Elliptic Curve VRF
This library provides flexible and efficient implementations of Verifiable Random Functions with Additional Data (VRF-AD), a cryptographic construct that augments a standard VRF scheme by incorporating auxiliary information into its signature.
It leverages the Arkworks framework and supports customization of scheme parameters.
What is a VRF?
A Verifiable Random Function (VRF) is a cryptographic primitive that maps inputs to verifiable pseudorandom outputs. Key properties include:
- Uniqueness: For a given input and private key, there is exactly one valid output
- Verifiability: Anyone with the public key can verify that an output is correct
- Pseudorandomness: Without the private key, outputs appear random and unpredictable
- Collision resistance: Finding inputs that map to the same output is computationally infeasible
Supported Schemes
-
IETF VRF: Complies with ECVRF described in RFC9381. This is a standardized VRF implementation suitable for most applications requiring verifiable randomness.
-
Pedersen VRF: Described in BCHSV23. Extends the basic VRF with key-hiding properties using Pedersen commitments.
-
Ring VRF: A zero-knowledge-based scheme inspired by BCHSV23. Provides signer anonymity within a set of public keys (a "ring"), allowing verification that a ring member created the proof without revealing which specific member.
Specifications
Built-In Suites
The library conditionally includes the following pre-configured suites (see features section):
- Ed25519-SHA-512-TAI: Supports IETF and Pedersen VRF.
- Secp256r1-SHA-256-TAI: Supports IETF and Pedersen VRF.
- Bandersnatch (Edwards curve on BLS12-381): Supports IETF, Pedersen, and Ring VRF.
- JubJub (Edwards curve on BLS12-381): Supports IETF, Pedersen, and Ring VRF.
- Baby-JubJub (Edwards curve on BN254): Supports IETF, Pedersen, and Ring VRF.
Basic Usage
use *;
// Create a secret key from a seed
let secret = from_seed;
// Derive the corresponding public key
let public = secret.public;
// Create an input by hashing data to a curve point
let input = new.unwrap;
// Compute the VRF output (gamma point)
let output = secret.output;
// Get a deterministic hash from the VRF output point
let hash_bytes = output.hash;
IETF-VRF
The IETF VRF scheme follows RFC-9381 and provides a standardized approach to verifiable random functions.
Prove
use Prover;
// Generate a proof that binds the input, output, and auxiliary data
let proof = secret.prove;
Verify
use Verifier;
// Verify the proof against the public key
let result = public.verify;
assert!;
// Verification will fail if any parameter is modified
let tampered_output = secret.output;
assert!;
Pedersen-VRF
The Pedersen VRF extends the IETF scheme with key-hiding properties using Pedersen commitments.
Prove
use Prover;
// Generate a proof with a blinding factor
let = secret.prove;
// The proof includes a commitment to the public key
let key_commitment = proof.key_commitment;
Verify
use Verifier;
// Verify without knowing which specific public key was used.
// Verifies that the secret key used to generate `output` is the same as
// the secret key used to generate `proof.key_commitment()`.
let result = verify;
assert!;
// Verify the proof was created using a specific public key.
// This requires knowledge of the blinding factor.
let expected = .into_affine;
assert_eq!;
Ring-VRF
The Ring VRF provides anonymity within a set of public keys using zero-knowledge proofs.
Ring construction
const RING_SIZE: usize = 100;
let prover_key_index = 3;
// Construct an example ring with dummy keys
let mut ring =
.map
.;
// Patch the ring with the public key of the prover
ring = public.0;
// Any key can be replaced with the padding point
ring = padding_point;
// Create parameters for the ring proof system.
// These parameters are reusable across multiple proofs.
let params = from_seed;
Prove
use Prover;
// Create a prover key specific to this ring
let prover_key = params.prover_key;
// Create a prover instance for the specific position in the ring
let prover = params.prover;
// Generate a zero-knowledge proof that:
// 1. The prover knows a secret key for one of the public keys in the ring
// 2. That secret key was used to generate the VRF output
let proof = secret.prove;
Verify
use Verifier;
// Create a verifier key for this ring
let verifier_key = params.verifier_key;
// Create a verifier instance
let verifier = params.verifier;
// Verify the proof - this confirms that:
// 1. The proof was created by someone who knows a secret key in the ring
// 2. The VRF output is correct for the given input
// But it does NOT reveal which ring member created the proof
let result = verify;
Verifier key from commitment
// For efficiency, a commitment to the ring can be shared
let ring_commitment = params.verifier_key.commitment;
// A verifier can reconstruct the verifier key from just the commitment
// without needing the full ring of public keys
let verifier_key = params.verifier_key_from_commitment;
Features
default:stdfull: Enables all features listed below exceptsecret-split,parallel,asm,rfc-6979,test-vectors.secret-split: Point scalar multiplication with secret split. Secret scalar is split into the sum of two scalars, which randomly mutate but retain the same sum. Incurs 2x penalty in some internal sensible scalar multiplications, but provides side channel defenses.ring: Ring-VRF for the curves supporting it.rfc-6979: Support for nonce generation according to RFC-9381 section 5.4.2.1.test-vectors: Deterministic ring-vrf proof. Useful for reproducible test vectors generation.
Curves
ed25519jubjubbandersnatchbaby-jubjubsecp256r1
Arkworks optimizations
parallel: Parallel execution where worth usingrayon.asm: Assembly implementation of some low level operations.
License
Distributed under the MIT License.