17 releases (8 breaking)

0.11.1 Aug 13, 2022
0.10.0 Jun 24, 2022

#2361 in Cryptography

Download history 2/week @ 2024-02-23 97/week @ 2024-03-01 8/week @ 2024-03-08

105 downloads per month

Apache-2.0

4MB
22K SLoC

risc0-zkvm-guest

The RISC Zero ZKVM's guest-side RISC-V APIs.

Code that is validated by the RISC Zero zkVM is run inside the guest. In the minimal case, an entrypoint (the guest's "main" function) must be provided by calling [entry]. The code executed when the entrypoint function is called is what will be proven by the zkVM and available for verification later. In almost all practical cases, the guest will want to read private input data using env::read and commit public output data using env::commit; additional I/O functionality is also available in [mod@env].

For example[^starter-ex], the following guest code proves a number is composite by multiplying two unsigned integers, and panicking if either is 1 or if the multiplication overflows:

use risc0_zkvm_guest::env;

risc0_zkvm_guest::entry!(main);

pub fn main() {
    // Load the first number from the host
    let a: u64 = env::read();
    // Load the second number from the host
    let b: u64 = env::read();
    // Verify that neither of them are 1 (i.e. nontrivial factors)
    if a == 1 || b == 1 {
        panic!("Trivial factors")
    }
    // Compute the product while being careful with integer overflow
    let product = a.checked_mul(b).expect("Integer overflow");
    env::commit(&product);
}

Notice how [entry] is used to indicate the entrypoint, env::read is used to load the two factors, and env::commit is used to make their composite product publically available.

[^starter-ex]: The example is based on the Risc Zero Rust Starter repository.

Dependencies

~1.6–5.5MB
~97K SLoC