|
// implementation of https://eprint.iacr.org/2013/879.pdf
|
|
|
|
package snark
|
|
|
|
import (
|
|
"fmt"
|
|
"math/big"
|
|
"os"
|
|
|
|
"github.com/arnaucube/go-snark-study/bn128"
|
|
"github.com/arnaucube/go-snark-study/circuitcompiler"
|
|
"github.com/arnaucube/go-snark-study/fields"
|
|
"github.com/arnaucube/go-snark-study/r1csqap"
|
|
)
|
|
|
|
type Pk struct { // Proving Key pk:=(pkA, pkB, pkC, pkH)
|
|
G1T [][3]*big.Int // t encrypted in G1 curve, G1T == Pk.H
|
|
A [][3]*big.Int
|
|
B [][3][2]*big.Int
|
|
C [][3]*big.Int
|
|
Kp [][3]*big.Int
|
|
Ap [][3]*big.Int
|
|
Bp [][3]*big.Int
|
|
Cp [][3]*big.Int
|
|
Z []*big.Int
|
|
}
|
|
|
|
type Vk struct {
|
|
Vka [3][2]*big.Int
|
|
Vkb [3]*big.Int
|
|
Vkc [3][2]*big.Int
|
|
IC [][3]*big.Int
|
|
G1Kbg [3]*big.Int // g1 * Kbeta * Kgamma
|
|
G2Kbg [3][2]*big.Int // g2 * Kbeta * Kgamma
|
|
G2Kg [3][2]*big.Int // g2 * Kgamma
|
|
Vkz [3][2]*big.Int
|
|
}
|
|
|
|
// Setup is the data structure holding the Trusted Setup data. The Setup.Toxic sub struct must be destroyed after the GenerateTrustedSetup function is completed
|
|
type Setup struct {
|
|
Toxic struct {
|
|
T *big.Int // trusted setup secret
|
|
Ka *big.Int // prover
|
|
Kb *big.Int // prover
|
|
Kc *big.Int // prover
|
|
Kbeta *big.Int
|
|
Kgamma *big.Int
|
|
RhoA *big.Int
|
|
RhoB *big.Int
|
|
RhoC *big.Int
|
|
}
|
|
|
|
// public
|
|
Pk Pk
|
|
Vk Vk
|
|
}
|
|
|
|
// Proof contains the parameters to proof the zkSNARK
|
|
type Proof struct {
|
|
PiA [3]*big.Int
|
|
PiAp [3]*big.Int
|
|
PiB [3][2]*big.Int
|
|
PiBp [3]*big.Int
|
|
PiC [3]*big.Int
|
|
PiCp [3]*big.Int
|
|
PiH [3]*big.Int
|
|
PiKp [3]*big.Int
|
|
// PublicSignals []*big.Int
|
|
}
|
|
|
|
type utils struct {
|
|
Bn bn128.Bn128
|
|
FqR fields.Fq
|
|
PF r1csqap.PolynomialField
|
|
}
|
|
|
|
// Utils is the data structure holding the BN128, FqR Finite Field over R, PolynomialField, that will be used inside the snarks operations
|
|
var Utils = prepareUtils()
|
|
|
|
func prepareUtils() utils {
|
|
bn, err := bn128.NewBn128()
|
|
if err != nil {
|
|
panic(err)
|
|
}
|
|
// new Finite Field
|
|
fqR := fields.NewFq(bn.R)
|
|
// new Polynomial Field
|
|
pf := r1csqap.NewPolynomialField(fqR)
|
|
|
|
return utils{
|
|
Bn: bn,
|
|
FqR: fqR,
|
|
PF: pf,
|
|
}
|
|
}
|
|
|
|
// GenerateTrustedSetup generates the Trusted Setup from a compiled Circuit. The Setup.Toxic sub data structure must be destroyed
|
|
func GenerateTrustedSetup(witnessLength int, circuit circuitcompiler.Circuit, alphas, betas, gammas [][]*big.Int) (Setup, error) {
|
|
var setup Setup
|
|
var err error
|
|
|
|
// input soundness
|
|
// for i := 0; i < len(alphas); i++ {
|
|
// for j := 0; j < len(alphas[i]); j++ {
|
|
// if j <= circuit.NPublic {
|
|
// if bytes.Equal(alphas[i][j].Bytes(), Utils.FqR.Zero().Bytes()) {
|
|
// alphas[i][j] = Utils.FqR.One()
|
|
// }
|
|
// }
|
|
// }
|
|
// }
|
|
|
|
// generate random t value
|
|
setup.Toxic.T, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
|
|
// k for calculating pi' and Vk
|
|
setup.Toxic.Ka, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
setup.Toxic.Kb, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
setup.Toxic.Kc, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
|
|
// generate Kβ (Kbeta) and Kγ (Kgamma)
|
|
setup.Toxic.Kbeta, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
setup.Toxic.Kgamma, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
|
|
// generate ρ (Rho): ρA, ρB, ρC
|
|
setup.Toxic.RhoA, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
setup.Toxic.RhoB, err = Utils.FqR.Rand()
|
|
if err != nil {
|
|
return Setup{}, err
|
|
}
|
|
setup.Toxic.RhoC = Utils.FqR.Mul(setup.Toxic.RhoA, setup.Toxic.RhoB)
|
|
|
|
// calculated more down
|
|
// for i := 0; i < witnessLength; i++ {
|
|
// tPow := Utils.FqR.Exp(setup.Toxic.T, big.NewInt(int64(i)))
|
|
// tEncr1 := Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, tPow)
|
|
// gt1 = append(gt1, tEncr1)
|
|
// tEncr2 := Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, tPow)
|
|
// gt2 = append(gt2, tEncr2)
|
|
// }
|
|
// gt1: g1, g1*t, g1*t^2, g1*t^3, ...
|
|
// gt2: g2, g2*t, g2*t^2, ...
|
|
|
|
setup.Vk.Vka = Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, setup.Toxic.Ka)
|
|
setup.Vk.Vkb = Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, setup.Toxic.Kb)
|
|
setup.Vk.Vkc = Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, setup.Toxic.Kc)
|
|
|
|
/*
|
|
Verification keys:
|
|
- Vk_betagamma1: setup.G1Kbg = g1 * Kbeta*Kgamma
|
|
- Vk_betagamma2: setup.G2Kbg = g2 * Kbeta*Kgamma
|
|
- Vk_gamma: setup.G2Kg = g2 * Kgamma
|
|
*/
|
|
kbg := Utils.FqR.Mul(setup.Toxic.Kbeta, setup.Toxic.Kgamma)
|
|
setup.Vk.G1Kbg = Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, kbg)
|
|
setup.Vk.G2Kbg = Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, kbg)
|
|
setup.Vk.G2Kg = Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, setup.Toxic.Kgamma)
|
|
|
|
// for i := 0; i < circuit.NVars; i++ {
|
|
for i := 0; i < len(circuit.Signals); i++ {
|
|
at := Utils.PF.Eval(alphas[i], setup.Toxic.T)
|
|
// rhoAat := Utils.Bn.Fq1.Mul(setup.Toxic.RhoA, at)
|
|
rhoAat := Utils.FqR.Mul(setup.Toxic.RhoA, at)
|
|
a := Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, rhoAat)
|
|
setup.Pk.A = append(setup.Pk.A, a)
|
|
if i <= circuit.NPublic {
|
|
setup.Vk.IC = append(setup.Vk.IC, a)
|
|
}
|
|
|
|
bt := Utils.PF.Eval(betas[i], setup.Toxic.T)
|
|
// rhoBbt := Utils.Bn.Fq1.Mul(setup.Toxic.RhoB, bt)
|
|
rhoBbt := Utils.FqR.Mul(setup.Toxic.RhoB, bt)
|
|
bg1 := Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, rhoBbt)
|
|
bg2 := Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, rhoBbt)
|
|
setup.Pk.B = append(setup.Pk.B, bg2)
|
|
|
|
ct := Utils.PF.Eval(gammas[i], setup.Toxic.T)
|
|
// rhoCct := Utils.Bn.Fq1.Mul(setup.Toxic.RhoC, ct)
|
|
rhoCct := Utils.FqR.Mul(setup.Toxic.RhoC, ct)
|
|
c := Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, rhoCct)
|
|
setup.Pk.C = append(setup.Pk.C, c)
|
|
|
|
kt := Utils.FqR.Add(Utils.FqR.Add(rhoAat, rhoBbt), rhoCct)
|
|
k := Utils.Bn.G1.Affine(Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, kt))
|
|
|
|
ktest := Utils.Bn.G1.Affine(Utils.Bn.G1.Add(Utils.Bn.G1.Add(a, bg1), c))
|
|
if !Utils.Bn.Fq2.Equal(k, ktest) {
|
|
os.Exit(1)
|
|
return setup, err
|
|
}
|
|
|
|
setup.Pk.Ap = append(setup.Pk.Ap, Utils.Bn.G1.MulScalar(a, setup.Toxic.Ka))
|
|
setup.Pk.Bp = append(setup.Pk.Bp, Utils.Bn.G1.MulScalar(bg1, setup.Toxic.Kb))
|
|
setup.Pk.Cp = append(setup.Pk.Cp, Utils.Bn.G1.MulScalar(c, setup.Toxic.Kc))
|
|
k_ := Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, kt)
|
|
setup.Pk.Kp = append(setup.Pk.Kp, Utils.Bn.G1.MulScalar(k_, setup.Toxic.Kbeta))
|
|
}
|
|
|
|
// z pol
|
|
zpol := []*big.Int{big.NewInt(int64(1))}
|
|
// for i := 0; i < len(circuit.Constraints); i++ {
|
|
for i := 1; i < len(alphas)-1; i++ {
|
|
zpol = Utils.PF.Mul(
|
|
zpol,
|
|
[]*big.Int{
|
|
Utils.FqR.Neg( // neg over R
|
|
big.NewInt(int64(i))),
|
|
big.NewInt(int64(1)),
|
|
})
|
|
}
|
|
setup.Pk.Z = zpol
|
|
|
|
zt := Utils.PF.Eval(zpol, setup.Toxic.T)
|
|
// rhoCzt := Utils.Bn.Fq1.Mul(setup.Toxic.RhoC, zt)
|
|
rhoCzt := Utils.FqR.Mul(setup.Toxic.RhoC, zt)
|
|
setup.Vk.Vkz = Utils.Bn.G2.MulScalar(Utils.Bn.G2.G, rhoCzt)
|
|
|
|
// encrypt t values with curve generators
|
|
var gt1 [][3]*big.Int
|
|
gt1 = append(gt1, Utils.Bn.G1.G) // the first is t**0 * G1 = 1 * G1 = G1
|
|
tEncr := setup.Toxic.T
|
|
for i := 1; i < len(zpol); i++ { //should be G1T = pkH = (tau**i * G1) from i=0 to d, where d is degree of pol Z(x)
|
|
gt1 = append(gt1, Utils.Bn.G1.MulScalar(Utils.Bn.G1.G, tEncr))
|
|
// tEncr = Utils.Bn.Fq1.Mul(tEncr, setup.Toxic.T)
|
|
tEncr = Utils.FqR.Mul(tEncr, setup.Toxic.T)
|
|
}
|
|
setup.Pk.G1T = gt1
|
|
|
|
return setup, nil
|
|
}
|
|
|
|
// GenerateProofs generates all the parameters to proof the zkSNARK from the Circuit, Setup and the Witness
|
|
func GenerateProofs(circuit circuitcompiler.Circuit, pk Pk, w []*big.Int, px []*big.Int) (Proof, error) {
|
|
var proof Proof
|
|
proof.PiA = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
proof.PiAp = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
proof.PiB = Utils.Bn.Fq6.Zero()
|
|
proof.PiBp = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
proof.PiC = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
proof.PiCp = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
proof.PiH = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
proof.PiKp = [3]*big.Int{Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero(), Utils.Bn.G1.F.Zero()}
|
|
|
|
for i := circuit.NPublic + 1; i < circuit.NVars; i++ {
|
|
proof.PiA = Utils.Bn.G1.Add(proof.PiA, Utils.Bn.G1.MulScalar(pk.A[i], w[i]))
|
|
proof.PiAp = Utils.Bn.G1.Add(proof.PiAp, Utils.Bn.G1.MulScalar(pk.Ap[i], w[i]))
|
|
}
|
|
|
|
for i := 0; i < circuit.NVars; i++ {
|
|
proof.PiB = Utils.Bn.G2.Add(proof.PiB, Utils.Bn.G2.MulScalar(pk.B[i], w[i]))
|
|
proof.PiBp = Utils.Bn.G1.Add(proof.PiBp, Utils.Bn.G1.MulScalar(pk.Bp[i], w[i]))
|
|
|
|
proof.PiC = Utils.Bn.G1.Add(proof.PiC, Utils.Bn.G1.MulScalar(pk.C[i], w[i]))
|
|
proof.PiCp = Utils.Bn.G1.Add(proof.PiCp, Utils.Bn.G1.MulScalar(pk.Cp[i], w[i]))
|
|
|
|
proof.PiKp = Utils.Bn.G1.Add(proof.PiKp, Utils.Bn.G1.MulScalar(pk.Kp[i], w[i]))
|
|
}
|
|
|
|
hx := Utils.PF.DivisorPolynomial(px, pk.Z) // maybe move this calculation to a previous step
|
|
|
|
// piH = pkH,0 + sum ( hi * pk H,i ), where pkH = G1T, hi=hx
|
|
// proof.PiH = Utils.Bn.G1.Add(proof.PiH, pk.G1T[0])
|
|
for i := 0; i < len(hx); i++ {
|
|
proof.PiH = Utils.Bn.G1.Add(proof.PiH, Utils.Bn.G1.MulScalar(pk.G1T[i], hx[i]))
|
|
}
|
|
|
|
return proof, nil
|
|
}
|
|
|
|
// VerifyProof verifies over the BN128 the Pairings of the Proof
|
|
func VerifyProof(vk Vk, proof Proof, publicSignals []*big.Int, debug bool) bool {
|
|
// e(piA, Va) == e(piA', g2)
|
|
pairingPiaVa := Utils.Bn.Pairing(proof.PiA, vk.Vka)
|
|
pairingPiapG2 := Utils.Bn.Pairing(proof.PiAp, Utils.Bn.G2.G)
|
|
if !Utils.Bn.Fq12.Equal(pairingPiaVa, pairingPiapG2) {
|
|
if debug {
|
|
fmt.Println("❌ e(piA, Va) == e(piA', g2), valid knowledge commitment for A")
|
|
}
|
|
return false
|
|
}
|
|
if debug {
|
|
fmt.Println("✓ e(piA, Va) == e(piA', g2), valid knowledge commitment for A")
|
|
}
|
|
|
|
// e(Vb, piB) == e(piB', g2)
|
|
pairingVbPib := Utils.Bn.Pairing(vk.Vkb, proof.PiB)
|
|
pairingPibpG2 := Utils.Bn.Pairing(proof.PiBp, Utils.Bn.G2.G)
|
|
if !Utils.Bn.Fq12.Equal(pairingVbPib, pairingPibpG2) {
|
|
if debug {
|
|
fmt.Println("❌ e(Vb, piB) == e(piB', g2), valid knowledge commitment for B")
|
|
}
|
|
return false
|
|
}
|
|
if debug {
|
|
fmt.Println("✓ e(Vb, piB) == e(piB', g2), valid knowledge commitment for B")
|
|
}
|
|
|
|
// e(piC, Vc) == e(piC', g2)
|
|
pairingPicVc := Utils.Bn.Pairing(proof.PiC, vk.Vkc)
|
|
pairingPicpG2 := Utils.Bn.Pairing(proof.PiCp, Utils.Bn.G2.G)
|
|
if !Utils.Bn.Fq12.Equal(pairingPicVc, pairingPicpG2) {
|
|
if debug {
|
|
fmt.Println("❌ e(piC, Vc) == e(piC', g2), valid knowledge commitment for C")
|
|
}
|
|
return false
|
|
}
|
|
if debug {
|
|
fmt.Println("✓ e(piC, Vc) == e(piC', g2), valid knowledge commitment for C")
|
|
}
|
|
|
|
// Vkx, to then calculate Vkx+piA
|
|
vkxpia := vk.IC[0]
|
|
for i := 0; i < len(publicSignals); i++ {
|
|
vkxpia = Utils.Bn.G1.Add(vkxpia, Utils.Bn.G1.MulScalar(vk.IC[i+1], publicSignals[i]))
|
|
}
|
|
|
|
// e(Vkx+piA, piB) == e(piH, Vkz) * e(piC, g2)
|
|
if !Utils.Bn.Fq12.Equal(
|
|
Utils.Bn.Pairing(Utils.Bn.G1.Add(vkxpia, proof.PiA), proof.PiB), // TODO Add(vkxpia, proof.PiA) can go outside in order to save computation, as is reused later
|
|
Utils.Bn.Fq12.Mul(
|
|
Utils.Bn.Pairing(proof.PiH, vk.Vkz),
|
|
Utils.Bn.Pairing(proof.PiC, Utils.Bn.G2.G))) {
|
|
if debug {
|
|
fmt.Println("❌ e(Vkx+piA, piB) == e(piH, Vkz) * e(piC, g2), QAP disibility checked")
|
|
}
|
|
return false
|
|
}
|
|
if debug {
|
|
fmt.Println("✓ e(Vkx+piA, piB) == e(piH, Vkz) * e(piC, g2), QAP disibility checked")
|
|
}
|
|
|
|
// e(Vkx+piA+piC, g2KbetaKgamma) * e(g1KbetaKgamma, piB)
|
|
// == e(piK, g2Kgamma)
|
|
piApiC := Utils.Bn.G1.Add(Utils.Bn.G1.Add(vkxpia, proof.PiA), proof.PiC)
|
|
pairingPiACG2Kbg := Utils.Bn.Pairing(piApiC, vk.G2Kbg)
|
|
pairingG1KbgPiB := Utils.Bn.Pairing(vk.G1Kbg, proof.PiB)
|
|
pairingL := Utils.Bn.Fq12.Mul(pairingPiACG2Kbg, pairingG1KbgPiB)
|
|
pairingR := Utils.Bn.Pairing(proof.PiKp, vk.G2Kg)
|
|
if !Utils.Bn.Fq12.Equal(pairingL, pairingR) {
|
|
fmt.Println("❌ e(Vkx+piA+piC, g2KbetaKgamma) * e(g1KbetaKgamma, piB) == e(piK, g2Kgamma)")
|
|
return false
|
|
}
|
|
if debug {
|
|
fmt.Println("✓ e(Vkx+piA+piC, g2KbetaKgamma) * e(g1KbetaKgamma, piB) == e(piK, g2Kgamma)")
|
|
}
|
|
|
|
return true
|
|
}
|