#stark #verifier #zkp #crypto

no-std winter-verifier

Winterfell STARK verifier

23 unstable releases (10 breaking)

new 0.11.0 Nov 24, 2024
0.10.1 Oct 30, 2024
0.9.0 May 9, 2024
0.8.3 Mar 15, 2024
0.2.0 Aug 24, 2021

#1003 in Cryptography

Download history 2275/week @ 2024-08-05 1849/week @ 2024-08-12 2157/week @ 2024-08-19 1868/week @ 2024-08-26 1029/week @ 2024-09-02 1531/week @ 2024-09-09 1776/week @ 2024-09-16 1549/week @ 2024-09-23 1372/week @ 2024-09-30 1191/week @ 2024-10-07 1060/week @ 2024-10-14 1455/week @ 2024-10-21 2093/week @ 2024-10-28 2182/week @ 2024-11-04 479/week @ 2024-11-11 2034/week @ 2024-11-18

6,862 downloads per month
Used in 18 crates (2 directly)

MIT license

1MB
15K SLoC

Winterfell STARK verifier

This crate contains an implementation of a STARK verifier which can verify proofs generated by a prover from the prover crate.

Usage

To verify a proof you can use verifier::verify() function, which has the following signature:

pub fn verify<AIR, HashFn, RandCoin>(
    proof: Proof,
    pub_inputs: AIR::PublicInputs,
    acceptable_options: &AcceptableOptions,
) -> Result<(), VerifierError> 
where 
    AIR: Air, 
    HashFn: ElementHasher<BaseField = AIR::BaseField>,
    RandCoin: RandomCoin<BaseField = AIR::BaseField, Hasher = HashFn>,

where:

  • AIR is a type implementing Air trait for your computation (see air crate for more info).
  • HashFn is a type defining the hash function used by the prover during proof generation.
  • RandCoin is a type defining the methodology for drawing random values during proof generation.
  • proof is the proof generated by the prover attesting that the computation was executed correctly against some set of public inputs.
  • pub_inputs is the set of public inputs against which the computation was executed by the prover.
  • acceptable_options defines a set of security parameters for the proofs which can be accepted by the verifier.

For example, if we have a struct FibAir which implements the Air trait and describes a computation of a Fibonacci sequence (see examples crate for the concrete implementation), we could verify that the prover computed the 1,048,576th term of the sequence correctly, by executing the following:

let min_sec = AcceptableOptions::MinConjecturedSecurity(95);
let fib_result = BaseElement::new(226333832811148522147755045522163790995);
match verifier::verify::<FibAir, Blake3, DefaultRandomCoin<Blake3>>(proof, fib_result, &min_sec) {
    Ok(_) => println!("Proof verified!"),
    Err(err) => println!("Failed to verify proof: {}", err),
}

where, 226333832811148522147755045522163790995 is the 1,048,576th term of the Fibonacci sequence when the sequence is computed in a 128-bit field with modulus 2128 - 45 * 240.

Performance

Proof verification is extremely fast and is nearly independent of the complexity of the computation being verified. In vast majority of cases proofs can be verified in 3 - 5 ms on a modern mid-range laptop CPU (using a single core).

There is one exception, however: if a computation requires a lot of sequence assertions (see air crate for more info), the verification time may grow beyond 5 ms. But for the impact to be noticeable, the number of asserted values would need to be in tens of thousands. And even for hundreds of thousands of sequence assertions, the verification time should not exceed 50 ms.

Crate features

This crate can be compiled with the following features:

  • std - enabled by default and relies on the Rust standard library.
  • no_std - does not rely on the Rust standard library and enables compilation to WebAssembly.

To compile with no_std, disable default features via --no-default-features flag.

License

This project is MIT licensed.

Dependencies

~3.5MB
~63K SLoC