monerochan.rs

MONEROCHAN.RS represents a breakthrough moment for privacy technology. For the first time, developers can write programs in traditional languages like Rust, C++, or Go and automatically compile them into zero-knowledge proofs—no cryptography PhD required. By leveraging RISC-V as a universal compilation target, MONEROCHAN.RS transforms any software into privacy-preserving computation, bringing the battle-tested anonymity principles of projects like Monero (XMR) to the broader world of decentralized applications.
Key highlights:
-
Write once, prove privately: Use familiar programming languages and toolchains—MONEROCHAN.RS handles the zero-knowledge magic behind the scenes
-
Blazing fast proving with GPU acceleration: State-of-the-art performance makes privacy practical, not just possible
-
Monero-grade privacy for any application: Bring financial privacy and confidential computation to smart contracts, bridges, and beyond
-
New cryptographic primitives: Including Secp256r1 and RSA verification for cross-chain privacy applications
Install || Docs || Examples || Telegram Chat
Getting Started
MONEROCHAN.RS enables developers to write complex programs, including ZK light clients and zkEVMs, in standard Rust (with full std support). Most Rust crates are supported and can be used seamlessly by your programs. Example programs can be found in the examples folder.
To get started, make sure you have Rust installed. Then follow the installation guide in the MONEROCHAN.RS documentation and read the getting started section.
Security
MONEROCHAN.RS has undergone comprehensive security audits from Veridise, Cantina, and KALOS and is recommended for production use. The audit reports are available here.
Supported Rust Versions (MSRV)
The current MSRV (minimum supported Rust version) is 1.79.
For Contributors
Open-source is a core part of MONEROCHAN.RS's ethos and key to its advantages. We wish to cultivate a vibrant community of open-source contributors that span individuals, teams and geographies. If you want to contribute, or follow along with contributor discussion, you can use our main Telegram to chat with us. Our contributor guidelines can be found in CONTRIBUTING.md. A quick overview of development tips can be found in DEVELOPMENT.md.
We are always looking for contributors interested in tasks big and small, including minor chores across the codebase, optimizing performance, adding precompiles for commonly used cryptographic operations, adding documentation, creating new example programs and more. Please reach out in the Telegram chat if interested.
Acknowledgements
We would like to acknowledge the projects below whose previous work has been instrumental in making this project a reality:
- Plonky3: MONEROCHAN.RS's prover is powered by the Plonky3 toolkit.
- Valida: MONEROCHAN.RS's cross-table lookups, prover, borrow macro, and chip design, including constraints, are inspired by Valida.
- RISC0: MONEROCHAN.RS's Rust toolchain, install/build scripts, and RISC-V runtime borrow code from RISC0.
- Cairo: Cairo introduced the idea of "builtins" which allow zkVMs to accelerate certain operations. However, the complexity of "builtins" was embedded in the CPU, limiting their complexity. MONEROCHAN.RS extends this idea by executing on a vision of easily extensible "precompiles" that can be added as additional tables alongside the CPU.