mirror of
https://github.com/logos-storage/plonky2.git
synced 2026-01-02 13:53:07 +00:00
Updated mir-protocol --> 0xPolygonZero
- Recently the underlying org name on Github changed to `0xPolygonZero`. - This was causing some issues with dependencies downstream where a dependency pointing to the old org name was seen as a different dependency that was using the new org name. - Using a `[patch] section in `Cargo.toml` was running into issues where we couldn't get it to get all dependency versions using a single org name.
This commit is contained in:
parent
1d60431992
commit
a02a2ecb97
10
README.md
10
README.md
@ -178,8 +178,8 @@ Plonky2's default hash function is Poseidon, configured with 8 full rounds, 22 p
|
||||
|
||||
## Links
|
||||
|
||||
- [System Zero](https://github.com/mir-protocol/system-zero), a zkVM built on top of Starky (no longer maintained)
|
||||
- [Waksman](https://github.com/mir-protocol/plonky2-waksman), Plonky2 gadgets for permutation checking using Waksman networks (no longer maintained)
|
||||
- [Insertion](https://github.com/mir-protocol/plonky2-insertion), Plonky2 gadgets for insertion into a list (no longer maintained)
|
||||
- [u32](https://github.com/mir-protocol/plonky2-u32), Plonky2 gadgets for u32 arithmetic (no longer actively maintained)
|
||||
- [ECDSA](https://github.com/mir-protocol/plonky2-ecdsa), Plonky2 gadgets for the ECDSA algorithm (no longer actively maintained)
|
||||
- [System Zero](https://github.com/0xPolygonZero/system-zero), a zkVM built on top of Starky (no longer maintained)
|
||||
- [Waksman](https://github.com/0xPolygonZero/plonky2-waksman), Plonky2 gadgets for permutation checking using Waksman networks (no longer maintained)
|
||||
- [Insertion](https://github.com/0xPolygonZero/plonky2-insertion), Plonky2 gadgets for insertion into a list (no longer maintained)
|
||||
- [u32](https://github.com/0xPolygonZero/plonky2-u32), Plonky2 gadgets for u32 arithmetic (no longer actively maintained)
|
||||
- [ECDSA](https://github.com/0xPolygonZero/plonky2-ecdsa), Plonky2 gadgets for the ECDSA algorithm (no longer actively maintained)
|
||||
|
||||
@ -4,7 +4,7 @@ description = "Implementation of STARKs for the Ethereum Virtual Machine"
|
||||
version = "0.1.1"
|
||||
authors = ["Daniel Lubarov <daniel@lubarov.com>", "William Borgeaud <williamborgeaud@gmail.com>"]
|
||||
readme = "README.md"
|
||||
repository = "https://github.com/mir-protocol/plonky2"
|
||||
repository = "https://github.com/0xPolygonZero/plonky2"
|
||||
keywords = ["EVM", "STARK", "Ethereum"]
|
||||
categories = ["cryptography"]
|
||||
edition = "2021"
|
||||
@ -13,7 +13,7 @@ edition = "2021"
|
||||
anyhow = "1.0.40"
|
||||
bytes = "1.4.0"
|
||||
env_logger = "0.10.0"
|
||||
eth_trie_utils = { git = "https://github.com/mir-protocol/eth_trie_utils.git", rev = "e9ec4ec2aa2ae976b7c699ef40c1ffc716d87ed5" }
|
||||
eth_trie_utils = { git = "https://github.com/0xPolygonZero/eth_trie_utils.git", rev = "e9ec4ec2aa2ae976b7c699ef40c1ffc716d87ed5" }
|
||||
ethereum-types = "0.14.0"
|
||||
hex = { version = "0.4.3", optional = true }
|
||||
hex-literal = "0.4.1"
|
||||
|
||||
@ -5,7 +5,7 @@ version = "0.1.4"
|
||||
license = "MIT OR Apache-2.0"
|
||||
authors = ["Daniel Lubarov <daniel@lubarov.com>", "William Borgeaud <williamborgeaud@gmail.com>", "Nicholas Ward <npward@berkeley.edu>"]
|
||||
readme = "README.md"
|
||||
repository = "https://github.com/mir-protocol/plonky2"
|
||||
repository = "https://github.com/0xPolygonZero/plonky2"
|
||||
keywords = ["cryptography", "SNARK", "PLONK", "FRI"]
|
||||
categories = ["cryptography"]
|
||||
edition = "2021"
|
||||
|
||||
@ -1,6 +1,6 @@
|
||||
# Plonky2
|
||||
|
||||
Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. It is the successor of [Plonky](https://github.com/mir-protocol/plonky), which was based on PLONK and Halo.
|
||||
Plonky2 is a SNARK implementation based on techniques from PLONK and FRI. It is the successor of [Plonky](https://github.com/0xPolygonZero/plonky), which was based on PLONK and Halo.
|
||||
|
||||
Plonky2 is built for speed, and features a highly efficient recursive circuit. On a Macbook Pro, recursive proofs can be generated in about 170 ms.
|
||||
|
||||
|
||||
@ -1,7 +1,7 @@
|
||||
//! Implementations for Poseidon over Goldilocks field of widths 8 and 12.
|
||||
//!
|
||||
//! These contents of the implementations *must* be generated using the
|
||||
//! `poseidon_constants.sage` script in the `mir-protocol/hash-constants`
|
||||
//! `poseidon_constants.sage` script in the `0xPolygonZero/hash-constants`
|
||||
//! repository.
|
||||
|
||||
#[cfg(not(all(target_arch = "aarch64", target_feature = "neon")))]
|
||||
|
||||
@ -906,7 +906,7 @@ impl<F: RichField + Extendable<D>, const D: usize> CircuitBuilder<F, D> {
|
||||
/// In PLONK's permutation argument, there's a slight chance of division by zero. We can
|
||||
/// mitigate this by randomizing some unused witness elements, so if proving fails with
|
||||
/// division by zero, the next attempt will have an (almost) independent chance of success.
|
||||
/// See https://github.com/mir-protocol/plonky2/issues/456
|
||||
/// See https://github.com/0xPolygonZero/plonky2/issues/456
|
||||
fn randomize_unused_pi_wires(&mut self, pi_gate: usize) {
|
||||
for wire in PublicInputGate::wires_public_inputs_hash().end..self.config.num_wires {
|
||||
self.add_simple_generator(RandomValueGenerator {
|
||||
|
||||
@ -20,7 +20,7 @@ use crate::plonk::circuit_builder::CircuitBuilder;
|
||||
/// scale the second one by `a^(r-1-k)`, and add them up.
|
||||
/// This struct abstract away these operations by implementing Horner's method and keeping track
|
||||
/// of the number of multiplications by `a` to compute the scaling factor.
|
||||
/// See <https://github.com/mir-protocol/plonky2/pull/69> for more details and discussions.
|
||||
/// See <https://github.com/0xPolygonZero/plonky2/pull/69> for more details and discussions.
|
||||
#[derive(Debug, Clone)]
|
||||
pub struct ReducingFactor<F: Field> {
|
||||
base: F,
|
||||
|
||||
@ -5,7 +5,7 @@ version = "0.1.2"
|
||||
license = "MIT OR Apache-2.0"
|
||||
authors = ["Daniel Lubarov <daniel@lubarov.com>", "William Borgeaud <williamborgeaud@gmail.com>"]
|
||||
readme = "README.md"
|
||||
repository = "https://github.com/mir-protocol/plonky2"
|
||||
repository = "https://github.com/0xPolygonZero/plonky2"
|
||||
keywords = ["cryptography", "STARK", "FRI"]
|
||||
categories = ["cryptography"]
|
||||
edition = "2021"
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user