Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Uncompressed Bulletproof Rangeproofs #108

Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 4 additions & 1 deletion .gitignore
Original file line number Diff line number Diff line change
@@ -1,9 +1,12 @@
bench
bench_bulletproofs
bench_ecmult
bench_generator
bench_rangeproof
bench_internal
bench_whitelist
tests
example_musig
exhaustive_tests
precompute_ecmult_gen
precompute_ecmult
Expand Down Expand Up @@ -66,4 +69,4 @@ src/stamp-h1
libsecp256k1.pc
contrib/gh-pr-create.sh

musig_example
musig_example
4 changes: 4 additions & 0 deletions Makefile.am
Original file line number Diff line number Diff line change
Expand Up @@ -226,6 +226,10 @@ clean-precomp:

EXTRA_DIST = autogen.sh SECURITY.md

if ENABLE_MODULE_BULLETPROOFS
include src/modules/bulletproofs/Makefile.am.include
endif

if ENABLE_MODULE_ECDH
include src/modules/ecdh/Makefile.am.include
endif
Expand Down
1 change: 1 addition & 0 deletions ci/cirrus.sh
Original file line number Diff line number Diff line change
Expand Up @@ -19,6 +19,7 @@ valgrind --version || true
--with-ecmult-gen-precision="$ECMULTGENPRECISION" \
--enable-module-ecdh="$ECDH" --enable-module-recovery="$RECOVERY" \
--enable-module-ecdsa-s2c="$ECDSA_S2C" \
--enable-module-bulletproofs="$BULLETPROOFS" \
--enable-module-rangeproof="$RANGEPROOF" --enable-module-whitelist="$WHITELIST" --enable-module-generator="$GENERATOR" \
--enable-module-schnorrsig="$SCHNORRSIG" --enable-module-musig="$MUSIG" --enable-module-ecdsa-adaptor="$ECDSAADAPTOR" \
--enable-module-schnorrsig="$SCHNORRSIG" \
Expand Down
15 changes: 15 additions & 0 deletions configure.ac
Original file line number Diff line number Diff line change
Expand Up @@ -140,6 +140,11 @@ AC_ARG_ENABLE(examples,
AS_HELP_STRING([--enable-examples],[compile the examples [default=no]]), [],
[SECP_SET_DEFAULT([enable_examples], [no], [yes])])

AC_ARG_ENABLE(module_bulletproofs,
AS_HELP_STRING([--enable-module-bulletproofs],[enable Bulletproofs module (experimental)]),
[],
[SECP_SET_DEFAULT([enable_module_bulletproofs], [no], [yes])])

AC_ARG_ENABLE(module_ecdh,
AS_HELP_STRING([--enable-module-ecdh],[enable ECDH module [default=no]]), [],
[SECP_SET_DEFAULT([enable_module_ecdh], [no], [yes])])
Expand Down Expand Up @@ -417,6 +422,11 @@ if test x"$enable_module_rangeproof" = x"yes"; then
AC_DEFINE(ENABLE_MODULE_RANGEPROOF, 1, [Define this symbol to enable the Pedersen / zero knowledge range proof module])
fi

if test x"$enable_module_bulletproofs" = x"yes"; then
enable_module_generator=yes
AC_DEFINE(ENABLE_MODULE_BULLETPROOFS, 1, [Define this symbol to enable the Bulletproofs module])
fi

if test x"$enable_module_generator" = x"yes"; then
AC_DEFINE(ENABLE_MODULE_GENERATOR, 1, [Define this symbol to enable the NUMS generator module])
fi
Expand Down Expand Up @@ -460,6 +470,9 @@ else
# module (which automatically enables the module dependencies) we want to
# print an error for the dependent module, not the module dependency. Hence,
# we first test dependent modules.
if test x"$enable_module_bulletproofs" = x"yes"; then
AC_MSG_ERROR([Bulletproofs module is experimental. Use --enable-experimental to allow.])
fi
if test x"$enable_module_whitelist" = x"yes"; then
AC_MSG_ERROR([Key whitelisting module is experimental. Use --enable-experimental to allow.])
fi
Expand Down Expand Up @@ -502,6 +515,7 @@ AM_CONDITIONAL([USE_TESTS], [test x"$enable_tests" != x"no"])
AM_CONDITIONAL([USE_EXHAUSTIVE_TESTS], [test x"$enable_exhaustive_tests" != x"no"])
AM_CONDITIONAL([USE_EXAMPLES], [test x"$enable_examples" != x"no"])
AM_CONDITIONAL([USE_BENCHMARK], [test x"$enable_benchmark" = x"yes"])
AM_CONDITIONAL([ENABLE_MODULE_BULLETPROOFS], [test x"$enable_module_bulletproofs" = x"yes"])
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does the AC_OUTPUT section below also need an added line?

AM_CONDITIONAL([ENABLE_MODULE_ECDH], [test x"$enable_module_ecdh" = x"yes"])
AM_CONDITIONAL([ENABLE_MODULE_MUSIG], [test x"$enable_module_musig" = x"yes"])
AM_CONDITIONAL([ENABLE_MODULE_RECOVERY], [test x"$enable_module_recovery" = x"yes"])
Expand Down Expand Up @@ -541,6 +555,7 @@ echo " module whitelist = $enable_module_whitelist"
echo " module musig = $enable_module_musig"
echo " module ecdsa-s2c = $enable_module_ecdsa_s2c"
echo " module ecdsa-adaptor = $enable_module_ecdsa_adaptor"
echo " module bulletproofs = $enable_module_bulletproofs"
echo
echo " asm = $set_asm"
echo " ecmult window size = $set_ecmult_window"
Expand Down
170 changes: 170 additions & 0 deletions include/secp256k1_bulletproofs.h
Original file line number Diff line number Diff line change
@@ -0,0 +1,170 @@
#ifndef _SECP256K1_BULLETPROOFS_
# define _SECP256K1_BULLETPROOFS_

# include "secp256k1.h"
# include "secp256k1_generator.h"

# ifdef __cplusplus
extern "C" {
# endif

#include <stdint.h>

/** A function-like macro returning the size, in bytes, of an uncompressed
* Bulletproof proving that a value lies in the range [0, 2^(n_bits) - 1]
*
* A proof contains: 65 bytes for (A, S); 65 for (T1, T2); 64 for (tau_x, mu)
* followed by n_bits-many scalar pairs (l(i), r(i)).
*/
#define SECP256K1_BULLETPROOFS_UNCOMPRESSED_SIZE(n_bits) (65UL + 65 + 64 + (n_bits) * 64)

/** Maximum size, in bytes, of an uncompressed rangeproof */
extern const size_t SECP256K1_BULLETPROOFS_RANGEPROOF_UNCOMPRESSED_MAX_LENGTH;

/** The same value, as a C macro so it can be used as C89 array size */
#define SECP256K1_BULLETPROOFS_RANGEPROOF_UNCOMPRESSED_MAX_LENGTH_ \
SECP256K1_BULLETPROOFS_UNCOMPRESSED_SIZE(64)

/** Opaque data structure that holds the current state of an uncompressed
* Bulletproof proof generation. This data is not secret and does not need
* to be handled carefully, but neither does it have any meaning outside
* of the API functions that use it.
*
* Obviously you should not modify it or else you will get invalid proofs.
*
* Typical users do not need this structure. If you have more than a few
* hundred bytes of memory to spare create a proof in one shot with the
* TODO function instead.
*/
typedef struct {
unsigned char data[160];
} secp256k1_bulletproofs_prover_context;

/** Opaque structure representing a large number of NUMS generators */
typedef struct secp256k1_bulletproofs_generators secp256k1_bulletproofs_generators;

/** Allocates and initializes a list of NUMS generators
* Returns a list of generators, or NULL if allocation failed.
* Args: ctx: pointer to a context object
* n: number of NUMS generators to produce. Should be 128 to allow for
* 64-bit rangeproofs
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_bulletproofs_generators *secp256k1_bulletproofs_generators_create(
const secp256k1_context* ctx,
size_t n
) SECP256K1_ARG_NONNULL(1);

/** Allocates a list of generators from a static array
* Returns a list of generators, or NULL if allocation or parsing failed.
* Args: ctx: pointer to a context object
* In: data: data that came from `secp256k1_bulletproofs_generators_serialize`
* data_len: the length of the `data` buffer
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_bulletproofs_generators* secp256k1_bulletproofs_generators_parse(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we actually want parsing and serialization in the public API (especially since I don't see it called anywhere outside of tests)? It seems dangerous to trust a serialized list of generators that we didn't create ourselves (there might be some hidden discrete log relation between them), so we might as well always just call create.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It seems dangerous to trust a serialized list of generators that we didn't create ourselves

Many things in life are dangerous :).

In practice I expect this list to be hardcoded, so yes, we need an API that can just blindly accept them.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LOL, fair. Maybe we can include a whitelist of hashes for known safe serialized lists of generators?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How long would this list be?

Copy link
Contributor

@robot-dreams robot-dreams Jul 22, 2022

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Length 1 :) if you want to use something that's not the canonical list of generators then it's on you (I'm assuming there's some "unsafe mode" flag or something).

BTW This is not a huge deal, just wanted to note a possible foot gun.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

How many generators are on the list?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I was thinking 128

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

128 won't be enough for zkps.

const secp256k1_context* ctx,
const unsigned char* data,
size_t data_len
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2);

/** Serializes a list of generators to an array
* Returns 1 on success, 0 if the provided array was not large enough
* Args: ctx: pointer to a context object
* gen: pointer to the generator set to be serialized
* Out: data: pointer to buffer into which the generators will be serialized
* In/Out: data_len: the length of the `data` buffer. Should be initially set to at
* least 33 times the number of generators; will be set to 33 times
* the number of generators on successful return
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_bulletproofs_generators_serialize(
const secp256k1_context* ctx,
const secp256k1_bulletproofs_generators* gen,
unsigned char* data,
size_t *data_len
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4);

/** Destroys a list of NUMS generators, freeing allocated memory
* Args: ctx: pointer to a context object
* gen: pointer to the generator set to be destroyed
* (can be NULL, in which case this function is a no-op)
*/
SECP256K1_API void secp256k1_bulletproofs_generators_destroy(
const secp256k1_context* ctx,
secp256k1_bulletproofs_generators* gen
) SECP256K1_ARG_NONNULL(1);

/** Returns the serialized size of an uncompressed proof of a given number of bits
* Args: ctx: pointer to a context object
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In 04ce24e:
Does this really need to have context? Only to check that it is non-null? It's hard to imagine any CPU-specific optimizations for this function that the extra arg could be justified. I am good if it's just a convention always to have this parameter

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just a convention. I agree it's almost certainly dumb for a simple pure function like this.

* In: n_bits: number of bits to prove (max 64, should usually be 64)
*/
SECP256K1_API size_t secp256k1_bulletproofs_rangeproof_uncompressed_proof_length(
const secp256k1_context* ctx,
size_t n_bits
) SECP256K1_ARG_NONNULL(1);

/** Produces an uncompressed rangeproof. Returns 1 on success, 0 on failure.
* Args: ctx: pointer to a context object
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In 04ce24e:

This should mention that the context should be initialized with verification as well as signing.

I don't exactly know what's the status of static contexts, but AFAIR we no longer need verification contexts. Maybe just mentioning signing context is okay? Or perhaps we should just mention both to be consistent with rest of the library documentation.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

cc @real-or-random isn't there a PR upstream to remove all these annotations?

Both signing and verification of BPs are tested to work with any context objects.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

See bitcoin-core/secp256k1#1126. New API docs will probably end up saying

For secret operations:

ctx: pointer to a context object (not secp256k1_context_static).

For public operations

ctx: pointer to a context object (not secp256k1_context_static).

(see bitcoin-core/secp256k1@2ebc58e#diff-4c52bd5cae65c9519af920228863ca34102abef6414e790498caa9fb05f03bbdR630 )

But that's WIP and we anyway need to clean up all our docs here after the upstream change, so I guess anything is fine here for this PR.

* gens: pointer to the generator set to use, which must have at least 2*n_bits generators
* asset_gen: pointer to the asset generator for the Pedersen/CT commitment
* Out: proof: pointer to a byte array to output the proof into
* In/Out: plen: pointer to the size of the above array; will be set to the actual size of
* the serialized proof. To learn this value in advance, to allocate a sufficient
* buffer, call `secp256k1_bulletproofs_rangeproof_uncompressed_proof_length` or
* use `SECP256K1_BULLETPROOFS_RANGEPROOF_UNCOMPRESSED_MAX_LENGTH`
* In: n_bits: size of range being proven, in bits
* value: value committed in the Pedersen commitment
* min_value: minimum value of the range being proven
* commit: the Pedersen commitment being proven
* blind: blinding factor for the Pedersen commitment
* nonce: seed for the RNG used to generate random data during proving
* enc_data: 32-byte array of extra data which may be decrypted by a verifier who knows `nonce`
* (may be NULL if no data is to be encrypted)
* extra_commit: arbitrary extra data that the proof commits to (may be NULL if extra_commit_len is 0)
* extra_commit_len: length of the arbitrary extra data
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_bulletproofs_rangeproof_uncompressed_prove(
const secp256k1_context* ctx,
const secp256k1_bulletproofs_generators* gens,
const secp256k1_generator* asset_gen,
unsigned char* proof,
size_t* plen,
const size_t n_bits,
const uint64_t value,
const uint64_t min_value,
const secp256k1_pedersen_commitment* commit,
const unsigned char* blind,
const unsigned char* nonce,
const unsigned char* enc_data,
const unsigned char* extra_commit,
size_t extra_commit_len
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5) SECP256K1_ARG_NONNULL(9) SECP256K1_ARG_NONNULL(10) SECP256K1_ARG_NONNULL(11);

/** Verifies an uncompressed rangeproof. Returns 1 on success, 0 on failure.
* Args: ctx: pointer to a context object
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In 04ce24e:

Same comment there about specifying context initialization:

* scratch: pointer to a scratch space
* gens: pointer to the generator set to use, which must have at least 2*n_bits generators
* asset_gen: pointer to the asset generator for the CT commitment
* In: proof: pointer to a byte array containing the serialized proof
* plen: length of the serialized proof
* min_value: minimum value of the range being proven
* commit: the Pedersen commitment being proven
* extra_commit: arbitrary extra data that the proof commits to (may be NULL if extra_commit_len is 0)
* extra_commit_len: length of the arbitrary extra data
*/
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_bulletproofs_rangeproof_uncompressed_verify(
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Comment: Should we add API documentation for this one?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Heh, yeah, and we should fix/complete the API docs for the prover.

const secp256k1_context* ctx,
secp256k1_scratch_space *scratch,
const secp256k1_bulletproofs_generators* gens,
const secp256k1_generator* asset_gen,
const unsigned char* proof,
const size_t plen,
const uint64_t min_value,
const secp256k1_pedersen_commitment* commit,
const unsigned char* extra_commit,
size_t extra_commit_len
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5) SECP256K1_ARG_NONNULL(8);

# ifdef __cplusplus
}
# endif

#endif
Loading