* change: Refactor structure into workspace * chore: Add empty readme * change: Transform repo into workspace * add: Create folding-verifier-solidity crate * add: Include askama.toml for `sol` extension escaper * add: Jordi's old Groth16 verifier .sol template and adapt it * tmp: create simple template struct to test * Update FoldingSchemes trait, fit Nova+CycleFold - update lib.rs's `FoldingScheme` trait interface - fit Nova+CycleFold into the `FoldingScheme` trait - refactor `src/nova/*` * chore: add serialization assets for testing Now we include an `assets` folder with a serialized proof & vk for tests * Add `examples` dir, with Nova's `FoldingScheme` example * polishing * expose poseidon_test_config outside tests * change: Refactor structure into workspace * chore: Add empty readme * change: Transform repo into workspace * add: Create folding-verifier-solidity crate * add: Include askama.toml for `sol` extension escaper * add: Jordi's old Groth16 verifier .sol template and adapt it * tmp: create simple template struct to test * feat: templating kzg working * chore: add emv and revm * feat: start evm file * chore: add ark-poly-commit * chore: move `commitment` to `folding-schemes` * chore: update `.gitignore` to ignore generated contracts * chore: update template with bn254 lib on it (avoids import), update for loop to account for whitespaces * refactor: update template with no lib * feat: add evm deploy code, compile and create kzg verifier * chore: update `Cargo.toml` to have `folding-schemes` available with verifiers * feat: start kzg prove and verify with sol * chore: compute crs from kzg prover * feat: evm kzg verification passing * tmp * change: Swap order of G2 coordinates within the template * Update way to serialize proof with correct order * chore: update `Cargo.toml` * chore: add revm * chore: add `save_solidity` * refactor: verifiers in dedicated mod * refactor: have dedicated `utils` module * chore: expose modules * chore: update verifier for kzg * chore: rename templates * fix: look for binary using also name of contract * refactor: generate groth16 proof for sha256 pre-image, generate groth16 template with verifying key * chore: template renaming * fix: switch circuit for circuit that simply adds * feat: generates test data on the fly * feat: update to latest groth16 verifier * refactor: rename folder, update `.gitignore` * chore: update `Cargo.toml` * chore: update templates extension to indicate that they are templates * chore: rename templates, both files and structs * fix: template inheritance working * feat: template spdx and pragma statements * feat: decider verifier compiles, update test for kzg10 and groth16 templates * feat: parameterize which size of the crs should be stored on the contract * chore: add comment on how the groth16 and kzg10 proofs will be linked together * chore: cargo clippy run * chore: cargo clippy tests * chore: cargo fmt * refactor: remove unused lifetime parameter * chore: end merge * chore: move examples to `folding-schemes` workspace * get latest main changes * fix: temp fix clippy warnings, will remove lints once not used in tests only * fix: cargo clippy lint added on `code_size` * fix: update path to test circuit and add step for installing solc * chore: remove `save_solidity` steps * fix: the borrowed expression implements the required traits * chore: update `Cargo.toml` * chore: remove extra `[patch.crates-io]` * fix: update to patch at the workspace level and add comment explaining this * refactor: correct `staticcall` with valid input/output sizes and change return syntax for pairing * refactor: expose modules and remove `dead_code` calls * chore: update `README.md`, add additional comments on `kzg10` template and update `groth16` template comments * chore: be clearer on attributions on `kzg10` --------- Co-authored-by: CPerezz <c.perezbaro@gmail.com> Co-authored-by: arnaucube <root@arnaucube.com>main
@ -0,0 +1,39 @@ |
|||||
|
[package] |
||||
|
name = "folding-schemes-solidity" |
||||
|
version = "0.1.0" |
||||
|
edition = "2021" |
||||
|
|
||||
|
[dependencies] |
||||
|
ark-ec = "0.4" |
||||
|
ark-ff = "0.4" |
||||
|
ark-poly = "0.4" |
||||
|
ark-std = "0.4" |
||||
|
ark-groth16 = "0.4" |
||||
|
askama = { version = "0.12.0", features = ["config"], default-features = false } |
||||
|
ark-bn254 = "0.4.0" |
||||
|
ark-poly-commit = "0.4.0" |
||||
|
folding-schemes = { path = "../folding-schemes/" } |
||||
|
itertools = "0.12.1" |
||||
|
ark-serialize = "0.4.1" |
||||
|
revm = "3.5.0" |
||||
|
|
||||
|
[dev-dependencies] |
||||
|
ark-crypto-primitives = "0.4.0" |
||||
|
ark-groth16 = "0.4" |
||||
|
ark-r1cs-std = "0.4.0" |
||||
|
ark-relations = "0.4.0" |
||||
|
revm = "3.5.0" |
||||
|
tracing = { version = "0.1", default-features = false, features = [ "attributes" ] } |
||||
|
tracing-subscriber = { version = "0.2" } |
||||
|
|
||||
|
[features] |
||||
|
default = ["parallel"] |
||||
|
|
||||
|
parallel = [ |
||||
|
"ark-std/parallel", |
||||
|
"ark-ff/parallel", |
||||
|
"ark-poly/parallel", |
||||
|
] |
||||
|
|
||||
|
|
||||
|
|
@ -0,0 +1,3 @@ |
|||||
|
# `folding-schemes-solidity` |
||||
|
|
||||
|
This crate implements templating logic to output verifier contracts for `folding-schemes`-generated decider proofs. |
@ -0,0 +1,3 @@ |
|||||
|
[[escaper]] |
||||
|
path = "askama::Text" |
||||
|
extensions = ["sol"] |
@ -0,0 +1,181 @@ |
|||||
|
pub use revm;
|
||||
|
use revm::{
|
||||
|
primitives::{hex, Address, CreateScheme, ExecutionResult, Output, TransactTo, TxEnv},
|
||||
|
InMemoryDB, EVM,
|
||||
|
};
|
||||
|
use std::{
|
||||
|
fmt::{self, Debug, Formatter},
|
||||
|
fs::{create_dir_all, File},
|
||||
|
io::{self, Write},
|
||||
|
process::{Command, Stdio},
|
||||
|
str,
|
||||
|
};
|
||||
|
|
||||
|
// from: https://github.com/privacy-scaling-explorations/halo2-solidity-verifier/blob/85cb77b171ce3ee493628007c7a1cfae2ea878e6/examples/separately.rs#L56
|
||||
|
pub fn save_solidity(name: impl AsRef<str>, solidity: &str) {
|
||||
|
const DIR_GENERATED: &str = "./generated";
|
||||
|
create_dir_all(DIR_GENERATED).unwrap();
|
||||
|
File::create(format!("{DIR_GENERATED}/{}", name.as_ref()))
|
||||
|
.unwrap()
|
||||
|
.write_all(solidity.as_bytes())
|
||||
|
.unwrap();
|
||||
|
}
|
||||
|
|
||||
|
/// Compile solidity with `--via-ir` flag, then return creation bytecode.
|
||||
|
///
|
||||
|
/// # Panics
|
||||
|
/// Panics if executable `solc` can not be found, or compilation fails.
|
||||
|
pub fn compile_solidity(solidity: impl AsRef<[u8]>, contract_name: &str) -> Vec<u8> {
|
||||
|
let mut process = match Command::new("solc")
|
||||
|
.stdin(Stdio::piped())
|
||||
|
.stdout(Stdio::piped())
|
||||
|
.stderr(Stdio::piped())
|
||||
|
.arg("--bin")
|
||||
|
.arg("--optimize")
|
||||
|
.arg("-")
|
||||
|
.spawn()
|
||||
|
{
|
||||
|
Ok(process) => process,
|
||||
|
Err(err) if err.kind() == io::ErrorKind::NotFound => {
|
||||
|
panic!("Command 'solc' not found");
|
||||
|
}
|
||||
|
Err(err) => {
|
||||
|
panic!("Failed to spawn process with command 'solc':\n{err}");
|
||||
|
}
|
||||
|
};
|
||||
|
process
|
||||
|
.stdin
|
||||
|
.take()
|
||||
|
.unwrap()
|
||||
|
.write_all(solidity.as_ref())
|
||||
|
.unwrap();
|
||||
|
let output = process.wait_with_output().unwrap();
|
||||
|
let stdout = str::from_utf8(&output.stdout).unwrap();
|
||||
|
if let Some(binary) = find_binary(stdout, contract_name) {
|
||||
|
binary
|
||||
|
} else {
|
||||
|
panic!(
|
||||
|
"Compilation fails:\n{}",
|
||||
|
str::from_utf8(&output.stderr).unwrap()
|
||||
|
)
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
/// Find binary from `stdout` with given `contract_name`.
|
||||
|
/// `contract_name` is provided since `solc` may compile multiple contracts or libraries.
|
||||
|
/// hence, we need to find the correct binary.
|
||||
|
fn find_binary(stdout: &str, contract_name: &str) -> Option<Vec<u8>> {
|
||||
|
let start_contract = stdout.find(contract_name)?;
|
||||
|
let stdout_contract = &stdout[start_contract..];
|
||||
|
let start = stdout_contract.find("Binary:")? + 8;
|
||||
|
Some(hex::decode(&stdout_contract[start..stdout_contract.len() - 1]).unwrap())
|
||||
|
}
|
||||
|
|
||||
|
/// Evm runner.
|
||||
|
pub struct Evm {
|
||||
|
evm: EVM<InMemoryDB>,
|
||||
|
}
|
||||
|
|
||||
|
impl Debug for Evm {
|
||||
|
fn fmt(&self, f: &mut Formatter<'_>) -> fmt::Result {
|
||||
|
let mut debug_struct = f.debug_struct("Evm");
|
||||
|
debug_struct
|
||||
|
.field("env", &self.evm.env)
|
||||
|
.field("db", &self.evm.db.as_ref().unwrap())
|
||||
|
.finish()
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
impl Default for Evm {
|
||||
|
fn default() -> Self {
|
||||
|
Self {
|
||||
|
evm: EVM {
|
||||
|
env: Default::default(),
|
||||
|
db: Some(Default::default()),
|
||||
|
},
|
||||
|
}
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
impl Evm {
|
||||
|
/// Return code_size of given address.
|
||||
|
///
|
||||
|
/// # Panics
|
||||
|
/// Panics if given address doesn't have bytecode.
|
||||
|
pub fn code_size(&mut self, address: Address) -> usize {
|
||||
|
self.evm.db.as_ref().unwrap().accounts[&address]
|
||||
|
.info
|
||||
|
.code
|
||||
|
.as_ref()
|
||||
|
.unwrap()
|
||||
|
.len()
|
||||
|
}
|
||||
|
|
||||
|
/// Apply create transaction with given `bytecode` as creation bytecode.
|
||||
|
/// Return created `address`.
|
||||
|
///
|
||||
|
/// # Panics
|
||||
|
/// Panics if execution reverts or halts unexpectedly.
|
||||
|
pub fn create(&mut self, bytecode: Vec<u8>) -> Address {
|
||||
|
let (_, output) = self.transact_success_or_panic(TxEnv {
|
||||
|
gas_limit: u64::MAX,
|
||||
|
transact_to: TransactTo::Create(CreateScheme::Create),
|
||||
|
data: bytecode.into(),
|
||||
|
..Default::default()
|
||||
|
});
|
||||
|
match output {
|
||||
|
Output::Create(_, Some(address)) => address,
|
||||
|
_ => unreachable!(),
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
/// Apply call transaction to given `address` with `calldata`.
|
||||
|
/// Returns `gas_used` and `return_data`.
|
||||
|
///
|
||||
|
/// # Panics
|
||||
|
/// Panics if execution reverts or halts unexpectedly.
|
||||
|
pub fn call(&mut self, address: Address, calldata: Vec<u8>) -> (u64, Vec<u8>) {
|
||||
|
let (gas_used, output) = self.transact_success_or_panic(TxEnv {
|
||||
|
gas_limit: u64::MAX,
|
||||
|
transact_to: TransactTo::Call(address),
|
||||
|
data: calldata.into(),
|
||||
|
..Default::default()
|
||||
|
});
|
||||
|
match output {
|
||||
|
Output::Call(output) => (gas_used, output.into()),
|
||||
|
_ => unreachable!(),
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
fn transact_success_or_panic(&mut self, tx: TxEnv) -> (u64, Output) {
|
||||
|
self.evm.env.tx = tx;
|
||||
|
let result = self.evm.transact_commit().unwrap();
|
||||
|
self.evm.env.tx = Default::default();
|
||||
|
match result {
|
||||
|
ExecutionResult::Success {
|
||||
|
gas_used,
|
||||
|
output,
|
||||
|
logs,
|
||||
|
..
|
||||
|
} => {
|
||||
|
if !logs.is_empty() {
|
||||
|
println!("--- logs from {} ---", logs[0].address);
|
||||
|
for (log_idx, log) in logs.iter().enumerate() {
|
||||
|
println!("log#{log_idx}");
|
||||
|
for (topic_idx, topic) in log.topics.iter().enumerate() {
|
||||
|
println!(" topic{topic_idx}: {topic:?}");
|
||||
|
}
|
||||
|
}
|
||||
|
println!("--- end ---");
|
||||
|
}
|
||||
|
(gas_used, output)
|
||||
|
}
|
||||
|
ExecutionResult::Revert { gas_used, output } => {
|
||||
|
panic!("Transaction reverts with gas_used {gas_used} and output {output:#x}")
|
||||
|
}
|
||||
|
ExecutionResult::Halt { reason, gas_used } => panic!(
|
||||
|
"Transaction halts unexpectedly with gas_used {gas_used} and reason {reason:?}"
|
||||
|
),
|
||||
|
}
|
||||
|
}
|
||||
|
}
|
@ -0,0 +1,5 @@ |
|||||
|
pub use evm::*;
|
||||
|
pub use verifiers::templates::*;
|
||||
|
mod evm;
|
||||
|
mod utils;
|
||||
|
mod verifiers;
|
@ -0,0 +1,43 @@ |
|||||
|
/// Defines encodings of G1 and G2 elements for use in Solidity templates.
|
||||
|
use ark_bn254::{Fq, G1Affine, G2Affine};
|
||||
|
use std::fmt::{self, Display};
|
||||
|
|
||||
|
#[derive(Debug, Default)]
|
||||
|
pub struct FqWrapper(pub Fq);
|
||||
|
|
||||
|
impl Display for FqWrapper {
|
||||
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
|
write!(f, "{}", self.0)
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
#[derive(Debug, Default)]
|
||||
|
pub struct G1Repr(pub [FqWrapper; 2]);
|
||||
|
|
||||
|
impl Display for G1Repr {
|
||||
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
|
write!(f, "{:#?}", self.0)
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
/// Converts a G1 element to a representation that can be used in Solidity templates.
|
||||
|
pub fn g1_to_fq_repr(g1: G1Affine) -> G1Repr {
|
||||
|
G1Repr([FqWrapper(g1.x), FqWrapper(g1.y)])
|
||||
|
}
|
||||
|
|
||||
|
#[derive(Debug, Default)]
|
||||
|
pub struct G2Repr(pub [[FqWrapper; 2]; 2]);
|
||||
|
|
||||
|
impl Display for G2Repr {
|
||||
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
||||
|
write!(f, "{:#?}", self.0)
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
/// Converts a G2 element to a representation that can be used in Solidity templates.
|
||||
|
pub fn g2_to_fq_repr(g2: G2Affine) -> G2Repr {
|
||||
|
G2Repr([
|
||||
|
[FqWrapper(g2.x.c0), FqWrapper(g2.x.c1)],
|
||||
|
[FqWrapper(g2.y.c0), FqWrapper(g2.y.c1)],
|
||||
|
])
|
||||
|
}
|
@ -0,0 +1 @@ |
|||||
|
pub mod encoding;
|
@ -0,0 +1,287 @@ |
|||||
|
pub mod templates;
|
||||
|
|
||||
|
#[cfg(test)]
|
||||
|
mod tests {
|
||||
|
use crate::evm::{compile_solidity, save_solidity, Evm};
|
||||
|
use crate::verifiers::templates::{Groth16Verifier, KZG10Verifier};
|
||||
|
use ark_bn254::{Bn254, Fr, G1Projective as G1};
|
||||
|
use ark_crypto_primitives::snark::{CircuitSpecificSetupSNARK, SNARK};
|
||||
|
use ark_ec::{AffineRepr, CurveGroup};
|
||||
|
use ark_ff::{BigInt, BigInteger, PrimeField};
|
||||
|
use ark_groth16::Groth16;
|
||||
|
use ark_poly_commit::kzg10::VerifierKey;
|
||||
|
use ark_r1cs_std::alloc::AllocVar;
|
||||
|
use ark_r1cs_std::eq::EqGadget;
|
||||
|
use ark_r1cs_std::fields::fp::FpVar;
|
||||
|
use ark_relations::r1cs::{ConstraintSynthesizer, ConstraintSystemRef, SynthesisError};
|
||||
|
use ark_std::rand::{RngCore, SeedableRng};
|
||||
|
use ark_std::Zero;
|
||||
|
use ark_std::{test_rng, UniformRand};
|
||||
|
use askama::Template;
|
||||
|
use folding_schemes::{
|
||||
|
commitment::{
|
||||
|
kzg::{KZGProver, KZGSetup, ProverKey},
|
||||
|
CommitmentProver,
|
||||
|
},
|
||||
|
transcript::{
|
||||
|
poseidon::{poseidon_test_config, PoseidonTranscript},
|
||||
|
Transcript,
|
||||
|
},
|
||||
|
};
|
||||
|
use itertools::chain;
|
||||
|
use std::marker::PhantomData;
|
||||
|
|
||||
|
// Function signatures for proof verification on kzg10 and groth16 contracts
|
||||
|
pub const FUNCTION_SIGNATURE_KZG10_CHECK: [u8; 4] = [0x9e, 0x78, 0xcc, 0xf7];
|
||||
|
pub const FUNCTION_SIGNATURE_GROTH16_VERIFY_PROOF: [u8; 4] = [0x43, 0x75, 0x3b, 0x4d];
|
||||
|
|
||||
|
// Pragma statements for verifiers
|
||||
|
pub const PRAGMA_GROTH16_VERIFIER: &str = "pragma solidity >=0.7.0 <0.9.0;"; // from snarkjs, avoid changing
|
||||
|
pub const PRAGMA_KZG10_VERIFIER: &str = "pragma solidity >=0.8.1 <=0.8.4;";
|
||||
|
|
||||
|
struct TestAddCircuit<F: PrimeField> {
|
||||
|
_f: PhantomData<F>,
|
||||
|
pub x: u8,
|
||||
|
pub y: u8,
|
||||
|
pub z: u8,
|
||||
|
}
|
||||
|
|
||||
|
impl<F: PrimeField> ConstraintSynthesizer<F> for TestAddCircuit<F> {
|
||||
|
fn generate_constraints(self, cs: ConstraintSystemRef<F>) -> Result<(), SynthesisError> {
|
||||
|
let x = FpVar::<F>::new_witness(cs.clone(), || Ok(F::from(self.x)))?;
|
||||
|
let y = FpVar::<F>::new_witness(cs.clone(), || Ok(F::from(self.y)))?;
|
||||
|
let z = FpVar::<F>::new_input(cs.clone(), || Ok(F::from(self.z)))?;
|
||||
|
let comp_z = x.clone() + y.clone();
|
||||
|
comp_z.enforce_equal(&z)?;
|
||||
|
Ok(())
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_groth16_kzg10_decider_template_renders() {
|
||||
|
let mut rng = ark_std::rand::rngs::StdRng::seed_from_u64(test_rng().next_u64());
|
||||
|
let (x, y, z) = (21, 21, 42);
|
||||
|
let (_, vk) = {
|
||||
|
let c = TestAddCircuit::<Fr> {
|
||||
|
_f: PhantomData,
|
||||
|
x,
|
||||
|
y,
|
||||
|
z,
|
||||
|
};
|
||||
|
Groth16::<Bn254>::setup(c, &mut rng).unwrap()
|
||||
|
};
|
||||
|
let groth16_template = Groth16Verifier::from(vk, None);
|
||||
|
let (pk, vk): (ProverKey<G1>, VerifierKey<Bn254>) = KZGSetup::<Bn254>::setup(&mut rng, 5);
|
||||
|
let kzg10_template = KZG10Verifier::from(&vk, &pk.powers_of_g[..5], None, None);
|
||||
|
let decider_template = super::templates::Groth16KZG10DeciderVerifier {
|
||||
|
groth16_verifier: groth16_template,
|
||||
|
kzg10_verifier: kzg10_template,
|
||||
|
};
|
||||
|
save_solidity("decider.sol", &decider_template.render().unwrap());
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_groth16_kzg10_decider_template_compiles() {
|
||||
|
let mut rng = ark_std::rand::rngs::StdRng::seed_from_u64(test_rng().next_u64());
|
||||
|
let (x, y, z) = (21, 21, 42);
|
||||
|
let (_, vk) = {
|
||||
|
let c = TestAddCircuit::<Fr> {
|
||||
|
_f: PhantomData,
|
||||
|
x,
|
||||
|
y,
|
||||
|
z,
|
||||
|
};
|
||||
|
Groth16::<Bn254>::setup(c, &mut rng).unwrap()
|
||||
|
};
|
||||
|
// we dont specify any pragma values for both verifiers, the pragma from the decider takes over
|
||||
|
let groth16_template = Groth16Verifier::from(vk, None);
|
||||
|
let (pk, vk): (ProverKey<G1>, VerifierKey<Bn254>) = KZGSetup::<Bn254>::setup(&mut rng, 5);
|
||||
|
let kzg10_template = KZG10Verifier::from(&vk, &pk.powers_of_g[..5], None, None);
|
||||
|
let decider_template = super::templates::Groth16KZG10DeciderVerifier {
|
||||
|
groth16_verifier: groth16_template,
|
||||
|
kzg10_verifier: kzg10_template,
|
||||
|
};
|
||||
|
let decider_verifier_bytecode =
|
||||
|
compile_solidity(decider_template.render().unwrap(), "NovaDecider");
|
||||
|
let mut evm = Evm::default();
|
||||
|
_ = evm.create(decider_verifier_bytecode);
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_groth16_verifier_template_renders() {
|
||||
|
let mut rng = ark_std::rand::rngs::StdRng::seed_from_u64(test_rng().next_u64());
|
||||
|
let (x, y, z) = (21, 21, 42);
|
||||
|
let (_, vk) = {
|
||||
|
let c = TestAddCircuit::<Fr> {
|
||||
|
_f: PhantomData,
|
||||
|
x,
|
||||
|
y,
|
||||
|
z,
|
||||
|
};
|
||||
|
Groth16::<Bn254>::setup(c, &mut rng).unwrap()
|
||||
|
};
|
||||
|
let template = Groth16Verifier::from(vk, Some(PRAGMA_GROTH16_VERIFIER.to_string()));
|
||||
|
save_solidity("groth16_verifier.sol", &template.render().unwrap());
|
||||
|
_ = template.render().unwrap();
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_groth16_verifier_template_compiles() {
|
||||
|
let mut rng = ark_std::rand::rngs::StdRng::seed_from_u64(test_rng().next_u64());
|
||||
|
let (x, y, z) = (21, 21, 42);
|
||||
|
let (_, vk) = {
|
||||
|
let c = TestAddCircuit::<Fr> {
|
||||
|
_f: PhantomData,
|
||||
|
x,
|
||||
|
y,
|
||||
|
z,
|
||||
|
};
|
||||
|
Groth16::<Bn254>::setup(c, &mut rng).unwrap()
|
||||
|
};
|
||||
|
let res = Groth16Verifier::from(vk, Some(PRAGMA_GROTH16_VERIFIER.to_string()))
|
||||
|
.render()
|
||||
|
.unwrap();
|
||||
|
let groth16_verifier_bytecode = compile_solidity(res, "Verifier");
|
||||
|
let mut evm = Evm::default();
|
||||
|
_ = evm.create(groth16_verifier_bytecode);
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_groth16_verifier_accepts_and_rejects_proofs() {
|
||||
|
let mut rng = ark_std::rand::rngs::StdRng::seed_from_u64(test_rng().next_u64());
|
||||
|
let (x, y, z) = (21, 21, 42);
|
||||
|
let (pk, vk) = {
|
||||
|
let c = TestAddCircuit::<Fr> {
|
||||
|
_f: PhantomData,
|
||||
|
x,
|
||||
|
y,
|
||||
|
z,
|
||||
|
};
|
||||
|
Groth16::<Bn254>::setup(c, &mut rng).unwrap()
|
||||
|
};
|
||||
|
let c = TestAddCircuit::<Fr> {
|
||||
|
_f: PhantomData,
|
||||
|
x,
|
||||
|
y,
|
||||
|
z,
|
||||
|
};
|
||||
|
let proof = Groth16::<Bn254>::prove(&pk, c, &mut rng).unwrap();
|
||||
|
let res = Groth16Verifier::from(vk, Some(PRAGMA_GROTH16_VERIFIER.to_string()))
|
||||
|
.render()
|
||||
|
.unwrap();
|
||||
|
save_solidity("groth16_verifier.sol", &res);
|
||||
|
let groth16_verifier_bytecode = compile_solidity(&res, "Verifier");
|
||||
|
let mut evm = Evm::default();
|
||||
|
let verifier_address = evm.create(groth16_verifier_bytecode);
|
||||
|
let (a_x, a_y) = proof.a.xy().unwrap();
|
||||
|
let (b_x, b_y) = proof.b.xy().unwrap();
|
||||
|
let (c_x, c_y) = proof.c.xy().unwrap();
|
||||
|
let mut calldata: Vec<u8> = chain![
|
||||
|
FUNCTION_SIGNATURE_GROTH16_VERIFY_PROOF,
|
||||
|
a_x.into_bigint().to_bytes_be(),
|
||||
|
a_y.into_bigint().to_bytes_be(),
|
||||
|
b_x.c1.into_bigint().to_bytes_be(),
|
||||
|
b_x.c0.into_bigint().to_bytes_be(),
|
||||
|
b_y.c1.into_bigint().to_bytes_be(),
|
||||
|
b_y.c0.into_bigint().to_bytes_be(),
|
||||
|
c_x.into_bigint().to_bytes_be(),
|
||||
|
c_y.into_bigint().to_bytes_be(),
|
||||
|
BigInt::from(Fr::from(z)).to_bytes_be(),
|
||||
|
]
|
||||
|
.collect();
|
||||
|
let (_, output) = evm.call(verifier_address, calldata.clone());
|
||||
|
assert_eq!(*output.last().unwrap(), 1);
|
||||
|
|
||||
|
// change calldata to make it invalid
|
||||
|
let last_calldata_element = calldata.last_mut().unwrap();
|
||||
|
*last_calldata_element = 0;
|
||||
|
let (_, output) = evm.call(verifier_address, calldata);
|
||||
|
assert_eq!(*output.last().unwrap(), 0);
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_kzg_verifier_template_renders() {
|
||||
|
let rng = &mut test_rng();
|
||||
|
let n = 10;
|
||||
|
let (pk, vk): (ProverKey<G1>, VerifierKey<Bn254>) = KZGSetup::<Bn254>::setup(rng, n);
|
||||
|
let template = KZG10Verifier::from(
|
||||
|
&vk,
|
||||
|
&pk.powers_of_g[..5],
|
||||
|
Some(PRAGMA_KZG10_VERIFIER.to_string()),
|
||||
|
None,
|
||||
|
);
|
||||
|
let res = template.render().unwrap();
|
||||
|
assert!(res.contains(&vk.g.x.to_string()));
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_kzg_verifier_compiles() {
|
||||
|
let rng = &mut test_rng();
|
||||
|
let n = 10;
|
||||
|
let (pk, vk): (ProverKey<G1>, VerifierKey<Bn254>) = KZGSetup::<Bn254>::setup(rng, n);
|
||||
|
let template = KZG10Verifier::from(
|
||||
|
&vk,
|
||||
|
&pk.powers_of_g[..5],
|
||||
|
Some(PRAGMA_KZG10_VERIFIER.to_string()),
|
||||
|
None,
|
||||
|
);
|
||||
|
let res = template.render().unwrap();
|
||||
|
let kzg_verifier_bytecode = compile_solidity(res, "KZG10");
|
||||
|
let mut evm = Evm::default();
|
||||
|
_ = evm.create(kzg_verifier_bytecode);
|
||||
|
}
|
||||
|
|
||||
|
#[test]
|
||||
|
fn test_kzg_verifier_accepts_and_rejects_proofs() {
|
||||
|
let rng = &mut test_rng();
|
||||
|
let poseidon_config = poseidon_test_config::<Fr>();
|
||||
|
let transcript_p = &mut PoseidonTranscript::<G1>::new(&poseidon_config);
|
||||
|
let transcript_v = &mut PoseidonTranscript::<G1>::new(&poseidon_config);
|
||||
|
|
||||
|
let n = 10;
|
||||
|
let (pk, vk): (ProverKey<G1>, VerifierKey<Bn254>) = KZGSetup::<Bn254>::setup(rng, n);
|
||||
|
let v: Vec<Fr> = std::iter::repeat_with(|| Fr::rand(rng)).take(n).collect();
|
||||
|
let cm = KZGProver::<G1>::commit(&pk, &v, &Fr::zero()).unwrap();
|
||||
|
let (eval, proof) =
|
||||
|
KZGProver::<G1>::prove(&pk, transcript_p, &cm, &v, &Fr::zero()).unwrap();
|
||||
|
let template = KZG10Verifier::from(
|
||||
|
&vk,
|
||||
|
&pk.powers_of_g[..5],
|
||||
|
Some(PRAGMA_KZG10_VERIFIER.to_string()),
|
||||
|
None,
|
||||
|
);
|
||||
|
let res = template.render().unwrap();
|
||||
|
let kzg_verifier_bytecode = compile_solidity(res, "KZG10");
|
||||
|
let mut evm = Evm::default();
|
||||
|
let verifier_address = evm.create(kzg_verifier_bytecode);
|
||||
|
|
||||
|
let (cm_affine, proof_affine) = (cm.into_affine(), proof.into_affine());
|
||||
|
let (x_comm, y_comm) = cm_affine.xy().unwrap();
|
||||
|
let (x_proof, y_proof) = proof_affine.xy().unwrap();
|
||||
|
let y = eval.into_bigint().to_bytes_be();
|
||||
|
|
||||
|
transcript_v.absorb_point(&cm).unwrap();
|
||||
|
let x = transcript_v.get_challenge();
|
||||
|
|
||||
|
let x = x.into_bigint().to_bytes_be();
|
||||
|
let mut calldata: Vec<u8> = chain![
|
||||
|
FUNCTION_SIGNATURE_KZG10_CHECK,
|
||||
|
x_comm.into_bigint().to_bytes_be(),
|
||||
|
y_comm.into_bigint().to_bytes_be(),
|
||||
|
x_proof.into_bigint().to_bytes_be(),
|
||||
|
y_proof.into_bigint().to_bytes_be(),
|
||||
|
x.clone(),
|
||||
|
y,
|
||||
|
]
|
||||
|
.collect();
|
||||
|
|
||||
|
let (_, output) = evm.call(verifier_address, calldata.clone());
|
||||
|
assert_eq!(*output.last().unwrap(), 1);
|
||||
|
|
||||
|
// change calldata to make it invalid
|
||||
|
let last_calldata_element = calldata.last_mut().unwrap();
|
||||
|
*last_calldata_element = 0;
|
||||
|
let (_, output) = evm.call(verifier_address, calldata);
|
||||
|
assert_eq!(*output.last().unwrap(), 0);
|
||||
|
}
|
||||
|
}
|
@ -0,0 +1,113 @@ |
|||||
|
use std::ops::Deref;
|
||||
|
|
||||
|
use crate::utils::encoding::{g1_to_fq_repr, g2_to_fq_repr};
|
||||
|
/// Solidity templates for the verifier contracts.
|
||||
|
/// We use askama for templating and define which variables are required for each template.
|
||||
|
use crate::utils::encoding::{G1Repr, G2Repr};
|
||||
|
use ark_bn254::{Bn254, G1Affine};
|
||||
|
use ark_groth16::VerifyingKey;
|
||||
|
use ark_poly_commit::kzg10::VerifierKey;
|
||||
|
use askama::Template;
|
||||
|
|
||||
|
#[derive(Template, Default)]
|
||||
|
#[template(path = "groth16_verifier.askama.sol", ext = "sol")]
|
||||
|
pub struct Groth16Verifier {
|
||||
|
/// SPDX-License-Identifier
|
||||
|
pub sdpx: String,
|
||||
|
/// The `pragma` statement.
|
||||
|
pub pragma_version: String,
|
||||
|
/// The `alpha * G`, where `G` is the generator of `G1`.
|
||||
|
pub vkey_alpha_g1: G1Repr,
|
||||
|
/// The `alpha * H`, where `H` is the generator of `G2`.
|
||||
|
pub vkey_beta_g2: G2Repr,
|
||||
|
/// The `gamma * H`, where `H` is the generator of `G2`.
|
||||
|
pub vkey_gamma_g2: G2Repr,
|
||||
|
/// The `delta * H`, where `H` is the generator of `G2`.
|
||||
|
pub vkey_delta_g2: G2Repr,
|
||||
|
/// Length of the `gamma_abc_g1` vector.
|
||||
|
pub gamma_abc_len: usize,
|
||||
|
/// The `gamma^{-1} * (beta * a_i + alpha * b_i + c_i) * H`, where `H` is the generator of `E::G1`.
|
||||
|
pub gamma_abc_g1: Vec<G1Repr>,
|
||||
|
}
|
||||
|
|
||||
|
impl Groth16Verifier {
|
||||
|
pub fn from(value: VerifyingKey<Bn254>, pragma: Option<String>) -> Self {
|
||||
|
let pragma_version = pragma.unwrap_or_default();
|
||||
|
let sdpx = "// SPDX-License-Identifier: GPL-3.0".to_string();
|
||||
|
Self {
|
||||
|
pragma_version,
|
||||
|
sdpx,
|
||||
|
vkey_alpha_g1: g1_to_fq_repr(value.alpha_g1),
|
||||
|
vkey_beta_g2: g2_to_fq_repr(value.beta_g2),
|
||||
|
vkey_gamma_g2: g2_to_fq_repr(value.gamma_g2),
|
||||
|
vkey_delta_g2: g2_to_fq_repr(value.delta_g2),
|
||||
|
gamma_abc_len: value.gamma_abc_g1.len(),
|
||||
|
gamma_abc_g1: value
|
||||
|
.gamma_abc_g1
|
||||
|
.iter()
|
||||
|
.copied()
|
||||
|
.map(g1_to_fq_repr)
|
||||
|
.collect(),
|
||||
|
}
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
#[derive(Template, Default)]
|
||||
|
#[template(path = "kzg10_verifier.askama.sol", ext = "sol")]
|
||||
|
pub struct KZG10Verifier {
|
||||
|
/// SPDX-License-Identifier
|
||||
|
pub sdpx: String,
|
||||
|
/// The `pragma` statement.
|
||||
|
pub pragma_version: String,
|
||||
|
/// The generator of `G1`.
|
||||
|
pub g1: G1Repr,
|
||||
|
/// The generator of `G2`.
|
||||
|
pub g2: G2Repr,
|
||||
|
/// The verification key
|
||||
|
pub vk: G2Repr,
|
||||
|
/// Length of the trusted setup vector.
|
||||
|
pub g1_crs_len: usize,
|
||||
|
/// The trusted setup vector.
|
||||
|
pub g1_crs: Vec<G1Repr>,
|
||||
|
}
|
||||
|
|
||||
|
impl KZG10Verifier {
|
||||
|
pub fn from(
|
||||
|
vk: &VerifierKey<Bn254>,
|
||||
|
crs: &[G1Affine],
|
||||
|
pragma: Option<String>,
|
||||
|
sdpx: Option<String>,
|
||||
|
) -> KZG10Verifier {
|
||||
|
let g1_string_repr = g1_to_fq_repr(vk.g);
|
||||
|
let g2_string_repr = g2_to_fq_repr(vk.h);
|
||||
|
let vk_string_repr = g2_to_fq_repr(vk.beta_h);
|
||||
|
let g1_crs_len = crs.len();
|
||||
|
let g1_crs = crs.iter().map(|g1| g1_to_fq_repr(*g1)).collect();
|
||||
|
let sdpx = sdpx.unwrap_or_default();
|
||||
|
let pragma_version = pragma.unwrap_or_default();
|
||||
|
KZG10Verifier {
|
||||
|
sdpx,
|
||||
|
pragma_version,
|
||||
|
g1: g1_string_repr,
|
||||
|
g2: g2_string_repr,
|
||||
|
vk: vk_string_repr,
|
||||
|
g1_crs,
|
||||
|
g1_crs_len,
|
||||
|
}
|
||||
|
}
|
||||
|
}
|
||||
|
|
||||
|
#[derive(Template)]
|
||||
|
#[template(path = "kzg10_groth16_decider_verifier.askama.sol", ext = "sol")]
|
||||
|
pub struct Groth16KZG10DeciderVerifier {
|
||||
|
pub groth16_verifier: Groth16Verifier,
|
||||
|
pub kzg10_verifier: KZG10Verifier,
|
||||
|
}
|
||||
|
|
||||
|
impl Deref for Groth16KZG10DeciderVerifier {
|
||||
|
type Target = Groth16Verifier;
|
||||
|
|
||||
|
fn deref(&self) -> &Self::Target {
|
||||
|
&self.groth16_verifier
|
||||
|
}
|
||||
|
}
|
@ -0,0 +1,172 @@ |
|||||
|
{{ sdpx }} |
||||
|
/* |
||||
|
Copyright 2021 0KIMS association. |
||||
|
|
||||
|
* `folding-schemes-solidity` added comment |
||||
|
This file is a template built out of [snarkJS](https://github.com/iden3/snarkjs) groth16 verifier. |
||||
|
See the original ejs template [here](https://github.com/iden3/snarkjs/blob/master/templates/verifier_groth16.sol.ejs) |
||||
|
* |
||||
|
|
||||
|
snarkJS is a free software: you can redistribute it and/or modify it |
||||
|
under the terms of the GNU General Public License as published by |
||||
|
the Free Software Foundation, either version 3 of the License, or |
||||
|
(at your option) any later version. |
||||
|
|
||||
|
snarkJS is distributed in the hope that it will be useful, but WITHOUT |
||||
|
ANY WARRANTY; without even the implied warranty of MERCHANTABILITY |
||||
|
or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public |
||||
|
License for more details. |
||||
|
|
||||
|
You should have received a copy of the GNU General Public License |
||||
|
along with snarkJS. If not, see <https://www.gnu.org/licenses/>. |
||||
|
*/ |
||||
|
|
||||
|
{{ pragma_version }} |
||||
|
|
||||
|
contract Groth16Verifier { |
||||
|
// Scalar field size |
||||
|
uint256 constant r = 21888242871839275222246405745257275088548364400416034343698204186575808495617; |
||||
|
// Base field size |
||||
|
uint256 constant q = 21888242871839275222246405745257275088696311157297823662689037894645226208583; |
||||
|
|
||||
|
// Verification Key data |
||||
|
uint256 constant alphax = {{ vkey_alpha_g1.0[0] }}; |
||||
|
uint256 constant alphay = {{ vkey_alpha_g1.0[1] }}; |
||||
|
uint256 constant betax1 = {{ vkey_beta_g2.0[0][1] }}; |
||||
|
uint256 constant betax2 = {{ vkey_beta_g2.0[0][0] }}; |
||||
|
uint256 constant betay1 = {{ vkey_beta_g2.0[1][1] }}; |
||||
|
uint256 constant betay2 = {{ vkey_beta_g2.0[1][0] }}; |
||||
|
uint256 constant gammax1 = {{ vkey_gamma_g2.0[0][1] }}; |
||||
|
uint256 constant gammax2 = {{ vkey_gamma_g2.0[0][0] }}; |
||||
|
uint256 constant gammay1 = {{ vkey_gamma_g2.0[1][1] }}; |
||||
|
uint256 constant gammay2 = {{ vkey_gamma_g2.0[1][0] }}; |
||||
|
uint256 constant deltax1 = {{ vkey_delta_g2.0[0][1] }}; |
||||
|
uint256 constant deltax2 = {{ vkey_delta_g2.0[0][0] }}; |
||||
|
uint256 constant deltay1 = {{ vkey_delta_g2.0[1][1] }}; |
||||
|
uint256 constant deltay2 = {{ vkey_delta_g2.0[1][0] }}; |
||||
|
|
||||
|
{% for (i, point) in gamma_abc_g1.iter().enumerate() %} |
||||
|
uint256 constant IC{{i}}x = {{ point.0[0] }}; |
||||
|
uint256 constant IC{{i}}y = {{ point.0[1] }}; |
||||
|
{% endfor %} |
||||
|
|
||||
|
// Memory data |
||||
|
uint16 constant pVk = 0; |
||||
|
uint16 constant pPairing = 128; |
||||
|
|
||||
|
uint16 constant pLastMem = 896; |
||||
|
|
||||
|
function verifyProof(uint[2] calldata _pA, uint[2][2] calldata _pB, uint[2] calldata _pC, uint[{{ gamma_abc_len - 1 }}] calldata _pubSignals) public view returns (bool) { |
||||
|
assembly { |
||||
|
function checkField(v) { |
||||
|
if iszero(lt(v, q)) { |
||||
|
mstore(0, 0) |
||||
|
return(0, 0x20) |
||||
|
} |
||||
|
} |
||||
|
|
||||
|
// G1 function to multiply a G1 value(x,y) to value in an address |
||||
|
function g1_mulAccC(pR, x, y, s) { |
||||
|
let success |
||||
|
let mIn := mload(0x40) |
||||
|
mstore(mIn, x) |
||||
|
mstore(add(mIn, 32), y) |
||||
|
mstore(add(mIn, 64), s) |
||||
|
|
||||
|
success := staticcall(sub(gas(), 2000), 7, mIn, 96, mIn, 64) |
||||
|
|
||||
|
if iszero(success) { |
||||
|
mstore(0, 0) |
||||
|
return(0, 0x20) |
||||
|
} |
||||
|
|
||||
|
mstore(add(mIn, 64), mload(pR)) |
||||
|
mstore(add(mIn, 96), mload(add(pR, 32))) |
||||
|
|
||||
|
success := staticcall(sub(gas(), 2000), 6, mIn, 128, pR, 64) |
||||
|
|
||||
|
if iszero(success) { |
||||
|
mstore(0, 0) |
||||
|
return(0, 0x20) |
||||
|
} |
||||
|
} |
||||
|
|
||||
|
function checkPairing(pA, pB, pC, pubSignals, pMem) -> isOk { |
||||
|
let _pPairing := add(pMem, pPairing) |
||||
|
let _pVk := add(pMem, pVk) |
||||
|
|
||||
|
mstore(_pVk, IC0x) |
||||
|
mstore(add(_pVk, 32), IC0y) |
||||
|
|
||||
|
// Compute the linear combination vk_x |
||||
|
{% for (i, _) in gamma_abc_g1.iter().enumerate() %} |
||||
|
{% if loop.first -%} |
||||
|
{%- else -%} |
||||
|
g1_mulAccC(_pVk, IC{{i}}x, IC{{i}}y, calldataload(add(pubSignals, {{(i-1)*32}}))) |
||||
|
{%- endif -%} |
||||
|
{% endfor %} |
||||
|
|
||||
|
// -A |
||||
|
mstore(_pPairing, calldataload(pA)) |
||||
|
mstore(add(_pPairing, 32), mod(sub(q, calldataload(add(pA, 32))), q)) |
||||
|
|
||||
|
// B |
||||
|
mstore(add(_pPairing, 64), calldataload(pB)) |
||||
|
mstore(add(_pPairing, 96), calldataload(add(pB, 32))) |
||||
|
mstore(add(_pPairing, 128), calldataload(add(pB, 64))) |
||||
|
mstore(add(_pPairing, 160), calldataload(add(pB, 96))) |
||||
|
|
||||
|
// alpha1 |
||||
|
mstore(add(_pPairing, 192), alphax) |
||||
|
mstore(add(_pPairing, 224), alphay) |
||||
|
|
||||
|
// beta2 |
||||
|
mstore(add(_pPairing, 256), betax1) |
||||
|
mstore(add(_pPairing, 288), betax2) |
||||
|
mstore(add(_pPairing, 320), betay1) |
||||
|
mstore(add(_pPairing, 352), betay2) |
||||
|
|
||||
|
// vk_x |
||||
|
mstore(add(_pPairing, 384), mload(add(pMem, pVk))) |
||||
|
mstore(add(_pPairing, 416), mload(add(pMem, add(pVk, 32)))) |
||||
|
|
||||
|
|
||||
|
// gamma2 |
||||
|
mstore(add(_pPairing, 448), gammax1) |
||||
|
mstore(add(_pPairing, 480), gammax2) |
||||
|
mstore(add(_pPairing, 512), gammay1) |
||||
|
mstore(add(_pPairing, 544), gammay2) |
||||
|
|
||||
|
// C |
||||
|
mstore(add(_pPairing, 576), calldataload(pC)) |
||||
|
mstore(add(_pPairing, 608), calldataload(add(pC, 32))) |
||||
|
|
||||
|
// delta2 |
||||
|
mstore(add(_pPairing, 640), deltax1) |
||||
|
mstore(add(_pPairing, 672), deltax2) |
||||
|
mstore(add(_pPairing, 704), deltay1) |
||||
|
mstore(add(_pPairing, 736), deltay2) |
||||
|
|
||||
|
|
||||
|
let success := staticcall(sub(gas(), 2000), 8, _pPairing, 768, _pPairing, 0x20) |
||||
|
|
||||
|
isOk := and(success, mload(_pPairing)) |
||||
|
} |
||||
|
|
||||
|
let pMem := mload(0x40) |
||||
|
mstore(0x40, add(pMem, pLastMem)) |
||||
|
|
||||
|
// Validate that all evaluations ∈ F |
||||
|
{% for (i, _) in gamma_abc_g1.iter().enumerate() %} |
||||
|
checkField(calldataload(add(_pubSignals, {{i*32}}))) |
||||
|
{% endfor %} |
||||
|
|
||||
|
// Validate all evaluations |
||||
|
let isValid := checkPairing(_pA, _pB, _pC, _pubSignals, pMem) |
||||
|
|
||||
|
mstore(0, isValid) |
||||
|
|
||||
|
return(0, 0x20) |
||||
|
} |
||||
|
} |
||||
|
} |
@ -0,0 +1,20 @@ |
|||||
|
pragma solidity ^0.8.4; |
||||
|
|
||||
|
{{ groth16_verifier }} |
||||
|
|
||||
|
{{ kzg10_verifier }} |
||||
|
|
||||
|
/** |
||||
|
* @author PSE & 0xPARC |
||||
|
* @title NovaDecider contract, for verifying zk-snarks Nova IVC proofs. |
||||
|
* @dev This is an askama template. It will feature a snarkjs groth16 and a kzg10 verifier, from which this contract inherits. |
||||
|
*/ |
||||
|
contract NovaDecider is Groth16Verifier, KZG10Verifier { |
||||
|
function verifyProof(uint[2] calldata _pA, uint[2][2] calldata _pB, uint[2] calldata _pC, uint[{{ gamma_abc_len - 1 }}] calldata _pubSignals, uint256[2] calldata c, uint256[2] calldata pi, uint256 x, uint256 y) public view returns (bool) { |
||||
|
require(super.verifyProof(_pA, _pB, _pC, _pubSignals) == true, "Groth16 verification failed"); |
||||
|
// for now, we do not relate the Groth16 and KZG10 proofs |
||||
|
// this will done in the future, by computing challenge points from the groth16 proof's data |
||||
|
require(super.check(c, pi, x, y) == true, "KZG10 verification failed"); |
||||
|
return true; |
||||
|
} |
||||
|
} |
@ -0,0 +1,275 @@ |
|||||
|
{{ sdpx }} |
||||
|
|
||||
|
{{ pragma_version }} |
||||
|
|
||||
|
/** |
||||
|
* @author Privacy and Scaling Explorations team - pse.dev |
||||
|
* @dev Contains utility functions for ops in BN254; in G_1 mostly. |
||||
|
* @notice Forked from https://github.com/weijiekoh/libkzg/tree/master. |
||||
|
* Among others, a few of the changes we did on this fork were: |
||||
|
* - Templating the pragma version |
||||
|
* - Removing type wrappers and use uints instead |
||||
|
* - Performing changes on arg types |
||||
|
* - Update some of the `require` statements |
||||
|
* - Use the bn254 scalar field instead of checking for overflow on the babyjub prime |
||||
|
* - In batch checking, we compute auxiliary polynomials and their commitments at the same time. |
||||
|
*/ |
||||
|
contract KZG10Verifier { |
||||
|
|
||||
|
// prime of field F_p over which y^2 = x^3 + 3 is defined |
||||
|
uint256 public constant BN254_PRIME_FIELD = |
||||
|
21888242871839275222246405745257275088696311157297823662689037894645226208583; |
||||
|
uint256 public constant BN254_SCALAR_FIELD = |
||||
|
21888242871839275222246405745257275088548364400416034343698204186575808495617; |
||||
|
|
||||
|
/** |
||||
|
* @notice Performs scalar multiplication in G_1. |
||||
|
* @param p G_1 point to multiply |
||||
|
* @param s Scalar to multiply by |
||||
|
* @return r G_1 point p multiplied by scalar s |
||||
|
*/ |
||||
|
function mulScalar(uint256[2] memory p, uint256 s) internal view returns (uint256[2] memory r) { |
||||
|
uint256[3] memory input; |
||||
|
input[0] = p[0]; |
||||
|
input[1] = p[1]; |
||||
|
input[2] = s; |
||||
|
bool success; |
||||
|
assembly { |
||||
|
success := staticcall(sub(gas(), 2000), 7, input, 0x60, r, 0x40) |
||||
|
switch success |
||||
|
case 0 { invalid() } |
||||
|
} |
||||
|
require(success, "bn254: scalar mul failed"); |
||||
|
} |
||||
|
|
||||
|
/** |
||||
|
* @notice Negates a point in G_1. |
||||
|
* @param p G_1 point to negate |
||||
|
* @return uint256[2] G_1 point -p |
||||
|
*/ |
||||
|
function negate(uint256[2] memory p) internal pure returns (uint256[2] memory) { |
||||
|
if (p[0] == 0 && p[1] == 0) { |
||||
|
return p; |
||||
|
} |
||||
|
return [p[0], BN254_PRIME_FIELD - (p[1] % BN254_PRIME_FIELD)]; |
||||
|
} |
||||
|
|
||||
|
/** |
||||
|
* @notice Adds two points in G_1. |
||||
|
* @param p1 G_1 point 1 |
||||
|
* @param p2 G_1 point 2 |
||||
|
* @return r G_1 point p1 + p2 |
||||
|
*/ |
||||
|
function add(uint256[2] memory p1, uint256[2] memory p2) internal view returns (uint256[2] memory r) { |
||||
|
bool success; |
||||
|
uint256[4] memory input = [p1[0], p1[1], p2[0], p2[1]]; |
||||
|
assembly { |
||||
|
success := staticcall(sub(gas(), 2000), 6, input, 0x80, r, 0x40) |
||||
|
switch success |
||||
|
case 0 { invalid() } |
||||
|
} |
||||
|
|
||||
|
require(success, "bn254: point add failed"); |
||||
|
} |
||||
|
|
||||
|
/** |
||||
|
* @notice Computes the pairing check e(p1, p2) * e(p3, p4) == 1 |
||||
|
* @dev Note that G_2 points a*i + b are encoded as two elements of F_p, (a, b) |
||||
|
* @param a_1 G_1 point 1 |
||||
|
* @param a_2 G_2 point 1 |
||||
|
* @param b_1 G_1 point 2 |
||||
|
* @param b_2 G_2 point 2 |
||||
|
* @return result true if pairing check is successful |
||||
|
*/ |
||||
|
function pairing(uint256[2] memory a_1, uint256[2][2] memory a_2, uint256[2] memory b_1, uint256[2][2] memory b_2) |
||||
|
internal |
||||
|
view |
||||
|
returns (bool result) |
||||
|
{ |
||||
|
uint256[12] memory input = [ |
||||
|
a_1[0], |
||||
|
a_1[1], |
||||
|
a_2[0][1], // imaginary part first |
||||
|
a_2[0][0], |
||||
|
a_2[1][1], // imaginary part first |
||||
|
a_2[1][0], |
||||
|
b_1[0], |
||||
|
b_1[1], |
||||
|
b_2[0][1], // imaginary part first |
||||
|
b_2[0][0], |
||||
|
b_2[1][1], // imaginary part first |
||||
|
b_2[1][0] |
||||
|
]; |
||||
|
|
||||
|
uint256[1] memory out; |
||||
|
bool success; |
||||
|
|
||||
|
assembly { |
||||
|
success := staticcall(sub(gas(), 2000), 8, input, 0x180, out, 0x20) |
||||
|
switch success |
||||
|
case 0 { invalid() } |
||||
|
} |
||||
|
|
||||
|
require(success, "bn254: pairing failed"); |
||||
|
|
||||
|
return out[0] == 1; |
||||
|
} |
||||
|
|
||||
|
uint256[2] G_1 = [ |
||||
|
{{ g1.0[0] }}, |
||||
|
{{ g1.0[1] }} |
||||
|
]; |
||||
|
uint256[2][2] G_2 = [ |
||||
|
[ |
||||
|
{{ g2.0[0][0] }}, |
||||
|
{{ g2.0[0][1] }} |
||||
|
], |
||||
|
[ |
||||
|
{{ g2.0[1][0] }}, |
||||
|
{{ g2.0[1][1] }} |
||||
|
] |
||||
|
]; |
||||
|
uint256[2][2] VK = [ |
||||
|
[ |
||||
|
{{ vk.0[0][0] }}, |
||||
|
{{ vk.0[0][1] }} |
||||
|
], |
||||
|
[ |
||||
|
{{ vk.0[1][0] }}, |
||||
|
{{ vk.0[1][1] }} |
||||
|
] |
||||
|
]; |
||||
|
|
||||
|
uint256[2][{{ g1_crs_len }}] G1_CRS = [ |
||||
|
{%- for (i, point) in g1_crs.iter().enumerate() %} |
||||
|
[ |
||||
|
{{ point.0[0] }}, |
||||
|
{{ point.0[1] }} |
||||
|
{% if loop.last -%} |
||||
|
] |
||||
|
{%- else -%} |
||||
|
], |
||||
|
{%- endif -%} |
||||
|
{% endfor -%} |
||||
|
]; |
||||
|
|
||||
|
/** |
||||
|
* @notice Verifies a single point evaluation proof. Function name follows `ark-poly`. |
||||
|
* @dev To avoid ops in G_2, we slightly tweak how the verification is done. |
||||
|
* @param c G_1 point commitment to polynomial. |
||||
|
* @param pi G_1 point proof. |
||||
|
* @param x Value to prove evaluation of polynomial at. |
||||
|
* @param y Evaluation poly(x). |
||||
|
* @return result Indicates if KZG proof is correct. |
||||
|
*/ |
||||
|
function check(uint256[2] calldata c, uint256[2] calldata pi, uint256 x, uint256 y) |
||||
|
public |
||||
|
view |
||||
|
returns (bool result) |
||||
|
{ |
||||
|
// |
||||
|
// we want to: |
||||
|
// 1. avoid gas intensive ops in G2 |
||||
|
// 2. format the pairing check in line with what the evm opcode expects. |
||||
|
// |
||||
|
// we can do this by tweaking the KZG check to be: |
||||
|
// |
||||
|
// e(pi, vk - x * g2) = e(c - y * g1, g2) [initial check] |
||||
|
// e(pi, vk - x * g2) * e(c - y * g1, g2)^{-1} = 1 |
||||
|
// e(pi, vk - x * g2) * e(-c + y * g1, g2) = 1 [bilinearity of pairing for all subsequent steps] |
||||
|
// e(pi, vk) * e(pi, -x * g2) * e(-c + y * g1, g2) = 1 |
||||
|
// e(pi, vk) * e(-x * pi, g2) * e(-c + y * g1, g2) = 1 |
||||
|
// e(pi, vk) * e(x * -pi - c + y * g1, g2) = 1 [done] |
||||
|
// |_ rhs_pairing _| |
||||
|
// |
||||
|
uint256[2] memory rhs_pairing = |
||||
|
add(mulScalar(negate(pi), x), add(negate(c), mulScalar(G_1, y))); |
||||
|
return pairing(pi, VK, rhs_pairing, G_2); |
||||
|
} |
||||
|
|
||||
|
function evalPolyAt(uint256[] memory _coefficients, uint256 _index) public pure returns (uint256) { |
||||
|
uint256 m = BN254_SCALAR_FIELD; |
||||
|
uint256 result = 0; |
||||
|
uint256 powerOfX = 1; |
||||
|
|
||||
|
for (uint256 i = 0; i < _coefficients.length; i++) { |
||||
|
uint256 coeff = _coefficients[i]; |
||||
|
assembly { |
||||
|
result := addmod(result, mulmod(powerOfX, coeff, m), m) |
||||
|
powerOfX := mulmod(powerOfX, _index, m) |
||||
|
} |
||||
|
} |
||||
|
return result; |
||||
|
} |
||||
|
|
||||
|
/** |
||||
|
* @notice Ensures that z(x) == 0 and l(x) == y for all x in x_vals and y in y_vals. It returns the commitment to z(x) and l(x). |
||||
|
* @param z_coeffs coefficients of the zero polynomial z(x) = (x - x_1)(x - x_2)...(x - x_n). |
||||
|
* @param l_coeffs coefficients of the lagrange polynomial l(x). |
||||
|
* @param x_vals x values to evaluate the polynomials at. |
||||
|
* @param y_vals y values to which l(x) should evaluate to. |
||||
|
* @return uint256[2] commitment to z(x). |
||||
|
* @return uint256[2] commitment to l(x). |
||||
|
*/ |
||||
|
function checkAndCommitAuxPolys( |
||||
|
uint256[] memory z_coeffs, |
||||
|
uint256[] memory l_coeffs, |
||||
|
uint256[] memory x_vals, |
||||
|
uint256[] memory y_vals |
||||
|
) public view returns (uint256[2] memory, uint256[2] memory) { |
||||
|
// z(x) is of degree len(x_vals), it is a product of linear polynomials (x - x_i) |
||||
|
// l(x) is of degree len(x_vals) - 1 |
||||
|
uint256[2] memory z_commit; |
||||
|
uint256[2] memory l_commit; |
||||
|
for (uint256 i = 0; i < x_vals.length; i++) { |
||||
|
z_commit = add(z_commit, mulScalar(G1_CRS[i], z_coeffs[i])); // update commitment to z(x) |
||||
|
l_commit = add(l_commit, mulScalar(G1_CRS[i], l_coeffs[i])); // update commitment to l(x) |
||||
|
|
||||
|
uint256 eval_z = evalPolyAt(z_coeffs, x_vals[i]); |
||||
|
uint256 eval_l = evalPolyAt(l_coeffs, x_vals[i]); |
||||
|
|
||||
|
require(eval_z == 0, "checkAndCommitAuxPolys: wrong zero poly"); |
||||
|
require(eval_l == y_vals[i], "checkAndCommitAuxPolys: wrong lagrange poly"); |
||||
|
} |
||||
|
// z(x) has len(x_vals) + 1 coeffs, we add to the commmitment the last coeff of z(x) |
||||
|
z_commit = add(z_commit, mulScalar(G1_CRS[z_coeffs.length - 1], z_coeffs[z_coeffs.length - 1])); |
||||
|
|
||||
|
return (z_commit, l_commit); |
||||
|
} |
||||
|
|
||||
|
/** |
||||
|
* @notice Verifies a batch of point evaluation proofs. Function name follows `ark-poly`. |
||||
|
* @dev To avoid ops in G_2, we slightly tweak how the verification is done. |
||||
|
* @param c G1 point commitment to polynomial. |
||||
|
* @param pi G2 point proof. |
||||
|
* @param x_vals Values to prove evaluation of polynomial at. |
||||
|
* @param y_vals Evaluation poly(x). |
||||
|
* @param l_coeffs Coefficients of the lagrange polynomial. |
||||
|
* @param z_coeffs Coefficients of the zero polynomial z(x) = (x - x_1)(x - x_2)...(x - x_n). |
||||
|
* @return result Indicates if KZG proof is correct. |
||||
|
*/ |
||||
|
function batchCheck( |
||||
|
uint256[2] calldata c, |
||||
|
uint256[2][2] calldata pi, |
||||
|
uint256[] calldata x_vals, |
||||
|
uint256[] calldata y_vals, |
||||
|
uint256[] calldata l_coeffs, |
||||
|
uint256[] calldata z_coeffs |
||||
|
) public view returns (bool result) { |
||||
|
// |
||||
|
// we want to: |
||||
|
// 1. avoid gas intensive ops in G2 |
||||
|
// 2. format the pairing check in line with what the evm opcode expects. |
||||
|
// |
||||
|
// we can do this by tweaking the KZG check to be: |
||||
|
// |
||||
|
// e(z(r) * g1, pi) * e(g1, l(r) * g2) = e(c, g2) [initial check] |
||||
|
// e(z(r) * g1, pi) * e(l(r) * g1, g2) * e(c, g2)^{-1} = 1 [bilinearity of pairing] |
||||
|
// e(z(r) * g1, pi) * e(l(r) * g1 - c, g2) = 1 [done] |
||||
|
// |
||||
|
(uint256[2] memory z_commit, uint256[2] memory l_commit) = |
||||
|
checkAndCommitAuxPolys(z_coeffs, l_coeffs, x_vals, y_vals); |
||||
|
uint256[2] memory neg_commit = negate(c); |
||||
|
return pairing(z_commit, pi, add(l_commit, neg_commit), G_2); |
||||
|
} |
||||
|
} |
@ -0,0 +1,48 @@ |
|||||
|
[package] |
||||
|
name = "folding-schemes" |
||||
|
version = "0.1.0" |
||||
|
edition = "2021" |
||||
|
|
||||
|
[dependencies] |
||||
|
ark-ec = "^0.4.0" |
||||
|
ark-ff = "^0.4.0" |
||||
|
ark-poly = "^0.4.0" |
||||
|
ark-std = "^0.4.0" |
||||
|
ark-crypto-primitives = { version = "^0.4.0", default-features = false, features = ["r1cs", "sponge", "crh"] } |
||||
|
ark-poly-commit = "^0.4.0" |
||||
|
ark-relations = { version = "^0.4.0", default-features = false } |
||||
|
ark-r1cs-std = { version = "0.4.0", default-features = false } # this is patched at the workspace level |
||||
|
ark-snark = { version = "^0.4.0"} |
||||
|
ark-serialize = "^0.4.0" |
||||
|
ark-circom = { git = "https://github.com/gakonst/ark-circom.git" } |
||||
|
thiserror = "1.0" |
||||
|
rayon = "1.7.0" |
||||
|
num-bigint = "0.4" |
||||
|
color-eyre = "=0.6.2" |
||||
|
|
||||
|
# tmp imports for espresso's sumcheck |
||||
|
espresso_subroutines = {git="https://github.com/EspressoSystems/hyperplonk", package="subroutines"} |
||||
|
|
||||
|
[dev-dependencies] |
||||
|
ark-pallas = {version="0.4.0", features=["r1cs"]} |
||||
|
ark-vesta = {version="0.4.0", features=["r1cs"]} |
||||
|
ark-bn254 = "0.4.0" |
||||
|
ark-mnt4-298 = {version="0.4.0", features=["r1cs"]} |
||||
|
ark-mnt6-298 = {version="0.4.0", features=["r1cs"]} |
||||
|
ark-groth16 = { version = "^0.4.0" } |
||||
|
rand = "0.8.5" |
||||
|
tracing = { version = "0.1", default-features = false, features = [ "attributes" ] } |
||||
|
tracing-subscriber = { version = "0.2" } |
||||
|
|
||||
|
[features] |
||||
|
default = ["parallel"] |
||||
|
|
||||
|
parallel = [ |
||||
|
"ark-std/parallel", |
||||
|
"ark-ff/parallel", |
||||
|
"ark-ec/parallel", |
||||
|
"ark-poly/parallel", |
||||
|
"ark-crypto-primitives/parallel", |
||||
|
"ark-r1cs-std/parallel", |
||||
|
] |
||||
|
|
@ -0,0 +1,2 @@ |
|||||
|
#!/bin/bash |
||||
|
circom ./folding-schemes/src/frontend/circom/test_folder/test_circuit.circom --r1cs --wasm --prime bn128 --output ./folding-schemes/src/frontend/circom/test_folder/ |
@ -1,2 +0,0 @@ |
|||||
#!/bin/bash |
|
||||
circom ./src/frontend/circom/test_folder/test_circuit.circom --r1cs --wasm --prime bn128 --output ./src/frontend/circom/test_folder/ |
|