Awesome
circom-ecdsa
Implementation of ECDSA operations in circom.
Project overview
This repository provides proof-of-concept implementations of ECDSA operations in circom. These implementations are for demonstration purposes only. These circuits are not audited, and this is not intended to be used as a library for production-grade applications.
Circuits can be found in circuits
. scripts
contains various utility scripts (most importantly, scripts for building a few example zkSNARKs using the ECDSA circuit primitives). test
contains some unit tests for the circuits, mostly for witness generation.
Install dependencies
- Run
yarn
at the top level to install npm dependencies (snarkjs
andcircomlib
). - You'll also need
circom
version>= 2.0.2
on your system. Installation instructions here. - If you want to build the
pubkeygen
,eth_addr
, andgroupsig
circuits, you'll need to download a Powers of Tau file with2^20
constraints and copy it into thecircuits
subdirectory of the project, with the namepot20_final.ptau
. We do not provide such a file in this repo due to its large size. You can download and copy Powers of Tau files from the Hermez trusted setup from this repository. - If you want to build the
verify
circuits, you'll also need a Powers of Tau file that can support at least2^21
constraints (place it in the same directory as above with the same naming convention).
Building keys and witness generation files
We provide examples of four circuits using the ECDSA primitives implemented here:
pubkeygen
: Prove knowledge of a private key corresponding to a ECDSA public key.eth_addr
: Prove knowledge of a private key corresponding to an Ethereum address.groupsig
: Prove knowledge of a private key corresponding to one of three Ethereum addresses, and attest to a specific message.verify
: Prove that a ECDSA verification ran properly on a provided signature and message. Note that this circuit does not verify that the public key itself is valid. This must be done separately by the user.
Run yarn build:pubkeygen
, yarn build:eth_addr
, yarn build:groupsig
, yarn build:verify
at the top level to compile each respective circuit and keys.
Each of these will create a subdirectory inside a build
directory at the top level (which will be created if it doesn't already exist). Inside this directory, the build process will create r1cs
and wasm
files for witness generation, as well as a zkey
file (proving and verifying keys). Note that this process will take several minutes (see full benchmarks below). Building verify
requires 56G of RAM.
This process will also generate and verify a proof for a dummy input in the respective scripts/[circuit_name]
subdirectory, as a smoke test.
Circuits Description
The following circuits are implemented and can be found in circuits/ecdsa.circom
.
ECDSAPrivToPub
: Given a secp256k1 private key, outputs the corresponding public key by computing(private_key) * G
whereG
is the base point of secp256k1.ECDSAVerifyNoPubkeyCheck
: Given a signature(r, s)
, a message hash, and a secp256k1 public key, it follows ecdsa verification algorithm to extractr'
froms
, message hash and public key, and then comparesr'
withr
to see if the signaure is correct. The output result is1
ifr'
andr
are equal,0
otherwise.
The 256-bits input and output are chunked and represented as k
n
-bits values where k
is 4
and n
is 64
. Please see above examples for concrete usages.
WARNING: Beware that the input to the above circuits should be properly checked and guarded (Lies on the curve, not equal to zero, etc). The purpose of the above circuits is to serve as building blocks but not as stand alone circuits to deploy.
Benchmarks
All benchmarks were run on a 16-core 3.0GHz, 32G RAM machine (AWS c5.4xlarge instance).
pubkeygen | eth_addr | groupsig | verify | |
---|---|---|---|---|
Constraints | 95444 | 247380 | 250938 | 1508136 |
Circuit compilation | 21s | 47s | 48s | 72s |
Witness generation | 11s | 11s | 12s | 175s |
Trusted setup phase 2 key generation | 71s | 94s | 98s | 841s |
Trusted setup phase 2 contribution | 9s | 20s | 19s | 149s |
Proving key size | 62M | 132M | 134M | 934M |
Proving key verification | 61s | 81s | 80s | 738s |
Proving time | 3s | 7s | 6s | 45s |
Proof verification time | 1s | <1s | 1s | 1s |
Testing
Run yarn test
at the top level to run tests. Note that these tests only test correctness of witness generation. They do not check that circuits are properly constrained, i.e. that only valid witnesses satisfy the constraints. This is a much harder problem that we're currently working on!
Circuit unit tests are written in typescript, in the test
directory using chai
, mocha
, and circom_tester
. Running all tests takes about 1 hour on our 3.3GHz, 64G RAM test machine. To run a subset of the tests, use yarn test --grep [test_str]
to run all tests whose description matches [test_str]
.
Groupsig CLI Demo
You can run a CLI demo of a zkSNARK-enabled group signature generator once you've built the groupsig
keys. Simply run yarn groupsig-demo
at the top level and follow the instructions in your terminal.
Acknowledgments
This project was built during 0xPARC's Applied ZK Learning Group #1.
We use a circom implementation of keccak from Vocdoni. We also use some circom utilities for converting an ECDSA public key to an Ethereum address implemented by lsankar4033, jefflau, and veronicaz41 for another ZK Learning Group project in the same cohort. We use an optimization for big integer multiplication from xJsnark.