#poseidon-hash #zero-knowledge-proofs #scalar-field #elliptic-curve #zero-knowledge

no-std dusk-poseidon

Implementation of Poseidon hash algorithm over the Bls12-381 Scalar field

40 releases (22 breaking)

0.40.0 Aug 14, 2024
0.39.0 May 8, 2024
0.38.0 Apr 24, 2024
0.37.0 Mar 27, 2024
0.20.0-pre.1 Mar 31, 2021

#183 in Cryptography

Download history 174/week @ 2024-08-17 42/week @ 2024-08-24 184/week @ 2024-08-31 290/week @ 2024-09-07 76/week @ 2024-09-14 277/week @ 2024-09-21 239/week @ 2024-09-28 568/week @ 2024-10-05 585/week @ 2024-10-12 233/week @ 2024-10-19 156/week @ 2024-10-26 181/week @ 2024-11-02 112/week @ 2024-11-09 99/week @ 2024-11-16 146/week @ 2024-11-23 95/week @ 2024-11-30

496 downloads per month
Used in 14 crates (12 directly)

MPL-2.0 license

67KB
754 lines

Build Status Repository Documentation

Dusk-Poseidon

Reference implementation for the Poseidon Hashing algorithm.

Reference: Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems

This repository has been created so there's a unique library that holds the tools & functions required to perform Poseidon Hashes on field elements of the bls12-381 elliptic curve.

The hash uses the Hades design for its inner permutation and the SAFE framework for contstructing the sponge.

The library provides the two hashing techniques of Poseidon:

  • The 'normal' hashing functionalities operating on BlsScalar.
  • The 'gadget' hashing functionalities that build a circuit which outputs the hash.

Example

use rand::rngs::StdRng;
use rand::SeedableRng;

use dusk_poseidon::{Domain, Hash};
use dusk_bls12_381::BlsScalar;
use ff::Field;

// generate random input
let mut rng = StdRng::seed_from_u64(0xbeef);
let mut input = [BlsScalar::zero(); 42];
for scalar in input.iter_mut() {
    *scalar = BlsScalar::random(&mut rng);
}

// digest the input all at once
let hash = Hash::digest(Domain::Other, &input);

// update the input gradually
let mut hasher = Hash::new(Domain::Other);
hasher.update(&input[..3]);
hasher.update(&input[3..]);
assert_eq!(hash, hasher.finalize());

// create a hash used for merkle tree hashing with arity = 4
let merkle_hash = Hash::digest(Domain::Merkle4, &input[..4]);

// which is different when another domain is used
assert_ne!(merkle_hash, Hash::digest(Domain::Other, &input[..4]));

Benchmarks

There are benchmarks for hashing, encrypting and decrypting in their native form, operating on Scalar, and for a zero-knowledge circuit proof generation and verification.

To run all benchmarks on your machine, run

cargo bench --features=zk,encryption

in the repository.

Licensing

This code is licensed under Mozilla Public License Version 2.0 (MPL-2.0). Please see LICENSE for further info.

About

Implementation designed by the dusk team.

Contributing

  • If you want to contribute to this repository/project please, check CONTRIBUTING.md
  • If you want to report a bug or request a new feature addition, please open an issue on this repository.

Dependencies

~4MB
~92K SLoC