2 releases

0.8.1 Nov 11, 2024
0.8.0 Nov 22, 2023

#739 in Cryptography

Download history 33/week @ 2024-08-26 32/week @ 2024-09-09 8/week @ 2024-09-16 44/week @ 2024-09-23 23/week @ 2024-09-30 25/week @ 2024-10-07 56/week @ 2024-10-14 49/week @ 2024-10-21 29/week @ 2024-10-28 31/week @ 2024-11-04 194/week @ 2024-11-11 75/week @ 2024-11-18 52/week @ 2024-11-25 27/week @ 2024-12-02 48/week @ 2024-12-09

210 downloads per month
Used in 3 crates (2 directly)

CC0 license

66KB
982 lines

lox-zkp: a(n updated) toolkit for Schnorr proofs used by Lox

Background

This crate was originally created as part of dalek-cyptography and then was forked to zkcrypto and updated to include forks of dalek-cryptography dependencies that were compatible with zkcrypto's zkp crate. These forks have since fallen out of sync with the upstream dalek-cryptography crates which has led to incompatabilities when relying on up-to-date dependencies in projects that rely on both zkp and dalek-cryptography crates, such as Lox. This crate was created for 3 reasons:

  1. To bring the zkp crate up to date with dalek-cryptography dependencies
  2. To resolve a bug in the zkp crate
  3. To enabling publishing additional lox crates to crates.io with a working zkp dependency.

This crate has a toolkit for Schnorr-style zero-knowledge proofs, instantiated using the ristretto255 group.

It provides two levels of API:

  • a higher-level, declarative API based around the define_proof macro, which provides an embedded DSL for specifying proof statements in Camenisch-Stadler-like notation:

    define_proof! {
      vrf_proof,   // Name of the module for generated implementation
      "VRF",       // Label for the proof statement
      (x),         // Secret variables
      (A, G, H),   // Public variables unique to each proof
      (B) :        // Public variables common between proofs
      A = (x * B), // Statements to prove
      G = (x * H) 
      }
    

    This expands into a module containing an implementation of proving, verification, and batch verification. Proving uses constant-time implementations, and the proofs have a derived implementation of (memory-safe) serialization and deserialization via Serde.

  • a lower-level, imperative API inspired by Bellman, which provides a constraint system for Schnorr-style statements. This allows programmable construction of proof statements at runtime. The higher-level define_proof macro expands into an invocation of the lower-level API. The lower-level API is contained in the toolbox module.

Examples

Examples of how to use the API can be found in the library's tests directory.

Currently, the examples include:

  • Specification of an "anonymous credential presentation with 10 hidden attributes" proof from CMZ'13. Depending on the backend selection, the generated implementation is between 20 to 40 times faster than the benchmark numbers reported in that paper.

  • A transcript-based signature and VRF construction with an auto-generated implementation. This includes an example of using the online interactive composition described in the Merlin blog post to provide chained signatures with a counterparty.

  • An example of using the lower-level constraint system API.

Use and features

To enable the define_proof macro, import the crate like so:

#[macro_use]
extern crate zkp;

Nightly features

The nightly feature enables nightly-specific features. It is required to build the documentation.

Transcript debugging

The debug-transcript feature is for development and testing, and prints a log of the data fed into the proof transcript.

Autogenerated benchmarks

The define_proof macro builds benchmarks for the generated proof statements, but because these are generated in the client crate (where the macro expansion happens), they need an extra step to be enabled.

To enable generated benchmarks in your crate, do the following:

  • Add a bench feature to your crate's Cargo.toml;
  • Add #[cfg_attr(feature = "bench", feature(test))] to your crate's lib.rs or main.rs, to enable Rust's nightly-only benchmark feature.

WARNING

THIS IMPLEMENTATION IS NOT YET READY FOR PRODUCTION USE

While I expect the 1.0 version to be largely unchanged from the current code, for now there are no stability guarantees on the proofs, so they should not yet be deployed.

Dependencies

~2.2–3.5MB
~76K SLoC