plonky2/evm/src/get_challenges.rs

160 lines
5.2 KiB
Rust
Raw Normal View History

2022-05-19 09:41:15 +02:00
use itertools::izip;
2022-05-04 20:57:07 +02:00
use plonky2::field::extension_field::Extendable;
2022-05-18 09:22:58 +02:00
use plonky2::fri::proof::FriProof;
use plonky2::hash::hash_types::RichField;
2022-05-04 20:57:07 +02:00
use plonky2::iop::challenger::{Challenger, RecursiveChallenger};
use plonky2::plonk::circuit_builder::CircuitBuilder;
use plonky2::plonk::config::{AlgebraicHasher, GenericConfig};
2022-05-11 14:35:33 +02:00
use crate::all_stark::AllStark;
2022-05-04 20:57:07 +02:00
use crate::config::StarkConfig;
use crate::permutation::{
get_grand_product_challenge_set, get_n_grand_product_challenge_sets,
get_n_permutation_challenge_sets_target,
2022-05-04 20:57:07 +02:00
};
use crate::proof::*;
use crate::stark::Stark;
2022-05-11 14:35:33 +02:00
impl<F: RichField + Extendable<D>, C: GenericConfig<D, F = F>, const D: usize> AllProof<F, C, D> {
/// Computes all Fiat-Shamir challenges used in the STARK proof.
pub(crate) fn get_challenges(
&self,
all_stark: &AllStark<F, D>,
config: &StarkConfig,
) -> AllProofChallenges<F, D> {
let mut challenger = Challenger::<F, C::Hasher>::new();
2022-05-19 09:41:15 +02:00
for proof in &self.stark_proofs {
2022-05-11 14:35:33 +02:00
challenger.observe_cap(&proof.proof.trace_cap);
}
let ctl_challenges =
get_grand_product_challenge_set(&mut challenger, config.num_challenges);
2022-05-11 14:35:33 +02:00
AllProofChallenges {
2022-05-19 09:41:15 +02:00
stark_challenges: izip!(
&self.stark_proofs,
all_stark.nums_permutation_zs(config),
all_stark.permutation_batch_sizes()
)
.map(|(proof, num_perm, batch_size)| {
2022-05-20 08:37:18 +02:00
proof.get_challenges(&mut challenger, num_perm > 0, batch_size, config)
2022-05-19 09:41:15 +02:00
})
.collect(),
2022-05-11 14:35:33 +02:00
ctl_challenges,
}
}
}
2022-05-04 20:57:07 +02:00
impl<F, C, const D: usize> StarkProofWithPublicInputs<F, C, D>
where
F: RichField + Extendable<D>,
C: GenericConfig<D, F = F>,
{
/// Computes all Fiat-Shamir challenges used in the STARK proof.
2022-05-19 09:41:15 +02:00
pub(crate) fn get_challenges(
2022-05-04 20:57:07 +02:00
&self,
2022-05-11 14:35:33 +02:00
challenger: &mut Challenger<F, C::Hasher>,
2022-05-20 08:37:18 +02:00
stark_use_permutation: bool,
stark_permutation_batch_size: usize,
2022-05-04 20:57:07 +02:00
config: &StarkConfig,
) -> StarkProofChallenges<F, D> {
2022-05-11 14:35:33 +02:00
let degree_bits = self.proof.recover_degree_bits(config);
2022-05-04 20:57:07 +02:00
let StarkProof {
2022-05-12 22:29:10 +02:00
permutation_ctl_zs_cap,
2022-05-04 20:57:07 +02:00
quotient_polys_cap,
openings,
opening_proof:
FriProof {
commit_phase_merkle_caps,
final_poly,
pow_witness,
..
},
2022-05-12 22:35:13 +02:00
..
2022-05-04 20:57:07 +02:00
} = &self.proof;
2022-05-18 09:22:58 +02:00
let num_challenges = config.num_challenges;
2022-05-04 20:57:07 +02:00
2022-05-20 08:37:18 +02:00
let permutation_challenge_sets = stark_use_permutation.then(|| {
get_n_grand_product_challenge_sets(
challenger,
num_challenges,
stark_permutation_batch_size,
)
2022-05-18 09:22:58 +02:00
});
2022-05-04 20:57:07 +02:00
2022-05-18 09:22:58 +02:00
challenger.observe_cap(permutation_ctl_zs_cap);
2022-05-04 20:57:07 +02:00
2022-05-18 09:22:58 +02:00
let stark_alphas = challenger.get_n_challenges(num_challenges);
2022-05-04 20:57:07 +02:00
2022-05-18 09:22:58 +02:00
challenger.observe_cap(quotient_polys_cap);
let stark_zeta = challenger.get_extension_challenge::<D>();
2022-05-04 20:57:07 +02:00
2022-05-18 09:22:58 +02:00
challenger.observe_openings(&openings.to_fri_openings());
2022-05-04 20:57:07 +02:00
2022-05-18 09:22:58 +02:00
StarkProofChallenges {
permutation_challenge_sets,
stark_alphas,
stark_zeta,
fri_challenges: challenger.fri_challenges::<C, D>(
commit_phase_merkle_caps,
final_poly,
*pow_witness,
degree_bits,
&config.fri_config,
),
}
2022-05-04 20:57:07 +02:00
}
}
impl<const D: usize> StarkProofWithPublicInputsTarget<D> {
pub(crate) fn get_challenges<
F: RichField + Extendable<D>,
C: GenericConfig<D, F = F>,
S: Stark<F, D>,
>(
&self,
builder: &mut CircuitBuilder<F, D>,
stark: &S,
config: &StarkConfig,
) -> StarkProofChallengesTarget<D>
where
C::Hasher: AlgebraicHasher<F>,
{
2022-05-18 09:22:58 +02:00
let proof = &self.proof;
let opening_proof = &proof.opening_proof;
let num_challenges = config.num_challenges;
let mut challenger = RecursiveChallenger::<F, C::Hasher, D>::new(builder);
challenger.observe_cap(&proof.trace_cap);
let permutation_challenge_sets =
proof.permutation_zs_cap.as_ref().map(|permutation_zs_cap| {
let tmp = get_n_permutation_challenge_sets_target(
builder,
&mut challenger,
num_challenges,
stark.permutation_batch_size(),
);
challenger.observe_cap(permutation_zs_cap);
tmp
});
let stark_alphas = challenger.get_n_challenges(builder, num_challenges);
challenger.observe_cap(&proof.quotient_polys_cap);
let stark_zeta = challenger.get_extension_challenge(builder);
challenger.observe_openings(&proof.openings.to_fri_openings());
StarkProofChallengesTarget {
permutation_challenge_sets,
stark_alphas,
stark_zeta,
fri_challenges: challenger.fri_challenges::<C>(
builder,
&opening_proof.commit_phase_merkle_caps,
&opening_proof.final_poly,
opening_proof.pow_witness,
&config.fri_config,
),
}
2022-05-04 20:57:07 +02:00
}
}