|
| 1 | +use halo2_proofs::{ |
| 2 | + plonk::{verify_proof, VerifyingKey}, |
| 3 | + poly::{ |
| 4 | + commitment::Params, |
| 5 | + kzg::{ |
| 6 | + commitment::KZGCommitmentScheme, multiopen::VerifierSHPLONK, strategy::SingleStrategy, |
| 7 | + }, |
| 8 | + }, |
| 9 | + transcript::{Blake2bRead, Challenge255, TranscriptReadBuffer}, |
| 10 | + SerdeFormat, |
| 11 | +}; |
| 12 | +use halo2curves::bn256::{Bn256, Fr, G1Affine}; |
| 13 | +use std::io::{BufReader, ErrorKind, Read}; |
| 14 | + |
| 15 | +//TODO(pat): refactor halo2 verification to a common create to eliminate deduplicated code. |
| 16 | + |
| 17 | +// MaxProofSize 4KB |
| 18 | +pub const MAX_PROOF_SIZE: usize = 4 * 1024; |
| 19 | + |
| 20 | +// MaxConstraintSystemSize 2KB |
| 21 | +pub const MAX_CONSTRAINT_SYSTEM_SIZE: usize = 2 * 1024; |
| 22 | + |
| 23 | +// MaxVerificationKeySize 1KB |
| 24 | +pub const MAX_VERIFIER_KEY_SIZE: usize = 1024; |
| 25 | + |
| 26 | +// MaxKzgParamsSize 4KB |
| 27 | +pub const MAX_KZG_PARAMS_SIZE: usize = 4 * 1024; |
| 28 | + |
| 29 | +// MaxPublicInputSize 4KB |
| 30 | +pub const MAX_PUBLIC_INPUT_SIZE: usize = 4 * 1024; |
| 31 | + |
| 32 | +pub fn verify_halo2_kzg(proof: &[u8], public_input: &[u8], verification_key: &[u8]) -> bool { |
| 33 | + let mut cs_buffer = [0u8; MAX_CONSTRAINT_SYSTEM_SIZE]; |
| 34 | + let cs_len_buf: [u8; 4] = verification_key[..4] |
| 35 | + .try_into() |
| 36 | + .map_err(|_| "Failed to convert slice to [u8; 4]") |
| 37 | + .unwrap(); |
| 38 | + let cs_len = u32::from_le_bytes(cs_len_buf) as usize; |
| 39 | + let cs_offset = 12; |
| 40 | + cs_buffer[..cs_len].clone_from_slice(&verification_key[cs_offset..(cs_offset + cs_len)]); |
| 41 | + |
| 42 | + // Select Verifier Key Bytes |
| 43 | + let mut vk_buffer = [0u8; MAX_VERIFIER_KEY_SIZE]; |
| 44 | + let vk_len_buf: [u8; 4] = verification_key[4..8] |
| 45 | + .try_into() |
| 46 | + .map_err(|_| "Failed to convert slice to [u8; 4]") |
| 47 | + .unwrap(); |
| 48 | + let vk_len = u32::from_le_bytes(vk_len_buf) as usize; |
| 49 | + let vk_offset = cs_offset + cs_len; |
| 50 | + vk_buffer[..vk_len].clone_from_slice(&verification_key[vk_offset..(vk_offset + vk_len)]); |
| 51 | + |
| 52 | + // Select KZG Params Bytes |
| 53 | + let mut kzg_params_buffer = [0u8; MAX_KZG_PARAMS_SIZE]; |
| 54 | + let kzg_len_buf: [u8; 4] = verification_key[8..12] |
| 55 | + .try_into() |
| 56 | + .map_err(|_| "Failed to convert slice to [u8; 4]") |
| 57 | + .unwrap(); |
| 58 | + let kzg_params_len = u32::from_le_bytes(kzg_len_buf) as usize; |
| 59 | + let kzg_offset = vk_offset + vk_len; |
| 60 | + kzg_params_buffer[..kzg_params_len].clone_from_slice(&verification_key[kzg_offset..]); |
| 61 | + |
| 62 | + if let Ok(cs) = bincode::deserialize(&cs_buffer[..]) { |
| 63 | + if let Ok(vk) = VerifyingKey::<G1Affine>::read( |
| 64 | + &mut BufReader::new(&vk_buffer[..]), |
| 65 | + SerdeFormat::RawBytes, |
| 66 | + cs, |
| 67 | + ) { |
| 68 | + if let Ok(params) = Params::read::<_>(&mut BufReader::new(&kzg_params_buffer[..])) { |
| 69 | + if let Ok(res) = read_fr(&public_input[..]) { |
| 70 | + let strategy = SingleStrategy::new(¶ms); |
| 71 | + let instances = res.as_slice(); |
| 72 | + let mut transcript = |
| 73 | + Blake2bRead::<&[u8], G1Affine, Challenge255<_>>::init(&proof[..]); |
| 74 | + return verify_proof::< |
| 75 | + KZGCommitmentScheme<Bn256>, |
| 76 | + VerifierSHPLONK<'_, Bn256>, |
| 77 | + Challenge255<G1Affine>, |
| 78 | + Blake2bRead<&[u8], G1Affine, Challenge255<G1Affine>>, |
| 79 | + SingleStrategy<'_, Bn256>, |
| 80 | + >( |
| 81 | + ¶ms, &vk, strategy, &[&[instances]], &mut transcript |
| 82 | + ) |
| 83 | + .is_ok(); |
| 84 | + } |
| 85 | + } |
| 86 | + } |
| 87 | + } |
| 88 | + false |
| 89 | +} |
| 90 | + |
| 91 | +fn read_fr(mut buf: &[u8]) -> Result<Vec<Fr>, ErrorKind> { |
| 92 | + let mut instances = Vec::with_capacity(buf.len() / 32); |
| 93 | + // Buffer to store each 32-byte slice |
| 94 | + let mut buffer = [0; 32]; |
| 95 | + |
| 96 | + loop { |
| 97 | + // Read 32 bytes into the buffer |
| 98 | + match buf.read_exact(&mut buffer) { |
| 99 | + Ok(_) => { |
| 100 | + instances.push(Fr::from_bytes(&buffer).unwrap()); |
| 101 | + } |
| 102 | + Err(ref e) if e.kind() == ErrorKind::UnexpectedEof => { |
| 103 | + // If end of file reached, break the loop |
| 104 | + break; |
| 105 | + } |
| 106 | + Err(e) => { |
| 107 | + eprintln!("Error Deserializing Public Inputs: {}", e); |
| 108 | + return Err(ErrorKind::Other); |
| 109 | + } |
| 110 | + } |
| 111 | + } |
| 112 | + |
| 113 | + Ok(instances) |
| 114 | +} |
0 commit comments