use super::*;
use snarkvm_console_algorithms::{
Blake2Xs,
Pedersen128,
Pedersen64,
Poseidon2,
Poseidon4,
Poseidon8,
BHP1024,
BHP256,
BHP512,
BHP768,
};
lazy_static! {
pub static ref GENERATOR_G: Vec<Group<Testnet3>> = Testnet3::new_bases("AleoAccountEncryptionAndSignatureScheme0");
pub static ref MARLIN_FS_PARAMETERS: FiatShamirParameters<Testnet3> = FiatShamir::<Testnet3>::sample_parameters();
pub static ref ENCRYPTION_DOMAIN: Field<Testnet3> = Field::<Testnet3>::new_domain_separator("AleoSymmetricEncryption0");
pub static ref GRAPH_KEY_DOMAIN: Field<Testnet3> = Field::<Testnet3>::new_domain_separator("AleoGraphKey0");
pub static ref SERIAL_NUMBER_DOMAIN: Field<Testnet3> = Field::<Testnet3>::new_domain_separator("AleoSerialNumber0");
pub static ref BHP_256: BHP256<Testnet3> = BHP256::<Testnet3>::setup("AleoBHP256").expect("Failed to setup BHP256");
pub static ref BHP_512: BHP512<Testnet3> = BHP512::<Testnet3>::setup("AleoBHP512").expect("Failed to setup BHP512");
pub static ref BHP_768: BHP768<Testnet3> = BHP768::<Testnet3>::setup("AleoBHP768").expect("Failed to setup BHP768");
pub static ref BHP_1024: BHP1024<Testnet3> = BHP1024::<Testnet3>::setup("AleoBHP1024").expect("Failed to setup BHP1024");
pub static ref PEDERSEN_64: Pedersen64<Testnet3> = Pedersen64::<Testnet3>::setup("AleoPedersen64");
pub static ref PEDERSEN_128: Pedersen128<Testnet3> = Pedersen128::<Testnet3>::setup("AleoPedersen128");
pub static ref POSEIDON_2: Poseidon2<Testnet3> = Poseidon2::<Testnet3>::setup("AleoPoseidon2").expect("Failed to setup Poseidon2");
pub static ref POSEIDON_4: Poseidon4<Testnet3> = Poseidon4::<Testnet3>::setup("AleoPoseidon4").expect("Failed to setup Poseidon4");
pub static ref POSEIDON_8: Poseidon8<Testnet3> = Poseidon8::<Testnet3>::setup("AleoPoseidon8").expect("Failed to setup Poseidon8");
pub static ref CREDITS_PROVING_KEYS: IndexMap<String, Arc<MarlinProvingKey<Console>>> = {
let mut map = IndexMap::new();
snarkvm_parameters::insert_credit_keys!(map, MarlinProvingKey<Console>, Prover);
map
};
pub static ref CREDITS_VERIFYING_KEYS: IndexMap<String, Arc<MarlinVerifyingKey<Console>>> = {
let mut map = IndexMap::new();
snarkvm_parameters::insert_credit_keys!(map, MarlinVerifyingKey<Console>, Verifier);
map
};
}
#[derive(Copy, Clone, Debug, PartialEq, Eq, Hash, Serialize, Deserialize)]
pub struct Testnet3;
impl Testnet3 {
fn new_bases(message: &str) -> Vec<Group<Self>> {
let (base, _, _) = Blake2Xs::hash_to_curve::<<Self as Environment>::Affine>(message);
let mut g = Group::<Self>::new(base);
let mut g_bases = Vec::with_capacity(Scalar::<Self>::size_in_bits());
for _ in 0..Scalar::<Self>::size_in_bits() {
g_bases.push(g);
g = g.double();
}
g_bases
}
}
impl Environment for Testnet3 {
type Affine = <Console as Environment>::Affine;
type BigInteger = <Console as Environment>::BigInteger;
type Field = <Console as Environment>::Field;
type PairingCurve = <Console as Environment>::PairingCurve;
type Projective = <Console as Environment>::Projective;
type Scalar = <Console as Environment>::Scalar;
const EDWARDS_A: Self::Field = Console::EDWARDS_A;
const EDWARDS_D: Self::Field = Console::EDWARDS_D;
const MONTGOMERY_A: Self::Field = Console::MONTGOMERY_A;
const MONTGOMERY_B: Self::Field = Console::MONTGOMERY_B;
}
impl Network for Testnet3 {
type BlockHash = AleoID<Field<Self>, { hrp2!("ab") }>;
type StateRoot = AleoID<Field<Self>, { hrp2!("ar") }>;
type TransactionID = AleoID<Field<Self>, { hrp2!("at") }>;
type TransitionID = AleoID<Field<Self>, { hrp2!("as") }>;
const EDITION: u16 = 0;
const ID: u16 = 3;
const INCLUSION_FUNCTION_NAME: &'static str = snarkvm_parameters::testnet3::TESTNET3_INCLUSION_FUNCTION_NAME;
const NAME: &'static str = "Aleo Testnet 3";
fn genesis_bytes() -> &'static [u8] {
snarkvm_parameters::testnet3::GenesisBytes::load_bytes()
}
fn get_credits_proving_key(function_name: String) -> Result<&'static Arc<MarlinProvingKey<Self>>> {
CREDITS_PROVING_KEYS
.get(&function_name)
.ok_or_else(|| anyhow!("Proving key for credits.aleo/{function_name}' not found"))
}
fn get_credits_verifying_key(function_name: String) -> Result<&'static Arc<MarlinVerifyingKey<Self>>> {
CREDITS_VERIFYING_KEYS
.get(&function_name)
.ok_or_else(|| anyhow!("Verifying key for credits.aleo/{function_name}' not found"))
}
fn inclusion_proving_key() -> &'static Arc<MarlinProvingKey<Self>> {
static INSTANCE: OnceCell<Arc<MarlinProvingKey<Console>>> = OnceCell::new();
INSTANCE.get_or_init(|| {
Arc::new(
CircuitProvingKey::from_bytes_le(&snarkvm_parameters::testnet3::INCLUSION_PROVING_KEY[1..])
.expect("Failed to load inclusion proving key."),
)
})
}
fn inclusion_verifying_key() -> &'static Arc<MarlinVerifyingKey<Self>> {
static INSTANCE: OnceCell<Arc<MarlinVerifyingKey<Console>>> = OnceCell::new();
INSTANCE.get_or_init(|| {
Arc::new(
CircuitVerifyingKey::from_bytes_le(&snarkvm_parameters::testnet3::INCLUSION_VERIFYING_KEY[1..])
.expect("Failed to load inclusion verifying key."),
)
})
}
fn g_powers() -> &'static Vec<Group<Self>> {
&GENERATOR_G
}
fn g_scalar_multiply(scalar: &Scalar<Self>) -> Group<Self> {
GENERATOR_G
.iter()
.zip_eq(&scalar.to_bits_le())
.filter_map(|(base, bit)| match bit {
true => Some(base),
false => None,
})
.sum()
}
fn marlin_universal_prover() -> &'static UniversalProver<Self::PairingCurve> {
static INSTANCE: OnceCell<UniversalProver<<Console as Environment>::PairingCurve>> = OnceCell::new();
INSTANCE.get_or_init(|| {
snarkvm_algorithms::polycommit::kzg10::UniversalParams::load()
.expect("Failed to load universal SRS (KZG10).")
.to_universal_prover()
.expect("Failed to convert universal SRS (KZG10) to the prover.")
})
}
fn marlin_universal_verifier() -> &'static UniversalVerifier<Self::PairingCurve> {
static INSTANCE: OnceCell<UniversalVerifier<<Console as Environment>::PairingCurve>> = OnceCell::new();
INSTANCE.get_or_init(|| {
snarkvm_algorithms::polycommit::kzg10::UniversalParams::load()
.expect("Failed to load universal SRS (KZG10).")
.to_universal_verifier()
.expect("Failed to convert universal SRS (KZG10) to the verifier.")
})
}
fn marlin_fs_parameters() -> &'static FiatShamirParameters<Self> {
&MARLIN_FS_PARAMETERS
}
fn encryption_domain() -> Field<Self> {
*ENCRYPTION_DOMAIN
}
fn graph_key_domain() -> Field<Self> {
*GRAPH_KEY_DOMAIN
}
fn serial_number_domain() -> Field<Self> {
*SERIAL_NUMBER_DOMAIN
}
fn commit_bhp256(input: &[bool], randomizer: &Scalar<Self>) -> Result<Field<Self>> {
BHP_256.commit(input, randomizer)
}
fn commit_bhp512(input: &[bool], randomizer: &Scalar<Self>) -> Result<Field<Self>> {
BHP_512.commit(input, randomizer)
}
fn commit_bhp768(input: &[bool], randomizer: &Scalar<Self>) -> Result<Field<Self>> {
BHP_768.commit(input, randomizer)
}
fn commit_bhp1024(input: &[bool], randomizer: &Scalar<Self>) -> Result<Field<Self>> {
BHP_1024.commit(input, randomizer)
}
fn commit_ped64(input: &[bool], randomizer: &Scalar<Self>) -> Result<Field<Self>> {
PEDERSEN_64.commit(input, randomizer)
}
fn commit_ped128(input: &[bool], randomizer: &Scalar<Self>) -> Result<Field<Self>> {
PEDERSEN_128.commit(input, randomizer)
}
fn commit_to_group_bhp256(input: &[bool], randomizer: &Scalar<Self>) -> Result<Group<Self>> {
BHP_256.commit_uncompressed(input, randomizer)
}
fn commit_to_group_bhp512(input: &[bool], randomizer: &Scalar<Self>) -> Result<Group<Self>> {
BHP_512.commit_uncompressed(input, randomizer)
}
fn commit_to_group_bhp768(input: &[bool], randomizer: &Scalar<Self>) -> Result<Group<Self>> {
BHP_768.commit_uncompressed(input, randomizer)
}
fn commit_to_group_bhp1024(input: &[bool], randomizer: &Scalar<Self>) -> Result<Group<Self>> {
BHP_1024.commit_uncompressed(input, randomizer)
}
fn commit_to_group_ped64(input: &[bool], randomizer: &Scalar<Self>) -> Result<Group<Self>> {
PEDERSEN_64.commit_uncompressed(input, randomizer)
}
fn commit_to_group_ped128(input: &[bool], randomizer: &Scalar<Self>) -> Result<Group<Self>> {
PEDERSEN_128.commit_uncompressed(input, randomizer)
}
fn hash_bhp256(input: &[bool]) -> Result<Field<Self>> {
BHP_256.hash(input)
}
fn hash_bhp512(input: &[bool]) -> Result<Field<Self>> {
BHP_512.hash(input)
}
fn hash_bhp768(input: &[bool]) -> Result<Field<Self>> {
BHP_768.hash(input)
}
fn hash_bhp1024(input: &[bool]) -> Result<Field<Self>> {
BHP_1024.hash(input)
}
fn hash_ped64(input: &[bool]) -> Result<Field<Self>> {
PEDERSEN_64.hash(input)
}
fn hash_ped128(input: &[bool]) -> Result<Field<Self>> {
PEDERSEN_128.hash(input)
}
fn hash_psd2(input: &[Field<Self>]) -> Result<Field<Self>> {
POSEIDON_2.hash(input)
}
fn hash_psd4(input: &[Field<Self>]) -> Result<Field<Self>> {
POSEIDON_4.hash(input)
}
fn hash_psd8(input: &[Field<Self>]) -> Result<Field<Self>> {
POSEIDON_8.hash(input)
}
fn hash_many_psd2(input: &[Field<Self>], num_outputs: u16) -> Vec<Field<Self>> {
POSEIDON_2.hash_many(input, num_outputs)
}
fn hash_many_psd4(input: &[Field<Self>], num_outputs: u16) -> Vec<Field<Self>> {
POSEIDON_4.hash_many(input, num_outputs)
}
fn hash_many_psd8(input: &[Field<Self>], num_outputs: u16) -> Vec<Field<Self>> {
POSEIDON_8.hash_many(input, num_outputs)
}
fn hash_to_group_bhp256(input: &[bool]) -> Result<Group<Self>> {
BHP_256.hash_uncompressed(input)
}
fn hash_to_group_bhp512(input: &[bool]) -> Result<Group<Self>> {
BHP_512.hash_uncompressed(input)
}
fn hash_to_group_bhp768(input: &[bool]) -> Result<Group<Self>> {
BHP_768.hash_uncompressed(input)
}
fn hash_to_group_bhp1024(input: &[bool]) -> Result<Group<Self>> {
BHP_1024.hash_uncompressed(input)
}
fn hash_to_group_ped64(input: &[bool]) -> Result<Group<Self>> {
PEDERSEN_64.hash_uncompressed(input)
}
fn hash_to_group_ped128(input: &[bool]) -> Result<Group<Self>> {
PEDERSEN_128.hash_uncompressed(input)
}
fn hash_to_group_psd2(input: &[Field<Self>]) -> Result<Group<Self>> {
POSEIDON_2.hash_to_group(input)
}
fn hash_to_group_psd4(input: &[Field<Self>]) -> Result<Group<Self>> {
POSEIDON_4.hash_to_group(input)
}
fn hash_to_group_psd8(input: &[Field<Self>]) -> Result<Group<Self>> {
POSEIDON_8.hash_to_group(input)
}
fn hash_to_scalar_psd2(input: &[Field<Self>]) -> Result<Scalar<Self>> {
POSEIDON_2.hash_to_scalar(input)
}
fn hash_to_scalar_psd4(input: &[Field<Self>]) -> Result<Scalar<Self>> {
POSEIDON_4.hash_to_scalar(input)
}
fn hash_to_scalar_psd8(input: &[Field<Self>]) -> Result<Scalar<Self>> {
POSEIDON_8.hash_to_scalar(input)
}
fn merkle_tree_bhp<const DEPTH: u8>(leaves: &[Vec<bool>]) -> Result<BHPMerkleTree<Self, DEPTH>> {
MerkleTree::new(&*BHP_1024, &*BHP_512, leaves)
}
fn merkle_tree_psd<const DEPTH: u8>(leaves: &[Vec<Field<Self>>]) -> Result<PoseidonMerkleTree<Self, DEPTH>> {
MerkleTree::new(&*POSEIDON_4, &*POSEIDON_2, leaves)
}
fn verify_merkle_path_bhp<const DEPTH: u8>(
path: &MerklePath<Self, DEPTH>,
root: &Field<Self>,
leaf: &Vec<bool>,
) -> bool {
path.verify(&*BHP_1024, &*BHP_512, root, leaf)
}
fn verify_merkle_path_psd<const DEPTH: u8>(
path: &MerklePath<Self, DEPTH>,
root: &Field<Self>,
leaf: &Vec<Field<Self>>,
) -> bool {
path.verify(&*POSEIDON_4, &*POSEIDON_2, root, leaf)
}
}
#[cfg(test)]
mod tests {
use super::*;
type CurrentNetwork = Testnet3;
#[test]
fn test_g_scalar_multiply() {
let scalar = Scalar::rand(&mut TestRng::default());
let group = CurrentNetwork::g_scalar_multiply(&scalar);
assert_eq!(group, CurrentNetwork::g_powers()[0] * scalar);
}
}