1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
use vm_core::{
crypto::hash::{Blake3_192, Blake3_256, Hasher, Rpo256},
utils::{
collections::*, ByteReader, ByteWriter, Deserializable, DeserializationError, Serializable,
},
};
use winter_air::proof::StarkProof;
// EXECUTION PROOF
// ================================================================================================
/// A proof of correct execution of Miden VM.
///
/// The proof encodes the proof itself as well as STARK protocol parameters used to generate the
/// proof. However, the proof does not contain public inputs needed to verify the proof.
#[derive(Debug, Clone, PartialEq, Eq)]
pub struct ExecutionProof {
pub proof: StarkProof,
pub hash_fn: HashFunction,
}
impl ExecutionProof {
// CONSTRUCTOR
// --------------------------------------------------------------------------------------------
/// Creates a new instance of [ExecutionProof] from the specified STARK proof and hash
/// function.
pub const fn new(proof: StarkProof, hash_fn: HashFunction) -> Self {
Self { proof, hash_fn }
}
// PUBLIC ACCESSORS
// --------------------------------------------------------------------------------------------
/// Returns the underlying STARK proof.
pub const fn stark_proof(&self) -> &StarkProof {
&self.proof
}
/// Returns the hash function used during proof generation process.
pub const fn hash_fn(&self) -> HashFunction {
self.hash_fn
}
/// Returns conjectured security level of this proof in bits.
pub fn security_level(&self) -> u32 {
match self.hash_fn {
HashFunction::Blake3_192 => self.proof.security_level::<Blake3_192>(true),
HashFunction::Blake3_256 => self.proof.security_level::<Blake3_256>(true),
HashFunction::Rpo256 => self.proof.security_level::<Rpo256>(true),
}
}
// SERIALIZATION / DESERIALIZATION
// --------------------------------------------------------------------------------------------
/// Serializes this proof into a vector of bytes.
pub fn to_bytes(&self) -> Vec<u8> {
let mut bytes = self.proof.to_bytes();
assert!(!bytes.is_empty(), "invalid STARK proof");
// TODO: ideally we should write hash function into the proof first to avoid reallocations
bytes.insert(0, self.hash_fn as u8);
bytes
}
/// Reads the source bytes, parsing a new proof instance.
pub fn from_bytes(source: &[u8]) -> Result<Self, DeserializationError> {
if source.len() < 2 {
return Err(DeserializationError::UnexpectedEOF);
}
let hash_fn = HashFunction::try_from(source[0])?;
let proof = StarkProof::from_bytes(&source[1..])?;
Ok(Self::new(proof, hash_fn))
}
// DESTRUCTOR
// --------------------------------------------------------------------------------------------
/// Returns components of this execution proof.
pub fn into_parts(self) -> (HashFunction, StarkProof) {
(self.hash_fn, self.proof)
}
}
// HASH FUNCTION
// ================================================================================================
/// A hash function used during STARK proof generation.
#[derive(Debug, Clone, Copy, PartialEq, Eq, Hash)]
#[repr(u8)]
pub enum HashFunction {
/// BLAKE3 hash function with 192-bit output.
Blake3_192 = 0x00,
/// BLAKE3 hash function with 256-bit output.
Blake3_256 = 0x01,
/// RPO hash function with 256-bit output.
Rpo256 = 0x02,
}
impl Default for HashFunction {
fn default() -> Self {
Self::Blake3_192
}
}
impl HashFunction {
/// Returns the collision resistance level (in bits) of this hash function.
pub const fn collision_resistance(&self) -> u32 {
match self {
HashFunction::Blake3_192 => Blake3_192::COLLISION_RESISTANCE,
HashFunction::Blake3_256 => Blake3_256::COLLISION_RESISTANCE,
HashFunction::Rpo256 => Rpo256::COLLISION_RESISTANCE,
}
}
}
impl TryFrom<u8> for HashFunction {
type Error = DeserializationError;
fn try_from(repr: u8) -> Result<Self, Self::Error> {
match repr {
0x00 => Ok(Self::Blake3_192),
0x01 => Ok(Self::Blake3_256),
0x02 => Ok(Self::Rpo256),
_ => Err(DeserializationError::InvalidValue(format!(
"the hash function representation {repr} is not valid!"
))),
}
}
}
// SERIALIZATION
// ================================================================================================
impl Serializable for HashFunction {
fn write_into<W: ByteWriter>(&self, target: &mut W) {
target.write_u8(*self as u8);
}
}
impl Deserializable for HashFunction {
fn read_from<R: ByteReader>(source: &mut R) -> Result<Self, DeserializationError> {
source.read_u8()?.try_into()
}
}
impl Serializable for ExecutionProof {
fn write_into<W: ByteWriter>(&self, target: &mut W) {
self.proof.write_into(target);
self.hash_fn.write_into(target);
}
}
impl Deserializable for ExecutionProof {
fn read_from<R: ByteReader>(source: &mut R) -> Result<Self, DeserializationError> {
let proof = StarkProof::read_from(source)?;
let hash_fn = HashFunction::read_from(source)?;
Ok(ExecutionProof { proof, hash_fn })
}
}