249 lines
9.5 KiB
C++
249 lines
9.5 KiB
C++
/**
|
|
* @file wraplibsnark.cpp
|
|
* @author Jacob Eberhardt <jacob.eberhardt@tu-berlin.de
|
|
* @author Dennis Kuhnert <dennis.kuhnert@campus.tu-berlin.de>
|
|
* @date 2017
|
|
*/
|
|
|
|
#include "util.hpp"
|
|
#include "gm17.hpp"
|
|
#include <fstream>
|
|
#include <iostream>
|
|
#include <cassert>
|
|
#include <iomanip>
|
|
|
|
// contains definition of alt_bn128 ec public parameters
|
|
#include "libff/algebra/curves/alt_bn128/alt_bn128_pp.hpp"
|
|
// contains required interfaces and types (keypair, proof, generator, prover, verifier)
|
|
#include <libsnark/zk_proof_systems/ppzksnark/r1cs_se_ppzksnark/r1cs_se_ppzksnark.hpp>
|
|
|
|
typedef long integer_coeff_t;
|
|
|
|
using namespace std;
|
|
using namespace libsnark;
|
|
|
|
namespace gm17 {
|
|
|
|
//takes input and puts it into constraint system
|
|
r1cs_se_ppzksnark_constraint_system<libff::alt_bn128_pp> createConstraintSystem(const uint8_t* A, const uint8_t* B, const uint8_t* C, int A_len, int B_len, int C_len, int constraints, int variables, int inputs)
|
|
{
|
|
r1cs_se_ppzksnark_constraint_system<libff::alt_bn128_pp> cs;
|
|
cs.primary_input_size = inputs;
|
|
cs.auxiliary_input_size = variables - inputs - 1; // ~one not included
|
|
|
|
cout << "num variables: " << variables <<endl;
|
|
cout << "num constraints: " << constraints <<endl;
|
|
cout << "num inputs: " << inputs <<endl;
|
|
|
|
struct VariableValueMapping {
|
|
int constraint_id;
|
|
int variable_id;
|
|
uint8_t variable_value[32];
|
|
};
|
|
const VariableValueMapping* A_vvmap = (VariableValueMapping*) A;
|
|
const VariableValueMapping* B_vvmap = (VariableValueMapping*) B;
|
|
const VariableValueMapping* C_vvmap = (VariableValueMapping*) C;
|
|
|
|
int A_id = 0;
|
|
int B_id = 0;
|
|
int C_id = 0;
|
|
|
|
libff::alt_bn128_pp::init_public_params();
|
|
|
|
for (int row = 0; row < constraints; row++) {
|
|
linear_combination<libff::Fr<libff::alt_bn128_pp> > lin_comb_A, lin_comb_B, lin_comb_C;
|
|
|
|
while (A_id < A_len && A_vvmap[A_id].constraint_id == row) {
|
|
libff::bigint<libff::alt_bn128_r_limbs> value = libsnarkBigintFromBytes(A_vvmap[A_id].variable_value);
|
|
if (!value.is_zero())
|
|
lin_comb_A.add_term(A_vvmap[A_id].variable_id, value);
|
|
A_id++;
|
|
}
|
|
while (B_id < B_len && B_vvmap[B_id].constraint_id == row) {
|
|
libff::bigint<libff::alt_bn128_r_limbs> value = libsnarkBigintFromBytes(B_vvmap[B_id].variable_value);
|
|
if (!value.is_zero())
|
|
lin_comb_B.add_term(B_vvmap[B_id].variable_id, value);
|
|
B_id++;
|
|
}
|
|
while (C_id < C_len && C_vvmap[C_id].constraint_id == row) {
|
|
libff::bigint<libff::alt_bn128_r_limbs> value = libsnarkBigintFromBytes(C_vvmap[C_id].variable_value);
|
|
if (!value.is_zero())
|
|
lin_comb_C.add_term(C_vvmap[C_id].variable_id, value);
|
|
C_id++;
|
|
}
|
|
|
|
cs.add_constraint(r1cs_constraint<libff::Fr<libff::alt_bn128_pp> >(lin_comb_A, lin_comb_B, lin_comb_C));
|
|
}
|
|
|
|
return cs;
|
|
}
|
|
|
|
// keypair generateKeypair(constraints)
|
|
r1cs_se_ppzksnark_keypair<libff::alt_bn128_pp> generateKeypair(const r1cs_se_ppzksnark_constraint_system<libff::alt_bn128_pp> &cs){
|
|
// from r1cs_se_ppzksnark.hpp
|
|
return r1cs_se_ppzksnark_generator<libff::alt_bn128_pp>(cs);
|
|
}
|
|
|
|
void serializeProvingKeyToFile(r1cs_se_ppzksnark_proving_key<libff::alt_bn128_pp> pk, const char* pk_path){
|
|
writeToFile(pk_path, pk);
|
|
}
|
|
|
|
r1cs_se_ppzksnark_proving_key<libff::alt_bn128_pp> deserializeProvingKeyFromFile(const char* pk_path){
|
|
return loadFromFile<r1cs_se_ppzksnark_proving_key<libff::alt_bn128_pp>>(pk_path);
|
|
}
|
|
|
|
void serializeVerificationKeyToFile(r1cs_se_ppzksnark_verification_key<libff::alt_bn128_pp> vk, const char* vk_path){
|
|
std::stringstream ss;
|
|
|
|
unsigned queryLength = vk.query.size();
|
|
|
|
ss << "\t\tvk.H = " << outputPointG2AffineAsHex(vk.H) << endl;
|
|
ss << "\t\tvk.Galpha = " << outputPointG1AffineAsHex(vk.G_alpha) << endl;
|
|
ss << "\t\tvk.Hbeta = " << outputPointG2AffineAsHex(vk.H_beta) << endl;
|
|
ss << "\t\tvk.Ggamma = " << outputPointG1AffineAsHex(vk.G_gamma) << endl;
|
|
ss << "\t\tvk.Hgamma = " << outputPointG2AffineAsHex(vk.H_gamma) << endl;
|
|
ss << "\t\tvk.query.len() = " << queryLength << endl;
|
|
for (size_t i = 0; i < queryLength; ++i)
|
|
{
|
|
auto vkqueryi = outputPointG1AffineAsHex(vk.query[i]);
|
|
ss << "\t\tvk.query[" << i << "] = " << vkqueryi << endl;
|
|
}
|
|
|
|
std::ofstream fh;
|
|
fh.open(vk_path, std::ios::binary);
|
|
ss.rdbuf()->pubseekpos(0, std::ios_base::out);
|
|
fh << ss.rdbuf();
|
|
fh.flush();
|
|
fh.close();
|
|
}
|
|
|
|
// compliant with solidty verification example
|
|
void exportVerificationKey(r1cs_se_ppzksnark_keypair<libff::alt_bn128_pp> keypair){
|
|
auto vk = keypair.vk;
|
|
unsigned queryLength = vk.query.size();
|
|
|
|
cout << "\t\tvk.H = " << outputPointG2AffineAsHex(vk.H) << endl;
|
|
cout << "\t\tvk.Galpha = " << outputPointG1AffineAsHex(vk.G_alpha) << endl;
|
|
cout << "\t\tvk.Hbeta = " << outputPointG2AffineAsHex(vk.H_beta) << endl;
|
|
cout << "\t\tvk.Ggamma = " << outputPointG1AffineAsHex(vk.G_gamma) << endl;
|
|
cout << "\t\tvk.Hgamma = " << outputPointG2AffineAsHex(vk.H_gamma) << endl;
|
|
cout << "\t\tvk.query.len() = " << queryLength << endl;
|
|
for (size_t i = 0; i < queryLength; ++i)
|
|
{
|
|
auto vkqueryi = outputPointG1AffineAsHex(vk.query[i]);
|
|
cout << "\t\tvk.query[" << i << "] = " << vkqueryi << endl;
|
|
}
|
|
cout << "\t\t}" << endl;
|
|
}
|
|
|
|
void printProof(r1cs_se_ppzksnark_proof<libff::alt_bn128_pp> proof, const char* proof_path, const uint8_t* public_inputs,
|
|
int public_inputs_length){
|
|
cout << "Proof:"<< endl;
|
|
cout << "A = Pairing.G1Point(" << outputPointG1AffineAsHex(proof.A)<< ");" << endl;
|
|
cout << "B = Pairing.G2Point(" << outputPointG2AffineAsHex(proof.B)<< ");" << endl;
|
|
cout << "C = Pairing.G1Point(" << outputPointG1AffineAsHex(proof.C)<< ");" << endl;
|
|
|
|
//create JSON file
|
|
std::stringstream ss;
|
|
ss << "{" << "\n";
|
|
ss << "\t\"proof\":" << "\n";
|
|
ss << "\t{" << "\n";
|
|
ss << "\t\t\"A\":" <<outputPointG1AffineAsHexJson(proof.A) << ",\n";
|
|
ss << "\t\t\"B\":" << "\n";
|
|
ss << "\t\t\t" << outputPointG2AffineAsHexJson(proof.B) << ",\n";
|
|
ss << "\t\t\n";
|
|
ss << "\t\t\"C\":" <<outputPointG1AffineAsHexJson(proof.C) << ",\n";
|
|
ss << "\t}," << "\n";
|
|
//add input to json
|
|
ss << "\t\"input\":" << "[";
|
|
for (int i = 1; i < public_inputs_length; i++) {
|
|
if(i!=1){
|
|
ss << ",";
|
|
}
|
|
ss << libsnarkBigintFromBytes(public_inputs + i*32);
|
|
}
|
|
ss << "]" << "\n";
|
|
ss << "}" << "\n";
|
|
|
|
std::string s = ss.str();
|
|
//write json string to proof_path
|
|
writeToFile(proof_path, s);
|
|
}
|
|
|
|
// compliant with solidty verification example
|
|
void exportInput(r1cs_primary_input<libff::Fr<libff::alt_bn128_pp>> input){
|
|
cout << "\tInput in Solidity compliant format:{" << endl;
|
|
for (size_t i = 0; i < input.size(); ++i)
|
|
{
|
|
cout << "\t\tinput[" << i << "] = " << HexStringFromLibsnarkBigint(input[i].as_bigint()) << ";" << endl;
|
|
}
|
|
cout << "\t\t}" << endl;
|
|
}
|
|
|
|
}
|
|
|
|
bool _gm17_setup(const uint8_t* A, const uint8_t* B, const uint8_t* C, int A_len, int B_len, int C_len, int constraints, int variables, int inputs, const char* pk_path, const char* vk_path)
|
|
{
|
|
libff::inhibit_profiling_info = true;
|
|
libff::inhibit_profiling_counters = true;
|
|
|
|
//initialize curve parameters
|
|
libff::alt_bn128_pp::init_public_params();
|
|
|
|
auto cs = gm17::createConstraintSystem(A, B, C, A_len, B_len, C_len, constraints, variables, inputs);
|
|
|
|
assert(cs.num_variables() >= (unsigned)inputs);
|
|
assert(cs.num_inputs() == (unsigned)inputs);
|
|
assert(cs.num_constraints() == (unsigned)constraints);
|
|
|
|
// create keypair
|
|
auto keypair = r1cs_se_ppzksnark_generator<libff::alt_bn128_pp>(cs);
|
|
|
|
// Export vk and pk to files
|
|
gm17::serializeProvingKeyToFile(keypair.pk, pk_path);
|
|
gm17::serializeVerificationKeyToFile(keypair.vk, vk_path);
|
|
|
|
// Print VerificationKey in Solidity compatible format
|
|
gm17::exportVerificationKey(keypair);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool _gm17_generate_proof(const char* pk_path, const char* proof_path, const uint8_t* public_inputs, int public_inputs_length, const uint8_t* private_inputs, int private_inputs_length)
|
|
{
|
|
libff::inhibit_profiling_info = true;
|
|
libff::inhibit_profiling_counters = true;
|
|
|
|
//initialize curve parameters
|
|
libff::alt_bn128_pp::init_public_params();
|
|
auto pk = gm17::deserializeProvingKeyFromFile(pk_path);
|
|
|
|
// assign variables based on witness values, excludes ~one
|
|
r1cs_variable_assignment<libff::Fr<libff::alt_bn128_pp> > full_variable_assignment;
|
|
for (int i = 1; i < public_inputs_length; i++) {
|
|
full_variable_assignment.push_back(libff::Fr<libff::alt_bn128_pp>(libsnarkBigintFromBytes(public_inputs + i*32)));
|
|
}
|
|
for (int i = 0; i < private_inputs_length; i++) {
|
|
full_variable_assignment.push_back(libff::Fr<libff::alt_bn128_pp>(libsnarkBigintFromBytes(private_inputs + i*32)));
|
|
}
|
|
|
|
// split up variables into primary and auxiliary inputs. Does *NOT* include the constant 1
|
|
// Public variables belong to primary input, private variables are auxiliary input.
|
|
r1cs_primary_input<libff::Fr<libff::alt_bn128_pp>> primary_input(full_variable_assignment.begin(), full_variable_assignment.begin() + public_inputs_length-1);
|
|
r1cs_primary_input<libff::Fr<libff::alt_bn128_pp>> auxiliary_input(full_variable_assignment.begin() + public_inputs_length-1, full_variable_assignment.end());
|
|
|
|
// for debugging
|
|
// cout << "full variable assignment:"<< endl << full_variable_assignment;
|
|
// cout << "primary input:"<< endl << primary_input;
|
|
// cout << "auxiliary input:"<< endl << auxiliary_input;
|
|
|
|
// Proof Generation
|
|
auto proof = r1cs_se_ppzksnark_prover<libff::alt_bn128_pp>(pk, primary_input, auxiliary_input);
|
|
|
|
// print proof
|
|
gm17::printProof(proof, proof_path, public_inputs, public_inputs_length);
|
|
// TODO? print inputs
|
|
|
|
return true;
|
|
}
|
|
|