Skip to content

aptos-labs/aptos-keyless-trusted-setup-contributions-jan-2025

Repository files navigation

WARNING

This repo is very large. Before cloning, please follow the instructions below in "Downloading Files" to avoid downloading unnecessary data.

Downloading Files

To download the large .r1cs, .ptau, and .zkey files in this repo, install git-lfs.

Then run the following commands to clone the repo without the larger files:

GIT_LFS_SKIP_SMUDGE=1 git clone https://github.com/aptos-labs/aptos-keyless-trusted-setup-contributions-jan-2025

cd aptos-keyless-trusted-setup-contributions-jan-2025

To get a specific file <filename>, run

git lfs pull --include "<filename>"

Setup

If needed, install npm, and also install nvm. Then run the commands

nvm use 18

and

npm install [email protected]

to install the version of snarkjs used by our code which was used to run the setup ceremony.

To verify the hash values of various files presented in this document, ensure Homebrew is installed and run

brew install b2sum

The b2sum hash of a file may be computed by running b2sum <filename>.

Verifying the Phase 1 Powers of Tau File

The powers of tau file used was downloaded from one of the links provided here in the Snarkjs README, as the file titled powersOfTau28_hez_final_21.ptau. This .ptau file contains 54 contributions and a random beacon. Its b2sum hash is

9aef0573cef4ded9c4a75f148709056bf989f80dad96876aadeb6f1c6d062391f07a394a9e756d16f7eb233198d5b69407cca44594c763ab4a5b67ae73254678

To verify this file, run

npx [email protected] powersoftau verify powersOfTau28_hez_final_21.ptau -v

Reproducing the .r1cs file

To reproduce main_c60ae945e577295ac1a712391af1bcb337c584d2.r1cs, clone the Private Keyless Zk Proofs Repo, checkout commit c60ae945e577295ac1a712391af1bcb337c584d2, and run the following commands:

cd circuit
npm install circomlib
circom -l `npm root -g` templates/main.circom --r1cs

The b2sum hash of the resulting main.r1cs file should be

e8b507838e85879e632eb6798917b60ed20138347aef7654976dc3f93f6fc2b6e445d980102c8fc674b5f2aae01062de08ce8b895ebcb21962984b87cdfdde63

which is identical to the b2sum hash of main_c60ae945e577295ac1a712391af1bcb337c584d2.r1cs in this repo.

This provides a link between our circuit code and the trusted setup, ensuring you can verify the setup was done over the correct codebase. Without this link, you could not know what circuit the setup was done over, making it potentially insecure.

Reproducing the initial .zkey file

To reproduce the initial .zkey file, run the command

npx [email protected] groth16 setup main.r1cs ./powersOfTau28_hez_final_21.ptau initial.zkey -v

The b2sum hash of the resulting .zkey file should match that of contributions/main_0000.zkey. This hash value is

8f49db19a4866a97d04869d9a9abfd216b58f93dfb68b824320d4a4a42148540d8d2eddf4488345f7d23299a067b1a8adeba530c97d59ffa2ff1a34bdbd9414b

Verifying Individual Contributions

The folder contributions contains all .zkey files output by the Aptos Keyless trusted setup. Each .zkey file corresponds to the contribution of one participant, in the order of their having participated, so that i.e. main_00004.zkey corresponds to the output of the contribution made by the 4-th participant to have completed their contribution.

Each contribution may be verified by running the command

npx [email protected] zkey verify main_c60ae945e577295ac1a712391af1bcb337c584d2.r1cs powersOfTau28_hez_final_21.ptau contributions/<contribution_filename>.zkey -v

Depending on your machine, this command can take upwards of 20 minutes. Upon completion, it will produce an output of the following form:

[INFO]  snarkJS: Circuit Hash: 
		0a9aeb1f 247e8652 46a00128 ab2fbe10
		86ad8f2a 86a17f72 bd35f095 dfde1a86
		646f6faa fdaa46d6 9dde1ad5 88f21d4d
		0d4e9e74 519b561d 9e71e768 9c739b68
[INFO]  snarkJS: -------------------------
[INFO]  snarkJS: contribution #3 sherry-x-55457892:
		0125c8cb de936779 25ff1b62 49eff731
		15a68679 899678bb 83a19c0e cf8daf28
		20dcf4a9 78192394 2895cbc0 1ba661b3
		1628f395 f553b409 16428355 cfd53f6b
[INFO]  snarkJS: -------------------------
[INFO]  snarkJS: contribution #2 michaelaptos-158355435:
		63c5d60f 668bd588 d6c86d0e a459f24d
		d75c207a 76dbc07a 36c466c5 97ef3ba7
		760e6dd3 b3162767 313935eb afe8fd59
		1b4868b0 238ee70c beb60e3b a46a38d6
[INFO]  snarkJS: -------------------------
[INFO]  snarkJS: contribution #1 alinush-1724810:
		65c3e44a e8ae9dcd 2406d1b4 7413e09c
		72a6587b 5dbc6e00 ac607c84 cefbc4c1
		a9dd4d2c 39d78381 ea2a8cf2 8d3f4e91
		c32c2e8b eaf17465 b9bc8045 a529ecf1
[INFO]  snarkJS: -------------------------
[INFO]  snarkJS: ZKey Ok!

This is a list of all contribution hashes up to and including the current contribution that you have just verified. If you participated in the setup, you can verify that your contribution is being used correctly by running this command on the final .zkey file, contributions/main_final.zkey, and comparing the output contribution hash corresponding to your contribution to the one which was printed out when you finished contributing during the ceremony.

This may be done with the following command:

npx [email protected] zkey verify main.r1cs powersOfTau28_hez_final_21.ptau contributions/main_final.zkey -v

Note that the contribution hash is not simply a hash of the .zkey file, but a hash of the participant-specific parameters stored by every .zkey file after a participant's contribution has been made. Verification on the i-th .zkey file includes checks on these parameters for participants 1 through i. The output of this process is used in verifying the .zkey file overall when running the above zkey verify command.

Applying the randomness beacon

To eliminate potential bias, we apply the Drand randomness beacon to the final .zkey file to obtain our final .zkey file for use in production. The randomness we used can be found at this link which uses one of the public drand endpoints, and was the latest round of drand randomness as of about 10:42AM CST Jan 8, 2025.

It should contain the following value

{"round":14517013,"randomness":"97d920a0817f74b4dbff89a721faeda4ea307bc5d8890ebb833700ea68b2d106","signature":"83236a954108c9de257b6a10c838f3e3f215eb3bd25c2261f42b4a6204d6b00a3f216b8d88dcd7947cba97d39f2e16c5"}

You can recreate the final .zkey file by running

npx [email protected] zkey beacon contributions/main_0006.zkey main_final.zkey 97d920a0817f74b4dbff89a721faeda4ea307bc5d8890ebb833700ea68b2d106 10 -v

This command may take 10-15 minutes. It should output

[INFO]  snarkJS: Contribution Hash: 
		7fb2dcc3 85440fa4 cdadba70 3763a81a
		f4d4b915 a6f7ec08 d3b94073 0746b05f
		6dfebb9c cb5933e7 782d19e4 9e76ee49
		e0c417f4 620b3ebc 8466c0a0 36250683

As with other contributions, this .zkey file may be verified by running

npx [email protected] zkey verify main.r1cs powersOfTau28_hez_final_21.ptau main_final.zkey -v

The b2sum hash of the resulting main_final.zkey should be

78f160d7ab39a4b1fa304bec31a75848de0c88aa43fa7de9931fd16e36541e3ff109aac53a3bb3b3db07c77a4ae1045afc5b9e93d623f90ce4dfba11ff785b08

which is identical to the b2sum hash of contributions/main_final.zkey.

Reproducing the verification key

The final verification key can be exported using

npx [email protected] zkey export verificationkey contributions/main_final.zkey verification_key_regen.json

Its b2sum hash is

9b8d240ee77e9cda48aa3caa85f8fc355293ee12f0015363b411fa1fce15294269613c3cbf1185cc867fd97c0e9cb5fa622e4fd5082a1add1899671d098c2273

This should be identical to the b2sum hash of the verification_key.json file already in the repo.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •  

Languages