Skip to content

Commit

Permalink
docs: refactor circuits docs
Browse files Browse the repository at this point in the history
  • Loading branch information
ctrlc03 committed May 22, 2024
1 parent 73e17ce commit 0169a7f
Show file tree
Hide file tree
Showing 9 changed files with 511 additions and 497 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
"position": 3,
"link": {
"type": "generated-index",
"description": "MACI's zk-SNARK circuits"
"description": "MACI uses zk-SNARKs to essentially hide how each person voted while still revealing the final vote result. This gives voters privacy and helps reduce bribery while still ensuring that the final results were tallied correctly off-chain."
}
}

This file was deleted.

Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
---
title: MACI Circuits Introduction
description: Introduction to the core zk-SNARK circuits of MACI
sidebar_label: Introduction
sidebar_position: 1
---

MACI has two main zk-SNARK [circuits](https://github.com/privacy-scaling-explorations/maci/tree/dev/circuits):

1. [`ProcessMessages.circom`](https://github.com/privacy-scaling-explorations/maci/blob/dev/circuits/circom/processMessages.circom), which takes a batch of encrypted messages, decrypts them, and generates a proof that the coordinator's local processing was performed correctly.
2. [`TallyVotes.circom`](https://github.com/privacy-scaling-explorations/maci/blob/dev/circuits/circom/tallyVotes.circom), which counts votes from users' ballots, batch by batch.

The rest of the circuits are utilities templates that are required for the main circuits to work correctly. These include utilities such as float math, conversion of private keys, and Poseidon hashing/encryption.

Each circuit is parameterised and it is important to set the right parameters that match your use case. For example, if you want to support up to 3125 messages, the message tree depth parameter should be set to `5` (as $5^5 = 3125$).

## Background

### zk-SNARKs

zk-SNARKs are a type of zero-knowledge proof which allows a "prover" to prove to a "verifier" that they know a secret without revealing the secret itself. In MACI, the prover is the coordinator. MACI uses zk-SNARKs to prove that the coordinator has correctly processed the batches of messages and that all votes have been tallied correctly. A smart contract acts as the verifier to check the proof from the coordinator. Users can also verify that the process was done correctly at any point after the proof generation.

### Circom

MACI's circuits are written using [Circom](https://docs.circom.io/), a domain-specific language (DSL) used to write zk-SNARK circuits. Circom syntax resembles JavaScript, and it currently is one of the most popular DSL in use by zk developers. Please refer to their documentation to learn more about the language.

### Proving system

MACI uses [Groth16](https://eprint.iacr.org/2016/260.pdf) as its proving system. Groth16 is a zk-SNARK proving system that allows for the generation of proofs that are small and fast to verify.

## How are the circuits used?

The circuits are used by the coordinator (the prover) to prove that they have correctly processed a batch of messages and tallied the votes correctly. This happens after a Poll has completed, and the coordinator has merged the state and message trees. The coordinator then generates a proof for each batch of messages, and submits them to the contract. The contract then verifies the proofs and updates the commitments on chain.

## How do the Circuits fit in a voting round?

![flow](/img/circuits/processingAfterPollEnds.svg)
Original file line number Diff line number Diff line change
@@ -0,0 +1,138 @@
---
title: MACI Process Messages Circuit
description: Introduction to the core zk-SNARK circuits of MACI
sidebar_label: Process Messages Circuit
sidebar_position: 3
---

**Repo link**: [`processMessages`](https://github.com/privacy-scaling-explorations/maci/blob/dev/circuits/circom/processMessages.circom)

This circuit allows the coordinator to prove that they have correctly processed each message in reverse order, in a consecutive batch of 5 ^ msgBatchDepth messages to the respective state leaf within the state tree. Coordinators would use this circuit to prove correct execution at the end of each Poll.

The [`processMessages`](https://github.com/privacy-scaling-explorations/maci/blob/dev/circuits/circom/processMessages.circom) circuit will try to decrypt the messages, and based on the content of the message, update within itself the trees, to generate a proof that the coordinator's off-chain processing was done correctly. In other words, the circuit takes a final state, an initial state, and the leaves (messages and user signups) - it processes these messages via the different state transitions to finally check that the expected state is correct.
The pre-requisites for this circuit are:

- the related Poll has ended
- the state tree has been merged
- the message tree has been merged

This circuit requires the coordinator's private key, hence a proof for this circuit can only be generated by the coordinator. The private key is needed in order to generate the ECDH shared key used to decrypt the messages.

![ProcessMessages](/img/circuits/processMessages.svg)

:::info
A version working with non quadratic voting (non-qv) is also available. This version is called `processMessagesNonQV` and is to be used when the Poll is not using the quadratic voting feature. Note that by default MACI works with quadratic voting.
:::

#### Parameters

| # | Parameter | Description |
| --- | ------------------------ | ---------------------------------------------------- |
| 0 | State tree depth | Allows $(5^{n})$ signups. |
| 1 | Message tree depth | Allows $(5^{n})$ votes or key-change messages. |
| 2 | Message batch tree depth | Allows $(5^{n})$ messages to be processed per batch. |
| 3 | Vote option tree depth | Allows $(5^{n})$ vote options. |

#### Inputs

| Input signal | Description |
| -------------------------------- | --------------------------------------------------------------------------------------- |
| `inputHash` | The SHA256 hash of inputs supplied by the contract |
| `packedVals` | Described below |
| `pollEndTimestamp` | The Unix timestamp at which the poll ends |
| `msgRoot` | The root of the message tree |
| `msgs` | The batch of messages as an array of arrays |
| `msgSubrootPathElements` | Described below |
| `coordinatorPubKeyHash` | $poseidon_2([cPk_x, cPk_y])$ |
| `newSbCommitment` | Described below |
| `coordPrivKey` | The coordinator's private key |
| `coordPubKey` | The coordinator's public key |
| `encPubKeys` | The public keys used to generate shared ECDH encryption keys to encrypt the messages |
| `currentStateRoot` | The state root before the commands are applied |
| `currentStateLeaves` | The state leaves upon which messages are applied |
| `currentStateLeavesPathElements` | The Merkle path to each incremental state root |
| `currentSbCommitment` | Described below |
| `currentSbSalt` | Described below |
| `newSbCommitment` | Described below |
| `newSbSalt` | Described below |
| `currentBallotRoot` | The root of the ballot tree before messages are applied |
| `currentBallots` | The ballots upon which ballots are applied |
| `currentBallotsPathElements` | The Merkle path to each incremental ballot root |
| `currentVoteWeights` | The existing vote weight for the vote option in the ballot which each command refers to |
| `currentVoteWeightsPathElements` | The Merkle path from each vote weight to the vote option root in its ballot |

##### `inputHash`

All inputs to this circuit are private except for `inputHash`. To save gas during verification, the `MessageProcessor` contract hashes the following values using SHA256 and uses the hash as the sole element of $ic$:

1. `packedVals`
2. `coordinatorPubKeyHash`
3. `msgRoot`
4. `currentSbCommitment`
5. `newSbCommitment`
6. `pollEndTimestamp`

The hash is computed using the `sha256` Solidity function and is then subject to modulo $p$.

##### `packedVals`

`packedVals` is the following values represented as one field element. Consider that a field element is roughly 253 bits. The big-endian bit-representation is as such:

| Bits | Value |
| ----------- | -------------------------- |
| 1st 53 bits | `0` |
| 2nd 50 bits | `batchEndIndex` |
| 3rd 50 bits | `currentMessageBatchIndex` |
| 4th 50 bits | `numSignUps` |
| 5th 50 bits | `maxVoteOptions` |

For instance, if `maxVoteOptions` is 25 and `batchEndIndex` is `5`, and all other values are 0, the following is the `packedVals` representation in hexadecimal:

`140000000000000000000000000000000000019`

##### `currentSbCommitment` and `newSbCommitment`

The `currentSbCommitment` is the $poseidon_3$ hash of the state tree root, the ballot tree root, and a random salt. The purpose of the random salt, which should be unique to each batch, is to ensure that the value of `currentSbCommitment` always changes even if all the commands in a batch are invalid and therefore do not change the state tree or ballot tree root.

The result of applying a batch of messages to `currentSbCommitment` is `newSbCommitment`.

##### `currentSbSalt`

The salt used to produce `currentSbCommitment` (see above).

##### `newSbSalt`

The salt used to produce `newSbCommitment` (see above).

##### `msgSubrootPathElements`

The index of each message in `msgs` is consecutive. As such, in order to prove that each message in `msgs` is indeed a leaf of the message tree, we compute the subtree root of `msgs`, and then verify that the subtree root is indeed a subroot of `msgRoot`.

A simplified example using a tree of arity 2:

```
r
/ \
s ...
/ \
o o
/ \ / \
a b c d
```

To prove that `a...d` are leaves of the tree with root `r`, we prove that the leaves have the subroot `s` with depth 2, and _then_ prove that `s` is a member of `r` at depth 1.

The implementation for this is in the `QuinBatchLeavesExists` circuit in `https://github.com/privacy-scaling-explorations/maci/blob/dev/circuits/circom/trees/incrementalQuinTree.circom`.

This method requires fewer circuit constraints than if we verified a Merkle proof for each leaf.

#### Statements that the circuit proves

1. That the prover knows the preimage to `inputHash` (see above)
2. That the prover knows the preimage to `currentSbCommitment` (that is, the state root, ballot root, and `currentSbSalt`)
3. That `maxVoteOptions <= (5 ^ voteOptionTreeDepth)`
4. That `numSignUps <= (5 ^ stateTreeDepth)`
5. That `coordPubKey` is correctly derived from `coordPrivKey`
6. That `coordPubKey` is the preimage to the Poseidon hash of `coordPubKey` (provided by the contract)
7. That each message in `msgs` exists in the message tree
8. That after decrypting and applying each message, in reverse order, to the corresponding state and ballot leaves, the new state root, new ballot root, and `newSbSalt` are the preimage to `newSbCommitment`
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
---
title: MACI Circuits setup
description: Introduction to the core zk-SNARK circuits of MACI
sidebar_label: Setting up MACI's Circuits
sidebar_position: 2
---

## Compile circuits

### Prerequisites

Before building the project, make sure you have the following dependencies installed:

- [circom](https://docs.circom.io/downloads/downloads/)

### Building MACI circuits

To build the main circuits of MACI, run the following command (`-c` postfix for c++ witness gen, and `-wasm` postfix for WASM witness gen only):

```
pnpm build-test-circuits-c -- --out-path $OUT_PATH
pnpm build-test-circuits-wasm -- --out-path $OUT_PATH
```

Please note that the circuits are configured with testing purpose parameters, which means it can only handle a limited amount of messages (up to 25 messages). For more information on the parameters and how to configure them, please refer to the individual circuit documentation within this page. Also, within the [configure-circomkit](https://maci.pse.dev/docs/installation#configure-circomkit) section of the `installation` page, you'll see how you can update the config file with new params.

To compile a single circuit, you can run:

```
pnpm circom:build $CIRCUIT_NAME
```

> Please note that the name should match one of the circuit names inside the `circom.json` file.
### Generating zKeys

Run from the root directory to save to the `cli/zkeys` folder:

```bash
pnpm setup:zkeys -- --outPath ../cli/zkeys
```

Run from the circuits folder with `--outPath` to save to a custom folder:

```bash
cd circuits && pnpm gen-zkeys --outPath ./CUSTOM_FOLDER_NAME
```

The larger the trees, the more time this process may take. You may also need a
machine with a very large amount of memory.

> Note that you will have to modify the parameters inside the `./circuits/circom/circuits.json` file to match your use case. For example, if you want to support up to 3125 messages, the message tree depth parameter should be set to `5` (as $5^5 = 3125$).
#### Measure the circuit sizes

The size of a circuit is denoted by its number of constraints. The larger this
number, the more time it takes to compile it, generate its `.zkey` file, and
perform phase 2 contributions.

Run this command to measure a circuit:

```bash
pnpm exec snarkjs r1cs info CIRCUIT_NAME.circom
```

#### Download the `.ptau` file

This file should be the result of the Perpetual Powers of Tau trusted setup
contribution which [Hermez Network
selected](https://blog.hermez.io/hermez-cryptographic-setup/).

When running the `setup:zkeys` command, the `.ptau` file will be downloaded automatically.

### Generating and Validating ZK Proofs

To generate and validate ZK proofs from the artifacts produced by `circom`, you will need [`snarkjs`](https://github.com/iden3/snarkjs#groth16-1).

## Testing

To test the circuits package, please use `pnpm run test`. This will run all of the tests inside the tests folder.

To run individual tests, you can use the following commands (for all other circuits please refer to the `package.json` scripts section):

- `pnpm run test:processMessages` to run the tests for the `processMessages` circuit.
- `pnpm run test:tallyVotes` to run the tests for the `tallyVotes` circuit.

More details on testing are provided in the [testing section](/docs/testing) of the documentation.
Loading

0 comments on commit 0169a7f

Please sign in to comment.