Files
darkfi/tests/zkvm_opcodes.rs
2022-12-13 15:19:09 +01:00

117 lines
4.1 KiB
Rust

/* This file is part of DarkFi (https://dark.fi)
*
* Copyright (C) 2020-2022 Dyne.org foundation
*
* This program is free software: you can redistribute it and/or modify
* it under the terms of the GNU Affero General Public License as
* published by the Free Software Foundation, either version 3 of the
* License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU Affero General Public License for more details.
*
* You should have received a copy of the GNU Affero General Public License
* along with this program. If not, see <https://www.gnu.org/licenses/>.
*/
use darkfi_sdk::{
crypto::{pedersen::pedersen_commitment_u64, MerkleNode, PublicKey, SecretKey},
incrementalmerkletree::{bridgetree::BridgeTree, Tree},
};
use halo2_gadgets::poseidon::{
primitives as poseidon,
primitives::{ConstantLength, P128Pow5T3},
};
use halo2_proofs::{
arithmetic::{CurveAffine, Field},
circuit::Value,
pasta::{group::Curve, pallas},
};
use rand::rngs::OsRng;
use simplelog::{ColorChoice, Config, LevelFilter, TermLogger, TerminalMode};
use darkfi::{
zk::{
proof::{ProvingKey, VerifyingKey},
vm::ZkCircuit,
vm_stack::{empty_witnesses, Witness},
Proof,
},
zkas::ZkBinary,
Result,
};
#[test]
fn zkvm_opcodes() -> Result<()> {
TermLogger::init(LevelFilter::Debug, Config::default(), TerminalMode::Mixed, ColorChoice::Auto)
.unwrap();
let bincode = include_bytes!("../proof/opcodes.zk.bin");
let zkbin = ZkBinary::decode(bincode)?;
// Values for the proof
let value = 666_u64;
let value_blind = pallas::Scalar::random(&mut OsRng);
let blind = pallas::Base::random(&mut OsRng);
let secret = pallas::Base::random(&mut OsRng);
let a = pallas::Base::from(42);
let b = pallas::Base::from(69);
let mut tree = BridgeTree::<MerkleNode, 32>::new(100);
let c0 = pallas::Base::random(&mut OsRng);
let c1 = pallas::Base::random(&mut OsRng);
let c3 = pallas::Base::random(&mut OsRng);
let c2 = {
let messages = [pallas::Base::one(), blind];
poseidon::Hash::<_, P128Pow5T3, ConstantLength<2>, 3, 2>::init().hash(messages)
};
tree.append(&MerkleNode::from(c0));
tree.witness();
tree.append(&MerkleNode::from(c1));
tree.append(&MerkleNode::from(c2));
let leaf_pos = tree.witness().unwrap();
tree.append(&MerkleNode::from(c3));
tree.witness();
let root = tree.root(0).unwrap();
let merkle_path = tree.authentication_path(leaf_pos, &root).unwrap();
let leaf_pos: u64 = leaf_pos.into();
let prover_witnesses = vec![
Witness::Base(Value::known(pallas::Base::from(value))),
Witness::Scalar(Value::known(value_blind)),
Witness::Base(Value::known(blind)),
Witness::Base(Value::known(a)),
Witness::Base(Value::known(b)),
Witness::Base(Value::known(secret)),
Witness::Uint32(Value::known(leaf_pos.try_into().unwrap())),
Witness::MerklePath(Value::known(merkle_path.try_into().unwrap())),
];
let value_commit = pedersen_commitment_u64(value, value_blind);
let value_coords = value_commit.to_affine().coordinates().unwrap();
let d_m = [pallas::Base::one(), blind, *value_coords.x(), *value_coords.y()];
let d = poseidon::Hash::<_, P128Pow5T3, ConstantLength<4>, 3, 2>::init().hash(d_m);
let public = PublicKey::from_secret(SecretKey::from(secret));
let (pub_x, pub_y) = public.xy();
let public_inputs =
vec![*value_coords.x(), *value_coords.y(), c2, d, root.inner(), pub_x, pub_y];
let circuit = ZkCircuit::new(prover_witnesses, zkbin.clone());
let proving_key = ProvingKey::build(13, &circuit);
let proof = Proof::create(&proving_key, &[circuit], &public_inputs, &mut OsRng)?;
let verifier_witnesses = empty_witnesses(&zkbin);
let circuit = ZkCircuit::new(verifier_witnesses, zkbin);
let verifying_key = VerifyingKey::build(13, &circuit);
proof.verify(&verifying_key, &public_inputs)?;
Ok(())
}