2025-04-24 20:54:59 +02:00
|
|
|
use std::marker::PhantomData;
|
|
|
|
|
use plonky2::hash::hash_types::RichField;
|
|
|
|
|
use plonky2::iop::target::{BoolTarget, Target};
|
|
|
|
|
use plonky2::iop::witness::{PartialWitness, WitnessWrite};
|
|
|
|
|
use plonky2::plonk::circuit_builder::CircuitBuilder;
|
2025-05-22 13:31:45 +02:00
|
|
|
use plonky2::plonk::circuit_data::{VerifierCircuitData, VerifierCircuitTarget, VerifierOnlyCircuitData};
|
2025-04-24 20:54:59 +02:00
|
|
|
use plonky2::plonk::config::{AlgebraicHasher, GenericConfig};
|
|
|
|
|
use plonky2::plonk::proof::{ProofWithPublicInputs, ProofWithPublicInputsTarget};
|
|
|
|
|
use plonky2_field::extension::Extendable;
|
|
|
|
|
use plonky2_poseidon2::poseidon2_hash::poseidon2::Poseidon2;
|
|
|
|
|
use crate::{error::CircuitError,Result};
|
2025-07-03 10:33:29 +02:00
|
|
|
use crate::circuit_trait::Plonky2Circuit;
|
2025-04-24 20:54:59 +02:00
|
|
|
use crate::recursion::dummy_gen::DummyProofGen;
|
|
|
|
|
use crate::recursion::utils::bucket_count;
|
|
|
|
|
|
|
|
|
|
/// recursion node circuit
|
2025-05-22 13:31:45 +02:00
|
|
|
/// N: number of leaf proofs
|
2025-04-24 20:54:59 +02:00
|
|
|
/// T: total number of sampling proofs
|
|
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
|
pub struct NodeCircuit<
|
|
|
|
|
F: RichField + Extendable<D> + Poseidon2,
|
|
|
|
|
const D: usize,
|
|
|
|
|
C: GenericConfig<D, F = F>,
|
|
|
|
|
H: AlgebraicHasher<F>,
|
2025-05-22 13:31:45 +02:00
|
|
|
const N: usize,
|
2025-04-24 20:54:59 +02:00
|
|
|
const T: usize,
|
|
|
|
|
> where
|
|
|
|
|
<C as GenericConfig<D>>::Hasher: AlgebraicHasher<F>
|
|
|
|
|
{
|
2025-05-22 13:31:45 +02:00
|
|
|
leaf_verifier_data: VerifierCircuitData<F, C, D>,
|
2025-04-24 20:54:59 +02:00
|
|
|
phantom_data: PhantomData<H>
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
/// recursion node targets
|
2025-07-10 12:13:49 +02:00
|
|
|
/// leaf_proofs: leaf proofs - can be real or dummy
|
2025-04-24 20:54:59 +02:00
|
|
|
/// node_verifier_data: node verifier data, note: leaf verifier data is constant
|
|
|
|
|
/// condition: for switching between leaf and node verifier data
|
|
|
|
|
/// index: index of the node
|
|
|
|
|
/// flags: boolean target for each flag/signal for switching between real and dummy leaf proof
|
|
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
|
pub struct NodeTargets<
|
|
|
|
|
const D: usize,
|
|
|
|
|
>{
|
2025-05-22 13:31:45 +02:00
|
|
|
pub inner_proofs: Vec<ProofWithPublicInputsTarget<D>>,
|
|
|
|
|
pub inner_verifier_data: VerifierCircuitTarget,
|
2025-04-24 20:54:59 +02:00
|
|
|
pub condition: BoolTarget,
|
|
|
|
|
pub index: Target,
|
|
|
|
|
pub flags: Vec<BoolTarget>,
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
#[derive(Clone, Debug)]
|
|
|
|
|
pub struct NodeInput<
|
|
|
|
|
F: RichField + Extendable<D> + Poseidon2,
|
|
|
|
|
const D: usize,
|
|
|
|
|
C: GenericConfig<D, F = F>,
|
|
|
|
|
>{
|
2025-05-22 13:31:45 +02:00
|
|
|
pub inner_proofs: Vec<ProofWithPublicInputs<F, C, D>>,
|
2025-04-24 20:54:59 +02:00
|
|
|
pub verifier_only_data: VerifierOnlyCircuitData<C, D>,
|
|
|
|
|
pub condition: bool,
|
|
|
|
|
pub flags: Vec<bool>,
|
|
|
|
|
pub index: usize
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl<
|
|
|
|
|
F: RichField + Extendable<D> + Poseidon2,
|
|
|
|
|
const D: usize,
|
|
|
|
|
C: GenericConfig<D, F = F>,
|
|
|
|
|
H: AlgebraicHasher<F>,
|
2025-05-22 13:31:45 +02:00
|
|
|
const N: usize,
|
2025-04-24 20:54:59 +02:00
|
|
|
const T: usize,
|
2025-05-22 13:31:45 +02:00
|
|
|
> NodeCircuit<F,D,C,H, N,T> where
|
2025-04-24 20:54:59 +02:00
|
|
|
<C as GenericConfig<D>>::Hasher: AlgebraicHasher<F>
|
|
|
|
|
{
|
|
|
|
|
|
|
|
|
|
pub fn new(
|
2025-05-22 13:31:45 +02:00
|
|
|
leaf_verifier_data: VerifierCircuitData<F, C, D>,
|
2025-04-24 20:54:59 +02:00
|
|
|
) -> Self {
|
2025-07-10 12:13:49 +02:00
|
|
|
assert!(N.is_power_of_two(), "N is NOT a power of two");
|
2025-04-24 20:54:59 +02:00
|
|
|
Self{
|
|
|
|
|
leaf_verifier_data,
|
|
|
|
|
phantom_data:PhantomData::default(),
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
impl<
|
|
|
|
|
F: RichField + Extendable<D> + Poseidon2,
|
|
|
|
|
const D: usize,
|
|
|
|
|
C: GenericConfig<D, F = F>,
|
|
|
|
|
H: AlgebraicHasher<F>,
|
2025-05-22 13:31:45 +02:00
|
|
|
const N: usize,
|
2025-04-24 20:54:59 +02:00
|
|
|
const T: usize,
|
2025-05-22 13:31:45 +02:00
|
|
|
> Plonky2Circuit<F, C, D> for NodeCircuit<F, D, C, H, N, T> where
|
2025-04-24 20:54:59 +02:00
|
|
|
<C as GenericConfig<D>>::Hasher: AlgebraicHasher<F>
|
|
|
|
|
{
|
|
|
|
|
type Targets = NodeTargets<D>;
|
|
|
|
|
type Input = NodeInput<F, D, C>;
|
|
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
/// Adds the in-circuit targets for the Node recursion circuit.
|
|
|
|
|
///
|
|
|
|
|
/// This function builds all necessary virtual targets for verifying `N` leaf proofs
|
|
|
|
|
/// and constructing the node-level public inputs. It performs the following steps:
|
|
|
|
|
/// 1. Creates virtual proof targets for each leaf proof and extracts their public inputs.
|
|
|
|
|
/// 2. Hashes and registers the concatenated public inputs of the inner proofs.
|
|
|
|
|
/// 3. Sets up virtual verifier data targets for node and leaf circuits and selects
|
|
|
|
|
/// between leaf and node verifier data based on the `condition` flag.
|
|
|
|
|
/// 4. Verifies each proof in-circuit, switching to dummy verifier data for flagged dummy proofs.
|
|
|
|
|
/// 5. Enforces zero flag buckets for any dummy proof to maintain soundness.
|
|
|
|
|
/// 6. Checks that each inner proof's index matches the expected index
|
|
|
|
|
/// i.e. it should be in the range of [S, S-1] where S = `index` * `N`
|
|
|
|
|
/// 7. Aggregates inner flag buckets across proofs into final flag bucket targets.
|
|
|
|
|
/// 8. Registers the final flag buckets as public inputs.
|
|
|
|
|
///
|
2025-04-24 20:54:59 +02:00
|
|
|
fn add_targets(&self, builder: &mut CircuitBuilder<F, D>, register_pi: bool) -> Result<Self::Targets> {
|
2025-05-22 13:31:45 +02:00
|
|
|
let inner_common = self.leaf_verifier_data.common.clone();
|
2025-04-24 20:54:59 +02:00
|
|
|
let zero_target = builder.zero();
|
|
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// assert public input is of size 8 (2 hash digests) + 1 (index) + B (flag buckets)
|
2025-04-24 20:54:59 +02:00
|
|
|
let n_bucket: usize = bucket_count(T);
|
|
|
|
|
assert_eq!(inner_common.num_public_inputs, 9+n_bucket);
|
|
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// the proof virtual targets - N proofs
|
2025-04-24 20:54:59 +02:00
|
|
|
let mut vir_proofs = vec![];
|
|
|
|
|
let mut pub_input = vec![];
|
|
|
|
|
let mut inner_flag_buckets = vec![];
|
|
|
|
|
let mut inner_indexes = vec![];
|
2025-05-22 13:31:45 +02:00
|
|
|
for _i in 0..N {
|
2025-04-24 20:54:59 +02:00
|
|
|
let vir_proof = builder.add_virtual_proof_with_pis(&inner_common);
|
|
|
|
|
let inner_pub_input = vir_proof.public_inputs.clone();
|
|
|
|
|
vir_proofs.push(vir_proof);
|
2025-07-10 12:13:49 +02:00
|
|
|
// public input [0...4] contains hash of inner proof public inputs
|
2025-04-24 20:54:59 +02:00
|
|
|
pub_input.extend_from_slice(&inner_pub_input[0..4]);
|
2025-07-10 12:13:49 +02:00
|
|
|
// public input [4...8] are skipped since they contain the inner verifier data
|
|
|
|
|
// public input [8] contains the index
|
2025-04-24 20:54:59 +02:00
|
|
|
inner_indexes.push(inner_pub_input[8]);
|
2025-07-10 12:13:49 +02:00
|
|
|
// public input [9..(9+n_bucket)] contains the flag buckets
|
2025-04-24 20:54:59 +02:00
|
|
|
inner_flag_buckets.push(inner_pub_input[9..(9+n_bucket)].to_vec());
|
|
|
|
|
}
|
|
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// hash the public input of all N inner proofs & make it public
|
2025-04-24 20:54:59 +02:00
|
|
|
let hash_inner_pub_input = builder.hash_n_to_hash_no_pad::<H>(pub_input);
|
|
|
|
|
if register_pi{
|
|
|
|
|
builder.register_public_inputs(&hash_inner_pub_input.elements);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// virtual target for the verifier data
|
2025-07-10 12:13:49 +02:00
|
|
|
// this is the verifier data for the node which cannot be constant
|
|
|
|
|
// since it is unknown at compile time
|
2025-04-24 20:54:59 +02:00
|
|
|
let node_verifier_data = builder.add_virtual_verifier_data(inner_common.config.fri_config.cap_height);
|
|
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// constant verifier data target
|
|
|
|
|
// this is the verifier data for the leaf which is known at this point and is constant
|
2025-05-22 13:31:45 +02:00
|
|
|
let const_leaf_verifier_data = builder.constant_verifier_data(&self.leaf_verifier_data.verifier_only);
|
2025-04-24 20:54:59 +02:00
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// constant target for dummy verifier data
|
|
|
|
|
// this can be the verifier data for either the node or the leaf
|
|
|
|
|
// doesn't matter if the given inner proof (leaf or node) is dummy anyway
|
|
|
|
|
// it just has to be in the same structure as the real verifier data.
|
2025-04-24 20:54:59 +02:00
|
|
|
let const_dummy_vd = builder.constant_verifier_data(
|
2025-05-22 13:31:45 +02:00
|
|
|
&DummyProofGen::<F,D,C>::gen_dummy_verifier_data(&inner_common)
|
2025-04-24 20:54:59 +02:00
|
|
|
);
|
|
|
|
|
|
|
|
|
|
// register only the node verifier data hash as public input.
|
2025-07-10 12:13:49 +02:00
|
|
|
// we need to register this as public input since this verifier data is supplied by the prover
|
|
|
|
|
// so it must be verified later by the verifier. Otherwise, the prover can use a dummy verifier data
|
|
|
|
|
// we don't need to register the leaf verifier data or the dummy verifier data since they are constants
|
2025-04-24 20:54:59 +02:00
|
|
|
let mut vd_pub_input = vec![];
|
|
|
|
|
vd_pub_input.extend_from_slice(&node_verifier_data.circuit_digest.elements);
|
|
|
|
|
for i in 0..builder.config.fri_config.num_cap_elements() {
|
|
|
|
|
vd_pub_input.extend_from_slice(&node_verifier_data.constants_sigmas_cap.0[i].elements);
|
|
|
|
|
}
|
|
|
|
|
let vd_hash = builder.hash_n_to_hash_no_pad::<H>(vd_pub_input);
|
|
|
|
|
if register_pi {
|
|
|
|
|
builder.register_public_inputs(&vd_hash.elements);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// condition for switching between node and leaf
|
2025-07-10 12:13:49 +02:00
|
|
|
// we need this to switch between node and leaf verifier data since
|
|
|
|
|
// the leaf and node circuit contain different logic -> different verifier data.
|
2025-04-24 20:54:59 +02:00
|
|
|
let condition = builder.add_virtual_bool_target_safe();
|
|
|
|
|
|
|
|
|
|
// flag buckets targets
|
|
|
|
|
let mut flag_buckets: Vec<Target> = (0..n_bucket).map(|_i| zero_target.clone()).collect();
|
|
|
|
|
// index: 0 <= index < T where T = total number of proofs
|
|
|
|
|
let index = builder.add_virtual_public_input();
|
2025-07-10 12:13:49 +02:00
|
|
|
// N flags, one for each inner proof
|
2025-05-22 13:31:45 +02:00
|
|
|
let flags: Vec<BoolTarget> = (0..N).map(|_i| builder.add_virtual_bool_target_safe()).collect();
|
2025-04-24 20:54:59 +02:00
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// select the verifier data based on the condition - switch between node and leaf
|
2025-04-24 20:54:59 +02:00
|
|
|
// condition: true -> node, false -> leaf
|
|
|
|
|
let node_or_leaf_vd = builder.select_verifier_data(condition.clone(), &node_verifier_data, &const_leaf_verifier_data);
|
2025-07-10 12:13:49 +02:00
|
|
|
// verify the proofs in-circuit - N proofs
|
2025-05-22 13:31:45 +02:00
|
|
|
for i in 0..N {
|
2025-07-10 12:13:49 +02:00
|
|
|
// select the verifier data based on the flag - switch between real and dummy
|
2025-04-24 20:54:59 +02:00
|
|
|
// flag: true -> real, false -> dummy
|
|
|
|
|
let selected_vd = builder.select_verifier_data(flags[i].clone(), &node_or_leaf_vd, &const_dummy_vd);
|
|
|
|
|
builder.verify_proof::<C>(&vir_proofs[i], &selected_vd, &inner_common);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Check flag buckets for dummy inner proofs:
|
|
|
|
|
// For each inner proof, if its corresponding flag `flags[i]` is false,
|
|
|
|
|
// then enforce that every bucket in inner_flag_buckets[i] is zero.
|
2025-05-22 13:31:45 +02:00
|
|
|
for i in 0..N {
|
2025-04-24 20:54:59 +02:00
|
|
|
let not_flag_i = builder.not(flags[i]);
|
|
|
|
|
let not_flag_val = not_flag_i.target;
|
|
|
|
|
for j in 0..n_bucket {
|
|
|
|
|
// Enforce: inner_flag_buckets[i][j] * (not_flag_val) = 0.
|
|
|
|
|
// If flag is false then not_flag_val = 1, forcing inner_flag_buckets[i][j] to be zero
|
|
|
|
|
let product = builder.mul(inner_flag_buckets[i][j], not_flag_val);
|
|
|
|
|
builder.connect(product, zero_target.clone());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
2025-07-10 12:13:49 +02:00
|
|
|
// check inner proof indices are correct
|
|
|
|
|
// we expect the inner proof indices to be in the range [`index` * N, `index` * N + N - 1]
|
|
|
|
|
// e.g. if index = 0, then we expect inner proof indices to be in the range [0, N - 1]
|
2025-05-22 13:31:45 +02:00
|
|
|
let m_const = builder.constant(F::from_canonical_u64(N as u64));
|
2025-04-24 20:54:59 +02:00
|
|
|
let mut expected_inner_index = builder.mul(index, m_const);
|
2025-05-22 13:31:45 +02:00
|
|
|
for i in 0..N {
|
2025-04-24 20:54:59 +02:00
|
|
|
if i > 0 {
|
|
|
|
|
let i_const = builder.constant(F::from_canonical_u64(i as u64));
|
|
|
|
|
expected_inner_index = builder.add(expected_inner_index, i_const);
|
|
|
|
|
}
|
|
|
|
|
builder.connect(expected_inner_index, inner_indexes[i]);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// add flag buckets
|
|
|
|
|
for i in 0..flag_buckets.len(){
|
|
|
|
|
for j in 0..inner_flag_buckets.len() {
|
|
|
|
|
flag_buckets[i] = builder.add(flag_buckets[i], inner_flag_buckets[j][i]);
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
// make flag buckets public
|
|
|
|
|
builder.register_public_inputs(&flag_buckets);
|
|
|
|
|
|
|
|
|
|
// Make sure we have every gate
|
|
|
|
|
for g in &inner_common.gates {
|
|
|
|
|
builder.add_gate_to_gate_set(g.clone());
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// return targets
|
|
|
|
|
let t = NodeTargets {
|
2025-05-22 13:31:45 +02:00
|
|
|
inner_proofs: vir_proofs,
|
|
|
|
|
inner_verifier_data: node_verifier_data,
|
2025-04-24 20:54:59 +02:00
|
|
|
condition,
|
|
|
|
|
index,
|
|
|
|
|
flags,
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
Ok(t)
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
fn assign_targets(&self, pw: &mut PartialWitness<F>, targets: &Self::Targets, input: &Self::Input) -> Result<()> {
|
2025-07-10 12:13:49 +02:00
|
|
|
// assert size of vec
|
2025-05-22 13:31:45 +02:00
|
|
|
assert_eq!(input.inner_proofs.len(), N);
|
|
|
|
|
assert_eq!(input.flags.len(), N);
|
|
|
|
|
assert!(input.index <= T, "given index is not valid");
|
2025-04-24 20:54:59 +02:00
|
|
|
|
|
|
|
|
// assign the proofs
|
2025-05-22 13:31:45 +02:00
|
|
|
for i in 0..N {
|
|
|
|
|
pw.set_proof_with_pis_target(&targets.inner_proofs[i], &input.inner_proofs[i])
|
2025-04-24 20:54:59 +02:00
|
|
|
.map_err(|e| {
|
|
|
|
|
CircuitError::ProofTargetAssignmentError("inner-proof".to_string(), e.to_string())
|
|
|
|
|
})?;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// assign the verifier data
|
2025-05-22 13:31:45 +02:00
|
|
|
pw.set_verifier_data_target(&targets.inner_verifier_data, &input.verifier_only_data)
|
2025-04-24 20:54:59 +02:00
|
|
|
.map_err(|e| {
|
|
|
|
|
CircuitError::VerifierDataTargetAssignmentError(e.to_string())
|
|
|
|
|
})?;
|
|
|
|
|
|
|
|
|
|
// assign the condition - for switching between leaf & node
|
|
|
|
|
pw.set_bool_target(targets.condition, input.condition)
|
|
|
|
|
.map_err(|e| CircuitError::BoolTargetAssignmentError("condition".to_string(), e.to_string()))?;
|
|
|
|
|
|
|
|
|
|
// Assign the global index.
|
|
|
|
|
pw.set_target(targets.index, F::from_canonical_u64(input.index as u64))
|
|
|
|
|
.map_err(|e| CircuitError::TargetAssignmentError(format!("index {}", input.index),e.to_string()))?;
|
|
|
|
|
// Assign the flags - switch between real & fake proof
|
2025-05-22 13:31:45 +02:00
|
|
|
for i in 0..N {
|
2025-04-24 20:54:59 +02:00
|
|
|
pw.set_bool_target(targets.flags[i], input.flags[i])
|
|
|
|
|
.map_err(|e| CircuitError::TargetAssignmentError(format!("flag {}", input.flags[i]), e.to_string()))?;
|
|
|
|
|
}
|
|
|
|
|
Ok(())
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|