add js verifier key exporter

This commit is contained in:
kilic 2020-10-28 19:13:32 +03:00
parent 2d6e1498ee
commit cbc8e7579a
2 changed files with 157 additions and 23 deletions

View File

@ -15,16 +15,23 @@ bench = []
[dependencies]
rand = "0.4"
blake2 = "0.8.1"
# sapling-crypto = { package = "sapling-crypto_ce", version = "0.1.3", default-features = false }
sapling-crypto = {package = "sapling-crypto_ce", path = "../sapling-crypto" }
# bellman = { package = "bellman_ce", version = "0.3.4", default-features = false }
bellman = {package = "bellman_ce", path = "../bellman" }
sapling-crypto = { package = "sapling-crypto_ce", version = "0.1.3", default-features = false }
# sapling-crypto = {package = "sapling-crypto_ce", path = "../sapling-crypto", default-features = false }
bellman = { package = "bellman_ce", version = "0.3.4", default-features = false }
# bellman = {package = "bellman_ce", path = "../bellman", default-features = false }
[target.'cfg(target_arch = "wasm32")'.dependencies]
hex = "0.4"
console_error_panic_hook = { version = "0.1.1" }
wasm-bindgen = "0.2.63"
wee_alloc = "0.4.5"
wasm-bindgen = "=0.2.60"
# wee_alloc = "0.4.5"
web-sys = {version = "0.3", features = ["console", "Performance", "Window"]}
js-sys = "0.3.37"
[target.'cfg(target_arch = "wasm32")'.dev-dependencies]
wasm-bindgen-test = "0.3"
[profile.release]
# Tell `rustc` to optimize for small code size.
opt-level = 3

View File

@ -2,31 +2,154 @@ use super::utils::set_panic_hook;
use crate::circuit::poseidon::PoseidonCircuit;
use crate::circuit::rln::{RLNCircuit, RLNInputs};
use crate::poseidon::{Poseidon as PoseidonHasher, PoseidonParams};
use sapling_crypto::bellman::groth16::{create_proof, prepare_verifying_key, verify_proof};
use sapling_crypto::bellman::groth16::{create_random_proof, Parameters, Proof};
use sapling_crypto::bellman::pairing::bn256::{Bn256, Fr};
use sapling_crypto::bellman::pairing::Engine;
use sapling_crypto::bellman::{Circuit, ConstraintSystem, SynthesisError};
use bellman::groth16::{create_proof, prepare_verifying_key, verify_proof};
use bellman::groth16::{create_random_proof, Parameters, Proof};
use bellman::pairing::bn256::{Bn256, Fr};
use bellman::pairing::Engine;
use bellman::{Circuit, ConstraintSystem, SynthesisError};
use std::io::{self, Error, ErrorKind, Read, Write};
use wasm_bindgen::prelude::*;
#[global_allocator]
static ALLOC: wee_alloc::WeeAlloc = wee_alloc::WeeAlloc::INIT;
use crate::merkle::MerkleTree;
use bellman::groth16::generate_random_parameters;
use bellman::pairing::ff::{Field, PrimeField, PrimeFieldRepr};
use bellman::pairing::CurveAffine;
use rand::{Rand, SeedableRng, XorShiftRng};
#[wasm_bindgen]
struct RLNWasm {
pub struct RLNWasm {
circuit_parameters: Parameters<Bn256>,
circuit_hasher: PoseidonCircuit<Bn256>,
merkle_depth: usize,
}
#[wasm_bindgen]
pub struct G1Hex {
x: String,
y: String,
}
#[wasm_bindgen]
pub struct G2Hex {
x_c0: String,
x_c1: String,
y_c0: String,
y_c1: String,
}
impl G1Hex {
pub fn x(&self) -> String {
self.x.clone()
}
pub fn y(&self) -> String {
self.y.clone()
}
}
impl G2Hex {
pub fn x_c0(&self) -> String {
self.x_c0.clone()
}
pub fn x_c1(&self) -> String {
self.x_c1.clone()
}
pub fn y_c0(&self) -> String {
self.y_c0.clone()
}
pub fn y_c1(&self) -> String {
self.y_c1.clone()
}
}
#[wasm_bindgen]
pub struct VerifierKey {
alpha_1: G1Hex,
beta_2: G2Hex,
gamma_2: G2Hex,
delta_2: G2Hex,
ic_array: Array,
}
use sapling_crypto::bellman::pairing::bn256::{G1Affine, G2Affine};
use js_sys::Array;
impl VerifierKey {
pub fn some() -> Array {
let js_array: Array = Array::new();
js_array.push(&wasm_bindgen::JsValue::from(String::from("xxx")));
js_array.push(&wasm_bindgen::JsValue::from(String::from("yyy")));
js_array
}
pub fn new(circuit_parameters: Parameters<Bn256>) -> VerifierKey {
let vk = circuit_parameters.vk;
let ic_array: Array = Array::new();
for e_ic in vk.ic.iter() {
ic_array.push(&wasm_bindgen::JsValue::from(Self::g1_to_js(e_ic.clone())));
}
VerifierKey {
alpha_1: Self::g1_to_js(vk.alpha_g1),
beta_2: Self::g2_to_js(vk.beta_g2),
gamma_2: Self::g2_to_js(vk.gamma_g2),
delta_2: Self::g2_to_js(vk.delta_g2),
ic_array,
}
}
fn g1_to_js(point: G1Affine) -> G1Hex {
let mut buf_x: Vec<u8> = vec![];
let mut buf_y: Vec<u8> = vec![];
let point_xy = point.into_xy_unchecked();
point_xy.0.into_repr().write_be(&mut buf_x).unwrap();
let x = hex::encode(buf_x);
point_xy.1.into_repr().write_be(&mut buf_y).unwrap();
let y = hex::encode(buf_y);
G1Hex { x, y }
}
fn g2_to_js(point: G2Affine) -> G2Hex {
let mut buf_x_c0: Vec<u8> = vec![];
let mut buf_x_c1: Vec<u8> = vec![];
let mut buf_y_c0: Vec<u8> = vec![];
let mut buf_y_c1: Vec<u8> = vec![];
let point_xy = point.into_xy_unchecked();
point_xy.0.c0.into_repr().write_be(&mut buf_x_c0).unwrap();
let x_c0 = hex::encode(buf_x_c0);
point_xy.0.c1.into_repr().write_be(&mut buf_x_c1).unwrap();
let x_c1 = hex::encode(buf_x_c1);
point_xy.1.c0.into_repr().write_be(&mut buf_y_c0).unwrap();
let y_c0 = hex::encode(buf_y_c0);
point_xy.1.c1.into_repr().write_be(&mut buf_y_c1).unwrap();
let y_c1 = hex::encode(buf_y_c1);
G2Hex {
x_c0,
x_c1,
y_c0,
y_c1,
}
}
}
#[wasm_bindgen]
impl RLNWasm {
#[wasm_bindgen]
pub fn new(merkle_depth: usize, raw_circuit_parameters: &[u8]) -> RLNWasm {
set_panic_hook();
let circuit_parameters = Parameters::<Bn256>::read(raw_circuit_parameters, true).unwrap();
let poseidon_params = PoseidonParams::<Bn256>::default();
let poseidon_params = PoseidonParams::<Bn256>::new(8, 55, 3, None, None, None);
let circuit_hasher = PoseidonCircuit::new(poseidon_params.clone());
RLNWasm {
circuit_parameters,
@ -35,6 +158,10 @@ impl RLNWasm {
}
}
pub fn export_verifier_key(&self) -> VerifierKey {
VerifierKey::new(self.circuit_parameters.clone())
}
#[wasm_bindgen]
pub fn generate_proof(&self, input: &[u8]) -> Result<Vec<u8>, JsValue> {
use rand::chacha::ChaChaRng;
@ -68,20 +195,20 @@ impl RLNWasm {
#[cfg(test)]
mod test {
use wasm_bindgen_test::*;
use crate::circuit::poseidon::PoseidonCircuit;
use crate::circuit::rln::{RLNCircuit, RLNInputs};
use crate::merkle::MerkleTree;
use crate::poseidon::{Poseidon as PoseidonHasher, PoseidonParams};
use bellman::groth16::{generate_random_parameters, Parameters, Proof};
use bellman::pairing::bn256::{Bn256, Fr};
use bellman::pairing::ff::{Field, PrimeField, PrimeFieldRepr};
use rand::{Rand, SeedableRng, XorShiftRng};
use sapling_crypto::bellman::groth16::{generate_random_parameters, Parameters, Proof};
use sapling_crypto::bellman::pairing::bn256::{Bn256, Fr};
use sapling_crypto::bellman::pairing::ff::{Field, PrimeField, PrimeFieldRepr};
use wasm_bindgen_test::*;
fn gen_circuit_parameters(merkle_depth: usize) -> Vec<u8> {
let mut rng = XorShiftRng::from_seed([0x3dbe6258, 0x8d313d76, 0x3237db17, 0xe5bc0654]);
let poseidon_params = PoseidonParams::<Bn256>::default();
let poseidon_params = PoseidonParams::<Bn256>::new(8, 55, 3, None, None, None);
let inputs = RLNInputs::<Bn256>::empty(merkle_depth);
let circuit = RLNCircuit::<Bn256> {
inputs,
@ -95,7 +222,7 @@ mod test {
fn gen_valid_inputs(merkle_depth: usize) -> RLNInputs<Bn256> {
let mut rng = XorShiftRng::from_seed([0x3dbe6258, 0x8d313d76, 0x3237db17, 0xe5bc0654]);
let poseidon_params = PoseidonParams::<Bn256>::default();
let poseidon_params = PoseidonParams::<Bn256>::new(8, 55, 3, None, None, None);
let mut hasher = PoseidonHasher::new(poseidon_params.clone());
let mut membership_tree = MerkleTree::empty(hasher.clone(), merkle_depth);