Merge pull request #16 from appliedzkp/feat/structured_public_signals

feat(zk-protocol): structure the public signals array obtained while generating a proof from snarkjs
This commit is contained in:
Omar Desogus
2022-02-18 22:38:49 +01:00
committed by GitHub
6 changed files with 101 additions and 19 deletions

View File

@@ -1,10 +1,40 @@
import { MerkleProof } from "@zk-kit/incremental-merkle-tree"
import { poseidon } from "circomlibjs"
import { StrBigInt } from "./types"
import { groth16 } from "snarkjs"
import { FullProof, RLNPublicSignals, StrBigInt } from "./types"
import { Fq, genSignalHash } from "./utils"
import ZkProtocol from "./zk-protocol"
export default class RLN extends ZkProtocol {
/**
* The number of public signals that should be returned by snarkjs when generating a proof.
*/
private static PUBLIC_SIGNALS_COUNT: number = 6
/**
* Generates a SnarkJS full proof with Groth16.
* @param witness The parameters for creating the proof.
* @param wasmFilePath The WASM file path.
* @param finalZkeyPath The ZKey file path.
* @returns The full SnarkJS proof.
*/
public static async genProof(witness: any, wasmFilePath: string, finalZkeyPath: string): Promise<FullProof> {
const { proof, publicSignalsArray } = await groth16.fullProve(witness, wasmFilePath, finalZkeyPath, null)
if (publicSignalsArray.length !== RLN.PUBLIC_SIGNALS_COUNT) throw new Error("Error while generating proof")
const publicSignals: RLNPublicSignals = {
yShare: publicSignalsArray[0],
merkleRoot: publicSignalsArray[1],
internalNullifier: publicSignalsArray[2],
signalHash: publicSignalsArray[3],
epoch: publicSignalsArray[4],
rlnIdentifier: publicSignalsArray[5]
}
return { proof, publicSignals }
}
/**
* Creates witness for rln proof
* @param identitySecret identity secret

View File

@@ -1,10 +1,38 @@
import { MerkleProof } from "@zk-kit/incremental-merkle-tree"
import { poseidon } from "circomlibjs"
import { SemaphoreWitness, StrBigInt } from "./types"
import { groth16 } from "snarkjs"
import { FullProof, StrBigInt, SemaphoreWitness, SemaphorePublicSignals } from "./types"
import { genSignalHash } from "./utils"
import ZkProtocol from "./zk-protocol"
export default class Semaphore extends ZkProtocol {
/**
* The number of public signals that should be returned by snarkjs when generating a proof.
*/
private static PUBLIC_SIGNALS_COUNT: number = 6
/**
* Generates a SnarkJS full proof with Groth16.
* @param witness The parameters for creating the proof.
* @param wasmFilePath The WASM file path.
* @param finalZkeyPath The ZKey file path.
* @returns The full SnarkJS proof.
*/
public static async genProof(witness: any, wasmFilePath: string, finalZkeyPath: string): Promise<FullProof> {
const { proof, publicSignalsArray } = await groth16.fullProve(witness, wasmFilePath, finalZkeyPath, null)
if (publicSignalsArray.length !== Semaphore.PUBLIC_SIGNALS_COUNT) throw new Error("Error while generating proof")
const publicSignals: SemaphorePublicSignals = {
merkleRoot: publicSignalsArray[0],
nullifierHash: publicSignalsArray[1],
signalHash: publicSignalsArray[2],
externalNullifier: publicSignalsArray[3]
}
return { proof, publicSignals }
}
/**
* Creates a Semaphore witness for the Semaphore ZK proof.
* @param identityTrapdoor The identity trapdoor.

View File

@@ -10,7 +10,23 @@ export type Proof = {
export type FullProof = {
proof: Proof
publicSignals: StrBigInt[]
publicSignals: RLNPublicSignals | SemaphorePublicSignals
}
export type RLNPublicSignals = {
yShare: StrBigInt
merkleRoot: StrBigInt
internalNullifier: StrBigInt
signalHash: StrBigInt
epoch: StrBigInt
rlnIdentifier: StrBigInt
}
export type SemaphorePublicSignals = {
merkleRoot: StrBigInt
nullifierHash: StrBigInt
signalHash: StrBigInt
externalNullifier: StrBigInt
}
export type SolidityProof = StrBigInt[]

View File

@@ -1,20 +1,8 @@
/* istanbul ignore file */
import { groth16 } from "snarkjs"
import { FullProof, SolidityProof } from "./types"
import { FullProof, SolidityProof, StrBigInt } from "./types"
export default class ZkProtocol {
/**
* Generates a SnarkJS full proof with Groth16.
* @param witness The parameters for creating the proof.
* @param wasmFilePath The WASM file path.
* @param finalZkeyPath The ZKey file path.
* @returns The full SnarkJS proof.
*/
public static async genProof(witness: any, wasmFilePath: string, finalZkeyPath: string): Promise<FullProof> {
const { proof, publicSignals } = await groth16.fullProve(witness, wasmFilePath, finalZkeyPath, null)
return { proof, publicSignals }
}
/**
* Verifies a zero-knowledge SnarkJS proof.
* @param verificationKey The zero-knowledge verification key.
@@ -24,7 +12,9 @@ export default class ZkProtocol {
public static verifyProof(verificationKey: string, fullProof: FullProof): Promise<boolean> {
const { proof, publicSignals } = fullProof
return groth16.verify(verificationKey, publicSignals, proof)
const publicSignalsArray: StrBigInt[] = Object.values(publicSignals)
return groth16.verify(verificationKey, publicSignalsArray, proof)
}
/**

View File

@@ -4,6 +4,7 @@ import * as fs from "fs"
import * as path from "path"
import { RLN } from "../src"
import { generateMerkleProof, genExternalNullifier, genSignalHash } from "../src/utils"
import { RLNPublicSignals } from "../src/types"
describe("RLN", () => {
const zkeyFiles = "./packages/protocols/zkeyFiles"
@@ -65,7 +66,15 @@ describe("RLN", () => {
const witness = RLN.genWitness(secretHash, merkleProof, epoch, signal, rlnIdentifier)
const [y, nullifier] = RLN.calculateOutput(secretHash, BigInt(epoch), rlnIdentifier, signalHash)
const publicSignals = [y, merkleProof.root, nullifier, signalHash, epoch, rlnIdentifier]
const publicSignals: RLNPublicSignals = {
yShare: y,
merkleRoot: merkleProof.root,
internalNullifier: nullifier,
signalHash,
epoch,
rlnIdentifier
}
const vkeyPath = path.join(zkeyFiles, "rln", "verification_key.json")
const vKey = JSON.parse(fs.readFileSync(vkeyPath, "utf-8"))
@@ -77,6 +86,7 @@ describe("RLN", () => {
const response = await RLN.verifyProof(vKey, { proof: fullProof.proof, publicSignals })
expect(response).toBe(true)
expect(fullProof.publicSignals).toEqual(publicSignals)
}, 30000)
it("Should retrieve user secret after spaming", () => {

View File

@@ -3,6 +3,7 @@ import { getCurveFromName } from "ffjavascript"
import fs from "fs"
import path from "path"
import { Semaphore } from "../src"
import { SemaphorePublicSignals } from "../src/types"
import { generateMerkleProof, genExternalNullifier, genSignalHash } from "../src/utils"
describe("Semaphore", () => {
@@ -64,11 +65,18 @@ describe("Semaphore", () => {
const vkeyPath = path.join("./packages/protocols/zkeyFiles", "semaphore", "verification_key.json")
const vKey = JSON.parse(fs.readFileSync(vkeyPath, "utf-8"))
const nullifierHash = Semaphore.genNullifierHash(externalNullifier, identity.getNullifier())
const publicSignals = [merkleProof.root.toString(), nullifierHash, genSignalHash(signal), externalNullifier]
const publicSignals: SemaphorePublicSignals = {
merkleRoot: merkleProof.root.toString(),
nullifierHash,
signalHash: genSignalHash(signal),
externalNullifier
}
const response = await Semaphore.verifyProof(vKey, { proof: fullProof.proof, publicSignals })
expect(response).toBe(true)
expect(fullProof.publicSignals).toEqual(publicSignals)
}, 30000)
})
})