All Projects → GuildOfWeavers → Distaff

GuildOfWeavers / Distaff

Licence: mit
Zero-knowledge virtual machine written in Rust

Programming Languages

rust
11053 projects

Projects that are alternatives of or similar to Distaff

Hbc
API of homomorphic binary operations such as binary comparisons or binary divisions using the library HElib
Stars: ✭ 23 (-80.67%)
Mutual labels:  cryptography, virtual-machine
Sputter
Ethereum Virtual Machine (EVM) implementation
Stars: ✭ 111 (-6.72%)
Mutual labels:  cryptography, virtual-machine
Quickjs
The official repo is at bellard/quickjs.
Stars: ✭ 1,429 (+1100.84%)
Mutual labels:  virtual-machine
Multi Party Schnorr
Rust implementation of multi-party Schnorr signatures over elliptic curves.
Stars: ✭ 115 (-3.36%)
Mutual labels:  cryptography
Streamcryptor
Stream encryption & decryption with libsodium and protobuf
Stars: ✭ 112 (-5.88%)
Mutual labels:  cryptography
Vermin
The smart virtual machines manager. A modern CLI for Vagrant Boxes.
Stars: ✭ 110 (-7.56%)
Mutual labels:  virtual-machine
Gitpass
Open Source Your Password (Mismanagement)!
Stars: ✭ 113 (-5.04%)
Mutual labels:  cryptography
Openssh Portable
Portable OpenSSH
Stars: ✭ 1,696 (+1325.21%)
Mutual labels:  cryptography
Cryptogotchas
A collection of common (interesting) cryptographic mistakes.
Stars: ✭ 118 (-0.84%)
Mutual labels:  cryptography
Tools For Cryptanalysis
A repository that aims to provide tools for cryptography and cryptanalysis
Stars: ✭ 112 (-5.88%)
Mutual labels:  cryptography
Open Crypto
🔑 Hashing (BCrypt, SHA2, HMAC), encryption (AES), public-key (RSA), and random data generation.
Stars: ✭ 115 (-3.36%)
Mutual labels:  cryptography
Aura Operating System
AuraOS, the Franco-English Operating System developed in C# using Cosmos!
Stars: ✭ 111 (-6.72%)
Mutual labels:  virtual-machine
Wolfboot
wolfBoot is a portable, OS-agnostic, secure bootloader for microcontrollers, supporting firmware authentication and firmware update mechanisms.
Stars: ✭ 110 (-7.56%)
Mutual labels:  cryptography
Foundational Knowledge For Programmers
List of resources about foundational knowledge for programmers (supposed to last a few decades)
Stars: ✭ 115 (-3.36%)
Mutual labels:  cryptography
Yubikey Agent
yubikey-agent is a seamless ssh-agent for YubiKeys.
Stars: ✭ 1,744 (+1365.55%)
Mutual labels:  cryptography
Macos Simple Kvm
Tools to set up a quick macOS VM in QEMU, accelerated by KVM.
Stars: ✭ 11,732 (+9758.82%)
Mutual labels:  virtual-machine
Libforth
libforth: A small Forth interpreter that can be used as a library written in c99
Stars: ✭ 107 (-10.08%)
Mutual labels:  virtual-machine
Node Sha3
SHA3 for JavaScript - The Keccak family of hash algorithms
Stars: ✭ 112 (-5.88%)
Mutual labels:  cryptography
Cruzbit
A simple decentralized peer-to-peer ledger implementation
Stars: ✭ 118 (-0.84%)
Mutual labels:  cryptography
Solar
🌞 Stellar wallet. Secure and user-friendly.
Stars: ✭ 117 (-1.68%)
Mutual labels:  cryptography

Distaff

Distaff is a zero-knowledge virtual machine written in Rust. For any program executed on Distaff VM, a STARK-based proof of execution is automatically generated. This proof can then be used by anyone to verify that a program was executed correctly without the need for re-executing the program or even knowing what the program was.

Status

DO NOT USE IN PRODUCTION. Distaff is in an alpha stage. This means that current functionality is incomplete, and there are known and unknown bugs and security flaws.

Usage

Distaff crate exposes execute() and verify() functions which can be used to execute programs and verify their execution. Both are explained below, but you can also take a look at several working examples here.

Executing a program

To execute a program on Distaff VM, you can use execute() function. The function takes the following parameters:

  • program: &Program - the program to be executed. A program can be constructed manually by building a program execution graph, or compiled from Distaff assembly (see here).
  • inputs: &ProgramInputs - inputs for the program. These include public inputs used to initialize the stack, as well as secret inputs consumed during program execution (see here).
  • num_outputs: usize - number of items on the stack to be returned as program output. Currently, at most 8 outputs can be returned.
  • options: &ProofOptions - config parameters for proof generation. The default options target 120-bit security level.

If the program is executed successfully, the function returns a tuple with 2 elements:

  • outputs: Vec<u128> - the outputs generated by the program. The number of elements in the vector will be equal to the num_outputs parameter.
  • proof: StarkProof - proof of program execution. StarkProof implements serde's Serialize and Deserialize traits - so, it can be easily serialized and de-serialized.

Program inputs

To provide inputs for a program, you must create a ProgramInputs object which can contain the following:

  • A list of public inputs which will be used to initialize the stack. Currently, at most 8 public inputs can be provided.
  • Two lists of secret inputs. These lists can be thought of as tapes A and B. You can use read operations to read values from these tapes and push them onto the stack.

Besides the ProgramInputs::new() function, you can also use ProgramInputs::from_public() and ProgramInputs:none() convenience functions to construct the inputs object.

Writing programs

To execute a program, Distaff VM consumes a Program object. This object contains an execution graph for the program, as well as other info needed to execute the program. There are two way of constructing a Program object:

  1. You can construct a Program object by manually building program execution graph from raw Distaff VM instructions.
  2. You can compile Distaff assembly source code into a Program object.

The latter approach is strongly encouraged because building programs from raw Distaff VM instructions is tedious, error-prone, and requires an in-depth understanding of VM internals. All examples throughout these docs use assembly syntax.

A general description of Distaff VM is also provided 👉 here 👈. If you are trying to learn how to write programs for Distaff VM, this would be a good place to start.

Program execution example

Here is a simple example of executing a program which pushes two numbers onto the stack and computes their sum:

use distaff::{ self, ProofOptions, ProgramInputs, assembly };

// this is our program, we compile it from assembly code
let program = assembly::compile("begin push.3 push.5 add end").unwrap();

// let's execute it
let (outputs, proof) = distaff::execute(
        &program,
        &ProgramInputs::none(),     // we won't provide any inputs
        1,                          // we'll return one item from the stack
        &ProofOptions::default());  // we'll be using default options

// the output should be 8
assert_eq!(vec![8], outputs);

Verifying program execution

To verify program execution, you can use verify() function. The function takes the following parameters:

  • program_hash: &[u8; 32] - an array of 32 bytes representing a hash of the program to be verified.
  • public_inputs: &[u128] - a list of public inputs against which the program was executed.
  • outputs: &[u128] - a list of outputs generated by the program.
  • proof: &StarkProof - the proof generated during program execution.

The function returns Result<bool, String> which will be Ok<true> if verification passes, or Err<message> if verification fails, with message describing the reason for the failure.

Verifying execution proof of a program basically means the following:

If a program with the provided hash is executed against some secret inputs and the provided public inputs, it will produce the provided outputs.

Notice how the verifier needs to know only the hash of the program - not what the actual program was.

Verifying execution example

Here is a simple example of verifying execution of the program from the previous example:

use distaff;

let program =   /* value from previous example */;
let proof =     /* value from previous example */;

// let's verify program execution
match distaff::verify(program.hash(), &[], &[8], &proof) {
    Ok(_) => println!("Execution verified!"),
    Err(msg) => println!("Execution verification failed: {}", msg)
}

Fibonacci calculator

Let's write a simple program for Distaff VM (using Distaff assembly). Our program will compute the 5-th Fibonacci number:

push.0      // stack state: 0
push.1      // stack state: 1 0
swap        // stack state: 0 1
dup.2       // stack state: 0 1 0 1
drop        // stack state: 1 0 1
add         // stack state: 1 1
swap        // stack state: 1 1
dup.2       // stack state: 1 1 1 1
drop        // stack state: 1 1 1
add         // stack state: 2 1
swap        // stack state: 1 2
dup.2       // stack state: 1 2 1 2
drop        // stack state: 2 1 2
add         // stack state: 3 2

Notice that except for the first 2 operations which initialize the stack, the sequence of swap dup.2 drop add operations repeats over and over. In fact, we can repeat these operations an arbitrary number of times to compute an arbitrary Fibonacci number. In Rust, it would like like this (this is actually a simplified version of the example in fibonacci.rs):

use distaff::{ self, ProofOptions, ProgramInputs, assembly };

// use default proof options
let options = ProofOptions::default();

// set the number of terms to compute
let n = 50;

// build the program
let mut source = format!("
    begin 
        repeat.{}
            swap dup.2 drop add
        end
    end", n - 1);
let program = assembly::compile(&source).unwrap();

// initialize the stack with values 0 and 1
let inputs = ProgramInputs::from_public(&[1, 0]);

// execute the program
let (outputs, proof) = distaff::execute(
        &program,
        &inputs,
        1,          // top stack item is the output
        &options);

// the output should be the 50th Fibonacci number
assert_eq!(vec![12586269025], outputs);

Above, we used public inputs to initialize the stack rather than using push operations. This makes the program a bit simpler, and also allows us to run the program from arbitrary starting points without changing program hash.

This program is rather efficient: the stack never gets more than 4 items deep.

Performance

Here are some very informal benchmarks of running the Fibonacci calculator on Intel Core i5-7300U @ 2.60GHz (single thread) for a given number of operations:

Operation Count Execution time Execution RAM Verification time Proof size
28 190 ms negligible 2 ms 62 KB
210 350 ms negligible 2 ms 80 KB
212 1 sec < 100 MB 2 ms 104 KB
214 4.5 sec ~ 250 MB 3 ms 132 KB
216 18 sec 1.1 GB 3 ms 161 KB
218 1.3 min 5.5 GB 3 ms 193 KB
220 18 min > 5.6 GB 4 ms 230 KB

A few notes about the results:

  1. Execution time is dominated by the proof generation time. In fact, the time needed to run the program is only about 0.05% of the time needed to generate the proof.
  2. For 220 case, RAM on my machine maxed out at 5.6 GB, but for efficient execution ~20 GB would be needed. This probably explains why proving time is so poor in this case as compared to other cases. If there was sufficient RAM available, execution time would have likely been around 5 mins.
  3. The benchmarks use default proof options which target 120-bit security level. The security level can be increased by either increasing execution time or proof size. In general, there is a trade-off between proof time and proof size (i.e. for a given security level, you can reduce proof size by increasing execution time, up to a point).

References

Proofs of execution generated by Distaff VM are based on STARKs. A STARK is a novel proof-of-computation scheme that allows you to create an efficiently verifiable proof that a computation was executed correctly. The scheme was developed by Eli-Ben Sasson and team at Technion - Israel Institute of Technology. STARKs do not require an initial trusted setup, and rely on very few cryptographic assumptions.

Here are some resources to learn more about STARKs:

Vitalik Buterin's blog series on zk-STARKs:

StarkWare's STARK Math blog series:

License

MIT © 2020 Guild of Weavers

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].