ + params: Parameters, + // sig: Signature, + _gc: PhantomData, +} + +impl>> BlindSigVerifyGadget +where + C: ProjectiveCurve, + GC: CurveVar>, + for<'a> &'a GC: GroupOpsBounds<'a, C, GC>, + ark_r1cs_std::groups::curves::twisted_edwards::AffineVar< + EdwardsParameters, + FpVar>, + >: From, + FpVar<::ScalarField>: Mul>>, + FpVar<::ScalarField>: From<::ScalarField>, +{ + fn verify( + parameters: &ParametersVar, + poseidon_hash: &PoseidonGadget>, + m: FpVar>, + s: &SignatureVar, + q: &PublicKeyVar, + ) -> Result>, SynthesisError> + where + ::ScalarField: Iterator, // WIP + ::ScalarField: From< + ::ScalarField> as Mul>>>::Output, + >, + { + let s_s = s.s.clone(); + + let sG = parameters + .generator + .scalar_mul_le(s_s.to_bits_le()?.iter())?; + + // G * s == R + Q * (R.x * H(m)) + // Note: in a circuit that aggregates multiple verifications, the hashing step could be + // done outside the signature verification, once for all 1 votes and once for all 0 votes, + // saving lots of constraints + let hm = poseidon_hash.hash(&[m])?; + let r = EdwardsVar::from(s.r.clone()); // WIP + + let rx_hm: ConstraintF = ConstraintF::::from(hm * r.x); + let rx_hm_fp: FpVar> = FpVar::>::from(rx_hm); + + let Q_rx_hm = q.pub_key.scalar_mul_le(rx_hm_fp.to_bits_le()?.iter())?; + let RHS = s.r.clone() + Q_rx_hm; + + sG.is_eq(&RHS) + } +} diff --git a/src/lib.rs b/src/lib.rs index ce9c0f3..dfed9a1 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -223,33 +223,26 @@ mod tests { #[test] fn test_blind() { + type S = BlindSigScheme; + let poseidon_params = poseidon_setup_params::(Curve::Bn254, 5, 3); let poseidon_hash = poseidon::Poseidon::new(poseidon_params); let mut rng = ark_std::test_rng(); - let params = BlindSigScheme::::setup(); - let (pk, sk) = BlindSigScheme::::keygen(¶ms, &mut rng); + let params = S::setup(); + let (pk, sk) = S::keygen(¶ms, &mut rng); - let (k, signer_r) = - BlindSigScheme::::new_request_params(¶ms, &mut rng); + let (k, signer_r) = S::new_request_params(¶ms, &mut rng); let m = ConstraintF::from(1234); - let (m_blinded, u) = BlindSigScheme::::blind( - ¶ms, - &mut rng, - &poseidon_hash, - m, - signer_r, - ) - .unwrap(); + let (m_blinded, u) = S::blind(¶ms, &mut rng, &poseidon_hash, m, signer_r).unwrap(); - let s_blinded = BlindSigScheme::::blind_sign(sk, k, m_blinded); + let s_blinded = S::blind_sign(sk, k, m_blinded); - let s = BlindSigScheme::::unblind(s_blinded, u); + let s = S::unblind(s_blinded, u); - let verified = - BlindSigScheme::::verify(¶ms, &poseidon_hash, m, s, pk); + let verified = S::verify(¶ms, &poseidon_hash, m, s, pk); assert!(verified); } }