1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
use std::marker::PhantomData;
use anyhow::ensure;
use filecoin_hashers::{Domain, Hasher};
use serde::{Deserialize, Serialize};
use crate::{
error::{Error, Result},
merkle::{MerkleProofTrait, MerkleTreeTrait},
parameter_cache::ParameterSetMetadata,
proof::{NoRequirements, ProofScheme},
};
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct DataProof<Proof: MerkleProofTrait> {
#[serde(bound(
serialize = "<Proof::Hasher as Hasher>::Domain: Serialize",
deserialize = "<Proof::Hasher as Hasher>::Domain: Deserialize<'de>"
))]
pub proof: Proof,
#[serde(bound(
serialize = "<Proof::Hasher as Hasher>::Domain: Serialize",
deserialize = "<Proof::Hasher as Hasher>::Domain: Deserialize<'de>"
))]
pub data: <Proof::Hasher as Hasher>::Domain,
}
#[derive(Clone, Debug)]
pub struct PublicParams {
pub leaves: usize,
pub private: bool,
}
impl ParameterSetMetadata for PublicParams {
fn identifier(&self) -> String {
format!(
"merklepor::PublicParams{{leaves: {}; private: {}}}",
self.leaves, self.private
)
}
fn sector_size(&self) -> u64 {
unimplemented!("required for parameter metadata file generation")
}
}
#[derive(Debug, Clone, Serialize, Deserialize)]
pub struct PublicInputs<T: Domain> {
#[serde(bound = "")]
pub commitment: Option<T>,
pub challenge: usize,
}
#[derive(Debug)]
pub struct PrivateInputs<'a, Tree: MerkleTreeTrait> {
pub leaf: <Tree::Hasher as Hasher>::Domain,
pub tree: &'a Tree,
}
impl<'a, Tree: MerkleTreeTrait> PrivateInputs<'a, Tree> {
pub fn new(leaf: <Tree::Hasher as Hasher>::Domain, tree: &'a Tree) -> Self {
PrivateInputs { leaf, tree }
}
}
#[derive(Clone, Debug)]
pub struct SetupParams {
pub leaves: usize,
pub private: bool,
}
#[derive(Debug, Default)]
pub struct PoR<Tree: MerkleTreeTrait> {
_tree: PhantomData<Tree>,
}
impl<'a, Tree: 'a + MerkleTreeTrait> ProofScheme<'a> for PoR<Tree> {
type PublicParams = PublicParams;
type SetupParams = SetupParams;
type PublicInputs = PublicInputs<<Tree::Hasher as Hasher>::Domain>;
type PrivateInputs = PrivateInputs<'a, Tree>;
type Proof = DataProof<Tree::Proof>;
type Requirements = NoRequirements;
fn setup(sp: &SetupParams) -> Result<PublicParams> {
Ok(PublicParams {
leaves: sp.leaves,
private: sp.private,
})
}
fn prove<'b>(
pub_params: &'b Self::PublicParams,
pub_inputs: &'b Self::PublicInputs,
priv_inputs: &'b Self::PrivateInputs,
) -> Result<Self::Proof> {
let challenge = pub_inputs.challenge % pub_params.leaves;
let tree = priv_inputs.tree;
if let Some(ref commitment) = pub_inputs.commitment {
ensure!(commitment == &tree.root(), Error::InvalidCommitment);
}
let proof = tree.gen_proof(challenge)?;
Ok(Self::Proof {
proof,
data: priv_inputs.leaf,
})
}
fn verify(
pub_params: &Self::PublicParams,
pub_inputs: &Self::PublicInputs,
proof: &Self::Proof,
) -> Result<bool> {
{
let commitments_match = match pub_inputs.commitment {
Some(ref commitment) => commitment == &proof.proof.root(),
None => true,
};
let expected_path_length = proof.proof.expected_len(pub_params.leaves);
let path_length_match = expected_path_length == proof.proof.path().len();
if !(commitments_match && path_length_match) {
dbg!(
commitments_match,
path_length_match,
expected_path_length,
proof.proof.path().len()
);
return Ok(false);
}
}
let data_valid = proof.proof.validate_data(proof.data);
let path_valid = proof.proof.validate(pub_inputs.challenge);
Ok(data_valid && path_valid)
}
}