research/mimc_stark/mimc_stark.py

214 lines
9.1 KiB
Python
Raw Normal View History

2018-06-29 08:26:17 +00:00
from merkle_tree import merkelize, mk_branch, verify_branch, blake
from compression import compress_fri, decompress_fri, compress_branches, decompress_branches, bin_length
from ecpoly import PrimeField
2018-07-10 12:49:25 +00:00
from better_lagrange import lagrange_interp_4, lagrange_interp_2
2018-06-29 08:26:17 +00:00
import time
2018-07-04 09:33:51 +00:00
from fft import fft
2018-07-10 12:49:25 +00:00
from fri import prove_low_degree, verify_low_degree_proof
from utils import get_power_cycle, get_pseudorandom_indices
2018-06-29 08:26:17 +00:00
modulus = 2**256 - 2**32 * 351 + 1
f = PrimeField(modulus)
nonresidue = 7
spot_check_security_factor = 240
# Compute a MIMC permutation for 2**logsteps steps, using round constants
# from the multiplicative subgroup of size 2**logprecision
def mimc(inp, logsteps, logprecision):
start_time = time.time()
steps = 2**logsteps
precision = 2**logprecision
# Get (steps)th root of unity
2018-06-30 06:57:10 +00:00
subroot = pow(7, (modulus-1)//steps, modulus)
2018-07-04 09:33:51 +00:00
# We use powers of 9 mod 2^256 as the ith round constant for the moment
k = 1
2018-06-29 08:26:17 +00:00
for i in range(steps-1):
2018-07-04 09:33:51 +00:00
inp = (inp**3 + (k ^ 1)) % modulus
k = (k * 9) & ((1 << 256) - 1)
2018-06-29 08:26:17 +00:00
print("MIMC computed in %.4f sec" % (time.time() - start_time))
return inp
2018-06-30 06:57:10 +00:00
# Convert a polynomial P(x) into a polynomial Q(x) = P(fac * x)
2018-06-30 05:13:05 +00:00
def multiply_base(poly, fac):
o = []
r = 1
for p in poly:
o.append(p * r % modulus)
r = r * fac % modulus
return o
2018-06-30 06:57:10 +00:00
# Divides a polynomial by x^n-1
def divide_by_xnm1(poly, n):
if len(poly) <= n:
return []
return f.add_polys(poly[n:], divide_by_xnm1(poly[n:], n))
2018-06-29 08:26:17 +00:00
# Generate a STARK for a MIMC calculation
def mk_mimc_proof(inp, logsteps, logprecision):
start_time = time.time()
assert logsteps < logprecision <= 32
steps = 2**logsteps
precision = 2**logprecision
2018-06-30 06:57:10 +00:00
# Root of unity such that x^precision=1
2018-07-10 12:49:25 +00:00
root_of_unity = pow(7, (modulus-1)//precision, modulus)
2018-06-29 08:26:17 +00:00
2018-06-30 06:57:10 +00:00
# Root of unity such that x^skips=1
skips = precision // steps
2018-07-10 12:49:25 +00:00
subroot = pow(root_of_unity, skips)
2018-06-30 06:57:10 +00:00
# Powers of the root of unity, our computational trace will be
# along the sequence of roots of unity
2018-07-10 12:49:25 +00:00
xs = get_power_cycle(subroot, modulus)
last_step_position = xs[steps-1]
2018-06-30 06:57:10 +00:00
2018-06-29 08:26:17 +00:00
# Generate the computational trace
2018-07-04 09:33:51 +00:00
constants = []
2018-06-29 08:26:17 +00:00
values = [inp]
2018-07-04 09:33:51 +00:00
k = 1
2018-06-29 08:26:17 +00:00
for i in range(steps-1):
2018-07-04 09:33:51 +00:00
values.append((values[-1]**3 + (k ^ 1)) % modulus)
constants.append(k ^ 1)
k = (k * 9) & ((1 << 256) - 1)
constants.append(0)
2018-07-10 12:49:25 +00:00
output = values[-1]
2018-06-29 08:26:17 +00:00
print('Done generating computational trace')
# Interpolate the computational trace into a polynomial
values_polynomial = fft(values, modulus, subroot, inv=True)
2018-07-04 09:33:51 +00:00
constants_polynomial = fft(constants, modulus, subroot, inv=True)
print('Converted computational steps and constants into a polynomial')
2018-06-29 08:26:17 +00:00
# Create the composed polynomial such that
2018-07-04 09:33:51 +00:00
# C(P(x), P(rx), K(x)) = P(rx) - P(x)**3 - K(x)
2018-06-30 05:13:05 +00:00
term1 = multiply_base(values_polynomial, subroot)
2018-07-10 12:49:25 +00:00
p_evaluations = fft(values_polynomial, modulus, root_of_unity)
term2 = fft([pow(x, 3, modulus) for x in p_evaluations], modulus, root_of_unity, inv=True)[:len(values_polynomial) * 3 - 2]
2018-07-04 09:33:51 +00:00
c_of_values = f.sub_polys(f.sub_polys(term1, term2), constants_polynomial)
print('Computed C(P, K) polynomial')
2018-06-29 08:26:17 +00:00
2018-07-04 09:33:51 +00:00
# Compute D(x) = C(P(x), P(rx), K(x)) / Z(x)
2018-06-30 06:57:10 +00:00
# Z(x) = (x^steps - 1) / (x - x_atlast_step)
d = divide_by_xnm1(f.mul_polys(c_of_values,
2018-07-10 12:49:25 +00:00
[-last_step_position, 1]),
2018-06-30 06:57:10 +00:00
steps)
2018-07-10 12:49:25 +00:00
# Consistency check
assert (f.eval_poly_at(d, 90833) *
(pow(90833, steps, modulus) - 1) *
f.inv(f.eval_poly_at([-last_step_position, 1], 90833)) -
f.eval_poly_at(c_of_values, 90833)) % modulus == 0
print('Computed D polynomial')
2018-06-29 08:26:17 +00:00
2018-07-10 12:49:25 +00:00
# Compute interpolant of ((1, input), (x_atlast_step, output))
interpolant = lagrange_interp_2([inp, output], [1, last_step_position], modulus)
quotient = f.mul_polys([-1, 1], [-last_step_position, 1])
b = f.div_polys(f.sub_polys(values_polynomial, interpolant), quotient)
# Consistency check
assert f.eval_poly_at(f.add_polys(f.mul_polys(b, quotient), interpolant), 7045) == f.eval_poly_at(values_polynomial, 7045)
print('Computed B polynomial')
# Evaluate B, D and K across the entire subgroup
d_evaluations = fft(d, modulus, root_of_unity)
k_evaluations = fft(constants_polynomial, modulus, root_of_unity)
b_evaluations = fft(b, modulus, root_of_unity)
print('Evaluated low-degree extension of B, D and K')
2018-06-29 08:26:17 +00:00
# Compute their Merkle roots
p_mtree = merkelize(p_evaluations)
d_mtree = merkelize(d_evaluations)
2018-07-04 09:33:51 +00:00
k_mtree = merkelize(k_evaluations)
2018-07-10 12:49:25 +00:00
b_mtree = merkelize(b_evaluations)
2018-06-29 08:26:17 +00:00
print('Computed hash root')
2018-07-10 12:49:25 +00:00
# Based on the hashes of P, D and B, we select a random linear combination
# of P * x^steps, P, B * x^steps, B and D, and prove the low-degreeness of that,
# instead of proving the low-degreeness of P, B and D separately
k1 = int.from_bytes(blake(p_mtree[1] + d_mtree[1] + b_mtree[1] + b'\x01'), 'big')
k2 = int.from_bytes(blake(p_mtree[1] + d_mtree[1] + b_mtree[1] + b'\x02'), 'big')
k3 = int.from_bytes(blake(p_mtree[1] + d_mtree[1] + b_mtree[1] + b'\x03'), 'big')
k4 = int.from_bytes(blake(p_mtree[1] + d_mtree[1] + b_mtree[1] + b'\x04'), 'big')
lincomb = f.add_polys(f.add_polys(d,
f.mul_by_const(values_polynomial, k1) + f.mul_by_const(values_polynomial, k2)),
f.mul_by_const(b, k3) + [0, 0] + f.mul_by_const(b, k4) + [0,0])
l_evaluations = fft(lincomb, modulus, root_of_unity)
2018-07-04 09:33:51 +00:00
l_mtree = merkelize(l_evaluations)
print('Computed random linear combination')
2018-06-29 08:26:17 +00:00
# Do some spot checks of the Merkle tree at pseudo-random coordinates
branches = []
samples = spot_check_security_factor // (logprecision - logsteps)
2018-07-10 12:49:25 +00:00
positions = get_pseudorandom_indices(l_mtree[1], precision - skips, samples)
2018-06-29 08:26:17 +00:00
for pos in positions:
branches.append(mk_branch(p_mtree, pos))
branches.append(mk_branch(p_mtree, pos + skips))
2018-06-29 08:26:17 +00:00
branches.append(mk_branch(d_mtree, pos))
2018-07-04 09:33:51 +00:00
branches.append(mk_branch(k_mtree, pos))
2018-07-10 12:49:25 +00:00
branches.append(mk_branch(b_mtree, pos))
2018-07-04 09:33:51 +00:00
branches.append(mk_branch(l_mtree, pos))
2018-06-29 08:26:17 +00:00
print('Computed %d spot checks' % samples)
# Return the Merkle roots of P and D, the spot check Merkle proofs,
# and low-degree proofs of P and D
o = [p_mtree[1],
d_mtree[1],
2018-07-04 09:33:51 +00:00
k_mtree[1],
2018-07-10 12:49:25 +00:00
b_mtree[1],
2018-07-04 09:33:51 +00:00
l_mtree[1],
2018-06-29 08:26:17 +00:00
branches,
2018-07-10 12:49:25 +00:00
prove_low_degree(lincomb, root_of_unity, l_evaluations, steps * 2, modulus)]
2018-06-29 08:26:17 +00:00
print("STARK computed in %.4f sec" % (time.time() - start_time))
return o
# Verifies a STARK
2018-06-30 06:57:10 +00:00
def verify_mimc_proof(inp, logsteps, logprecision, output, proof):
2018-07-10 12:49:25 +00:00
p_root, d_root, k_root, b_root, l_root, branches, fri_proof = proof
2018-06-29 08:26:17 +00:00
start_time = time.time()
steps = 2**logsteps
precision = 2**logprecision
# Get (steps)th root of unity
root_of_unity = pow(7, (modulus-1)//precision, modulus)
skips = precision // steps
2018-06-29 08:26:17 +00:00
# Verifies the low-degree proofs
2018-07-10 12:49:25 +00:00
assert verify_low_degree_proof(l_root, root_of_unity, fri_proof, steps * 2, modulus)
2018-06-29 08:26:17 +00:00
# Performs the spot checks
2018-07-10 12:49:25 +00:00
k1 = int.from_bytes(blake(p_root + d_root + b_root + b'\x01'), 'big')
k2 = int.from_bytes(blake(p_root + d_root + b_root + b'\x02'), 'big')
k3 = int.from_bytes(blake(p_root + d_root + b_root + b'\x03'), 'big')
k4 = int.from_bytes(blake(p_root + d_root + b_root + b'\x04'), 'big')
2018-06-29 08:26:17 +00:00
samples = spot_check_security_factor // (logprecision - logsteps)
2018-07-10 12:49:25 +00:00
positions = get_pseudorandom_indices(l_root, precision - skips, samples)
last_step_position = pow(root_of_unity, (steps - 1) * skips, modulus)
2018-06-29 08:26:17 +00:00
for i, pos in enumerate(positions):
# Check C(P(x)) = Z(x) * D(x)
x = pow(root_of_unity, pos, modulus)
2018-07-10 12:49:25 +00:00
x_to_the_steps = pow(x, steps, modulus)
p_of_x = verify_branch(p_root, pos, branches[i*6])
p_of_rx = verify_branch(p_root, pos+skips, branches[i*6 + 1])
d_of_x = verify_branch(d_root, pos, branches[i*6 + 2])
k_of_x = verify_branch(k_root, pos, branches[i*6 + 3])
b_of_x = verify_branch(b_root, pos, branches[i*6 + 4])
l_of_x = verify_branch(l_root, pos, branches[i*6 + 5])
2018-06-30 06:57:10 +00:00
zvalue = f.div(pow(x, steps, modulus) - 1,
2018-07-10 12:49:25 +00:00
x - last_step_position)
2018-07-04 09:33:51 +00:00
assert (p_of_rx - p_of_x ** 3 - k_of_x - zvalue * d_of_x) % modulus == 0
2018-07-10 12:49:25 +00:00
interpolant = lagrange_interp_2([inp, output], [1, last_step_position], modulus)
quotient = f.mul_polys([-1, 1], [-last_step_position, 1])
assert (p_of_x - b_of_x * f.eval_poly_at(quotient, x) -
f.eval_poly_at(interpolant, x)) % modulus == 0
assert (l_of_x - d_of_x -
k1 * p_of_x - k2 * p_of_x * x_to_the_steps -
k3 * b_of_x - k4 * b_of_x * x_to_the_steps) % modulus == 0
2018-06-29 08:26:17 +00:00
print('Verified %d consistency checks' % (spot_check_security_factor // (logprecision - logsteps)))
print('Verified STARK in %.4f sec' % (time.time() - start_time))
2018-07-04 09:33:51 +00:00
print('Note: this does not include verifying the Merkle root of the constants tree')
print('This can be done by every client once as a precomputation')
2018-06-29 08:26:17 +00:00
return True