-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Uncompressed Bulletproof Rangeproofs #108
Changes from all commits
e2061cb
a4ce304
290c479
2cc4261
b2cdcee
31b998d
3385353
28c5f18
2e651b9
264924c
28d8c3c
ecea06c
e22225c
c1d6e95
6463ffb
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,170 @@ | ||
#ifndef _SECP256K1_BULLETPROOFS_ | ||
# define _SECP256K1_BULLETPROOFS_ | ||
|
||
# include "secp256k1.h" | ||
# include "secp256k1_generator.h" | ||
|
||
# ifdef __cplusplus | ||
extern "C" { | ||
# endif | ||
|
||
#include <stdint.h> | ||
|
||
/** A function-like macro returning the size, in bytes, of an uncompressed | ||
* Bulletproof proving that a value lies in the range [0, 2^(n_bits) - 1] | ||
* | ||
* A proof contains: 65 bytes for (A, S); 65 for (T1, T2); 64 for (tau_x, mu) | ||
* followed by n_bits-many scalar pairs (l(i), r(i)). | ||
*/ | ||
#define SECP256K1_BULLETPROOFS_UNCOMPRESSED_SIZE(n_bits) (65UL + 65 + 64 + (n_bits) * 64) | ||
|
||
/** Maximum size, in bytes, of an uncompressed rangeproof */ | ||
extern const size_t SECP256K1_BULLETPROOFS_RANGEPROOF_UNCOMPRESSED_MAX_LENGTH; | ||
|
||
/** The same value, as a C macro so it can be used as C89 array size */ | ||
#define SECP256K1_BULLETPROOFS_RANGEPROOF_UNCOMPRESSED_MAX_LENGTH_ \ | ||
SECP256K1_BULLETPROOFS_UNCOMPRESSED_SIZE(64) | ||
|
||
/** Opaque data structure that holds the current state of an uncompressed | ||
* Bulletproof proof generation. This data is not secret and does not need | ||
* to be handled carefully, but neither does it have any meaning outside | ||
* of the API functions that use it. | ||
* | ||
* Obviously you should not modify it or else you will get invalid proofs. | ||
* | ||
* Typical users do not need this structure. If you have more than a few | ||
* hundred bytes of memory to spare create a proof in one shot with the | ||
* TODO function instead. | ||
*/ | ||
typedef struct { | ||
unsigned char data[160]; | ||
} secp256k1_bulletproofs_prover_context; | ||
|
||
/** Opaque structure representing a large number of NUMS generators */ | ||
typedef struct secp256k1_bulletproofs_generators secp256k1_bulletproofs_generators; | ||
|
||
/** Allocates and initializes a list of NUMS generators | ||
* Returns a list of generators, or NULL if allocation failed. | ||
* Args: ctx: pointer to a context object | ||
* n: number of NUMS generators to produce. Should be 128 to allow for | ||
* 64-bit rangeproofs | ||
*/ | ||
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_bulletproofs_generators *secp256k1_bulletproofs_generators_create( | ||
const secp256k1_context* ctx, | ||
size_t n | ||
) SECP256K1_ARG_NONNULL(1); | ||
|
||
/** Allocates a list of generators from a static array | ||
* Returns a list of generators, or NULL if allocation or parsing failed. | ||
* Args: ctx: pointer to a context object | ||
* In: data: data that came from `secp256k1_bulletproofs_generators_serialize` | ||
* data_len: the length of the `data` buffer | ||
*/ | ||
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT secp256k1_bulletproofs_generators* secp256k1_bulletproofs_generators_parse( | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do we actually want parsing and serialization in the public API (especially since I don't see it called anywhere outside of tests)? It seems dangerous to trust a serialized list of generators that we didn't create ourselves (there might be some hidden discrete log relation between them), so we might as well always just call create. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Many things in life are dangerous :). In practice I expect this list to be hardcoded, so yes, we need an API that can just blindly accept them. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. LOL, fair. Maybe we can include a whitelist of hashes for known safe serialized lists of generators? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. How long would this list be? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Length 1 :) if you want to use something that's not the canonical list of generators then it's on you (I'm assuming there's some "unsafe mode" flag or something). BTW This is not a huge deal, just wanted to note a possible foot gun. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. How many generators are on the list? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I was thinking 128 There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. 128 won't be enough for zkps. |
||
const secp256k1_context* ctx, | ||
const unsigned char* data, | ||
size_t data_len | ||
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2); | ||
|
||
/** Serializes a list of generators to an array | ||
* Returns 1 on success, 0 if the provided array was not large enough | ||
* Args: ctx: pointer to a context object | ||
* gen: pointer to the generator set to be serialized | ||
* Out: data: pointer to buffer into which the generators will be serialized | ||
* In/Out: data_len: the length of the `data` buffer. Should be initially set to at | ||
* least 33 times the number of generators; will be set to 33 times | ||
* the number of generators on successful return | ||
*/ | ||
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_bulletproofs_generators_serialize( | ||
const secp256k1_context* ctx, | ||
const secp256k1_bulletproofs_generators* gen, | ||
unsigned char* data, | ||
size_t *data_len | ||
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4); | ||
|
||
/** Destroys a list of NUMS generators, freeing allocated memory | ||
* Args: ctx: pointer to a context object | ||
* gen: pointer to the generator set to be destroyed | ||
* (can be NULL, in which case this function is a no-op) | ||
*/ | ||
SECP256K1_API void secp256k1_bulletproofs_generators_destroy( | ||
const secp256k1_context* ctx, | ||
secp256k1_bulletproofs_generators* gen | ||
) SECP256K1_ARG_NONNULL(1); | ||
|
||
/** Returns the serialized size of an uncompressed proof of a given number of bits | ||
* Args: ctx: pointer to a context object | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. In 04ce24e: There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Just a convention. I agree it's almost certainly dumb for a simple pure function like this. |
||
* In: n_bits: number of bits to prove (max 64, should usually be 64) | ||
*/ | ||
SECP256K1_API size_t secp256k1_bulletproofs_rangeproof_uncompressed_proof_length( | ||
const secp256k1_context* ctx, | ||
size_t n_bits | ||
) SECP256K1_ARG_NONNULL(1); | ||
|
||
/** Produces an uncompressed rangeproof. Returns 1 on success, 0 on failure. | ||
* Args: ctx: pointer to a context object | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. In 04ce24e: This should mention that the context should be initialized with verification as well as signing. I don't exactly know what's the status of static contexts, but AFAIR we no longer need verification contexts. Maybe just mentioning signing context is okay? Or perhaps we should just mention both to be consistent with rest of the library documentation. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. cc @real-or-random isn't there a PR upstream to remove all these annotations? Both signing and verification of BPs are tested to work with any context objects. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. See bitcoin-core/secp256k1#1126. New API docs will probably end up saying For secret operations:
For public operations
But that's WIP and we anyway need to clean up all our docs here after the upstream change, so I guess anything is fine here for this PR. |
||
* gens: pointer to the generator set to use, which must have at least 2*n_bits generators | ||
* asset_gen: pointer to the asset generator for the Pedersen/CT commitment | ||
* Out: proof: pointer to a byte array to output the proof into | ||
* In/Out: plen: pointer to the size of the above array; will be set to the actual size of | ||
* the serialized proof. To learn this value in advance, to allocate a sufficient | ||
* buffer, call `secp256k1_bulletproofs_rangeproof_uncompressed_proof_length` or | ||
* use `SECP256K1_BULLETPROOFS_RANGEPROOF_UNCOMPRESSED_MAX_LENGTH` | ||
* In: n_bits: size of range being proven, in bits | ||
* value: value committed in the Pedersen commitment | ||
* min_value: minimum value of the range being proven | ||
* commit: the Pedersen commitment being proven | ||
* blind: blinding factor for the Pedersen commitment | ||
* nonce: seed for the RNG used to generate random data during proving | ||
* enc_data: 32-byte array of extra data which may be decrypted by a verifier who knows `nonce` | ||
* (may be NULL if no data is to be encrypted) | ||
* extra_commit: arbitrary extra data that the proof commits to (may be NULL if extra_commit_len is 0) | ||
* extra_commit_len: length of the arbitrary extra data | ||
*/ | ||
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_bulletproofs_rangeproof_uncompressed_prove( | ||
const secp256k1_context* ctx, | ||
const secp256k1_bulletproofs_generators* gens, | ||
const secp256k1_generator* asset_gen, | ||
unsigned char* proof, | ||
size_t* plen, | ||
const size_t n_bits, | ||
const uint64_t value, | ||
const uint64_t min_value, | ||
const secp256k1_pedersen_commitment* commit, | ||
const unsigned char* blind, | ||
const unsigned char* nonce, | ||
const unsigned char* enc_data, | ||
const unsigned char* extra_commit, | ||
size_t extra_commit_len | ||
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5) SECP256K1_ARG_NONNULL(9) SECP256K1_ARG_NONNULL(10) SECP256K1_ARG_NONNULL(11); | ||
|
||
/** Verifies an uncompressed rangeproof. Returns 1 on success, 0 on failure. | ||
* Args: ctx: pointer to a context object | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. In 04ce24e: Same comment there about specifying context initialization: |
||
* scratch: pointer to a scratch space | ||
* gens: pointer to the generator set to use, which must have at least 2*n_bits generators | ||
* asset_gen: pointer to the asset generator for the CT commitment | ||
* In: proof: pointer to a byte array containing the serialized proof | ||
* plen: length of the serialized proof | ||
* min_value: minimum value of the range being proven | ||
* commit: the Pedersen commitment being proven | ||
* extra_commit: arbitrary extra data that the proof commits to (may be NULL if extra_commit_len is 0) | ||
* extra_commit_len: length of the arbitrary extra data | ||
*/ | ||
SECP256K1_API SECP256K1_WARN_UNUSED_RESULT int secp256k1_bulletproofs_rangeproof_uncompressed_verify( | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Comment: Should we add API documentation for this one? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Heh, yeah, and we should fix/complete the API docs for the prover. |
||
const secp256k1_context* ctx, | ||
secp256k1_scratch_space *scratch, | ||
const secp256k1_bulletproofs_generators* gens, | ||
const secp256k1_generator* asset_gen, | ||
const unsigned char* proof, | ||
const size_t plen, | ||
const uint64_t min_value, | ||
const secp256k1_pedersen_commitment* commit, | ||
const unsigned char* extra_commit, | ||
size_t extra_commit_len | ||
) SECP256K1_ARG_NONNULL(1) SECP256K1_ARG_NONNULL(2) SECP256K1_ARG_NONNULL(3) SECP256K1_ARG_NONNULL(4) SECP256K1_ARG_NONNULL(5) SECP256K1_ARG_NONNULL(8); | ||
|
||
# ifdef __cplusplus | ||
} | ||
# endif | ||
|
||
#endif |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does the
AC_OUTPUT
section below also need an added line?