This repository includes Bitcoin script implementations of various cryptographic primitives for STARK.
- M31, CM31, QM31, Circle Point
- implementation of add, sub, mul of Mersenne-31 (M31) and its complex extension (CM31) and its degree-4 extension (QM31), which is imported from BitVM/rust-bitcoin-m31-or-babybear.
- implementation of add, sub, mul of circle points, which are over the circle curve
x^2 + y^2 = 1
.
- Fiat-Shamir Transcript
- aka "channel", which is the name used in Starkware's stwo library.
- absorbing commitments and QM31 elements through
OP_CAT + OP_SHA256
. - squeezing random elements for Fiat-Shamir transform using hints and
OP_CAT + OP_SHA256
.
- Proof-of-Work Check
- calculating a proof-of-work nonce for the "channel", based on specified security bits.
- verifying the proof-of-work nonce and computing the new "channel" state.
- Merkle Tree
- implementation of Merkle path verification using hints and
OP_CAT + OP_SHA256
.
- implementation of Merkle path verification using hints and
The next step is to implement the FRI protocol, which reasons about the degree of a quotient polynomial.
These performance numbers are obtained from cargo test -- --nocapture
over commit 6e5c211.
- M31, CM31, QM31, CirclePoint
- M31.add() = 18 bytes, QM31.add() = 84 bytes
- M31.sub() = 12 bytes, QM31.sub() = 63 bytes
- M31.mul() = 1415 bytes, QM31.mul() = 13321 bytes
- M31.mul_by_constant() = ~744 bytes, QM31.mul_by_m31_constant() = ~2981 bytes
- QM31.mul_by_m31() = 4702 bytes
- M31.commit() = 1 bytes, CM31.commit() = 3 bytes, QM31.commit() = 7 bytes
- M31.from_hash() = 64 bytes, CM31.from_hash() = 124 bytes, QM31.from_hash() = 250 bytes, 5M31.from_hash() = 312 bytes
- CirclePoint.add() = 4345 bytes, CirclePoint.double() = 4346 bytes, CirclePoint.sub() = 4352 bytes
- Fiat-Shamir Transcript
- Channel.absorb_commitment = 2 bytes
- Channel.absorb_qm31() = 9 bytes
- Channel.squeeze_element_using_hint() = 257 bytes (require 5 hint elements)
- Channel.squeeze_5queries_using_hint() = 1222 bytes (require 6 hint elements)
- Merkle tree
- MT.verify(2^12) = 263 bytes (require 11 hint elements)
- MT.verify(2^14) = 309 bytes (require 13 hint elements)
- MT.verify(2^16) = 356 bytes (require 15 hint elements)
- MT.verify(2^18) = 404 bytes (require 18 hint elements)
- MT.verify(2^20) = 452 bytes (require 20 hint elements)
The channel is used for Fiat-Shamir transform. It absorbs elements that are either prior knowledge of the verifier or provers' messages, and it can be squeezed to produce pseudorandom elements. There are five operations.
new(IV) -> channel
: initialize a new channel using an initialization vector (IV)channel := IV
absorb(channel, commitment) -> channel'
: update the channel with a commitmentchannel' := SHA256(channel || commitment)
absorb(channel, qm31) -> channel'
: update the channel with a QM31 elementchannel' := SHA256(channel || commit(qm31))
squeeze(channel) -> (qm31, channel')
: squeeze a QM31 element out of the channelhash := SHA256(channel || 0x00)
channel' := SHA256(channel)
qm31 := extract(hash)
squeeze(channel, logn) -> (q1, q2, q3, q4, q5, channel')
: squeeze five positions on a list of 2^logn elementshash := SHA256(channel || 0x00)
channel' := SHA256(channel)
q1, q2, q3, q4, q5 := extract(hash, logn)
The constructions of commit and extract are discussed later.
With OP_CAT + OP_SHA256
, we can commit M31, CM31, and QM31 elements with a few bytes.
M31 requires only 1 byte: commit(m31) := SHA256(m31)
.
OP_SHA256
CM31 requires 3 bytes: commit(cm31) := SHA256(cm31.0 || SHA256(cm31.1))
OP_SHA256 OP_CAT OP_SHA256
QM31 requires 7 bytes: commit(qm31) := SHA256(qm31.0.0 || SHA256(qm31.0.1 || SHA256(qm31.1.0 || SHA256(qm31.1.1))))
OP_SHA256 OP_CAT OP_SHA256 OP_CAT OP_SHA256 OP_CAT OP_SHA256
We feel that this is the optimal.
Since we do not have OP_SUBSTR
, to extract a QM31 element or five positions from the hash, we need to use hints. The
idea is to peel off the first few bytes of the hash and recreate a normalized QM31 element out of it. If we want to extract
positions, the numbers are further adjusted to have only logn
bits.
- For QM31, the hint includes five elements:
hash[0..4]
in the minimal number encoding formhash[4..8]
in the minimal number encoding formhash[8..12]
in the minimal number encoding formhash[12..16]
in the minimal number encoding formhash[16..32]
as bytes, which is the tail
- For five positions, the hint includes six elements:
hash[0..4]
in the minimal number encoding formhash[4..8]
in the minimal number encoding formhash[8..12]
in the minimal number encoding formhash[12..16]
in the minimal number encoding formhash[16..20]
in the minimal number encoding formhash[20..32]
as bytes, which is the tail
Due to the minimal number encoding form, the hint element, which represents a signed 32-bit integer, does not necessarily
have four bytes. Our solution is to use OP_SIZE
to detect its length and then use OP_CAT
to pad it to four bytes.
A subtlety here is that negative numbers, which occur when the original hash's last byte's most significant bit is 1,
need to be handled differently, as it would first be padded with OP_LEFT (0x80)
and then OP_PUSHBYTES_0 (0x00)
.
OP_IF
OP_PUSHBYTES_1 OP_PUSHBYTES_0
OP_ELSE
OP_PUSHBYTES_1 OP_LEFT
OP_ENDIF
Note that OP_PUSHBYTES_0
and OP_LEFT
here are not opcodes but rather data that OP_PUSHBYTES_1
will push to the stack.
One cannot directly write 0x00
and 0x80
in the interpreter, as they would become an empty string and 0x80 0x00
,
respectively.
It first uses OP_CAT
to combine the hint elements together and compare it with the hash that is to be extracted from.
Each of the hint number, after peeling off the sign bit, becomes a non-negative 31-bit number, ranging from 0 to 2^31 - 1. However, in the rest of the computation, we want the number to be below 2^31 - 1. This is done by subtracting one from the resulting number unless the resulting number is zero.
OP_DUP OP_NOT
OP_NOTIF OP_1SUB OP_ENDIF
After such adjustment, one obtains an element.
The Proof-of-Work check accepts two inputs: channel
and nonce
, and checks whether the new channel state channel'=sha256(channel||nonce)
has sufficiently many security bits, namely, n_bits
.
Since we don't have OP_SUBSTR
, the check also requires hints that change depending on whether n_bis
is divisible by 8 or not.
If n_bits % 8==0
, there is a single hint suffix
, and the script checks that
0^(n_bits//8)||suffix==channel'
If n_bits % 8!=0
, together with suffix
, there is an additional byte-sized hint msb
. Consequently, the script checks that
0^(n_bits//8)||msb||suffix==channel'
and also that msb
starts with n_bits % 8
(which would be at least 1) zero bits.
This repository is intended to be public good. It is under the MIT license.
We want to credit that the Rust FRI implementation code was based on code shared by Starkware.