This repo is very large. Before cloning, please follow the instructions below in "Downloading Files" to avoid downloading unnecessary data.
To download the large .r1cs
, .ptau
, and .zkey
files in this repo, install git-lfs.
Then run the following commands to clone the repo without the larger files:
GIT_LFS_SKIP_SMUDGE=1 git clone https://github.com/aptos-labs/aptos-keyless-trusted-setup-contributions
cd aptos-keyless-trusted-setup-contributions
To get a specific file <filename>
, run
git lfs pull --include "<filename>"
If needed, install npm, and also install nvm. Then run the commands
nvm use 18
and
npm install [email protected]
to install the version of snarkjs
used by our code which was used to run the setup ceremony.
To verify the hash values of various files presented in this document, ensure Homebrew is installed and run
brew install b2sum
The b2sum
hash of a file may be computed by running b2sum <filename>
.
The powers of tau file used was downloaded from one of the links provided here in the Snarkjs README, as the file titled powersOfTau28_hez_final_21.ptau
. This .ptau
file contains 54 contributions and a random beacon. Its b2sum
hash is
9aef0573cef4ded9c4a75f148709056bf989f80dad96876aadeb6f1c6d062391f07a394a9e756d16f7eb233198d5b69407cca44594c763ab4a5b67ae73254678
To verify this file, run
npx [email protected] powersoftau verify powersOfTau28_hez_final_21.ptau -v
To reproduce main.r1cs
, clone the Aptos Keyless Circuit Repo, checkout commit 2a1d445a49d212fa55c322e6f3373631bc74140a
, and run the following commands:
cd templates
circom -l . main.circom --r1cs
The b2sum
hash of the resulting main.r1cs
file should be
18d68f469a6ead62aafcc9c78fa1b99b4391b9a5acfca2be62722503684f98ba3d84a764d2aa9143898797bf33ab0e4c9fb2584e2afa660e0100cc8af7eb5226
which is identical to the b2sum
hash of main.r1cs
in this repo.
This provides a link between our circuit code and the trusted setup, ensuring you can verify the setup was done over the correct codebase. Without this link, you could not know what circuit the setup was done over, making it potentially insecure.
To reproduce the initial .zkey
file, run the command
npx [email protected] groth16 setup main.r1cs ./powersOfTau28_hez_final_21.ptau initial.zkey -v
The b2sum
hash of the resulting .zkey
file should match that of contributions/main_00000.zkey
. This hash value is
d10eb2e278167011a7a205bdf3888d7df1723c8079243a81156092459b9f7341597aeba719187d82d11bfa16b3cba0955260520477d3094c2ffc7dbc99d2f0fa
The folder contributions
contains all .zkey
files output by the Aptos OIDB trusted setup. Each .zkey
file corresponds to the contribution of one participant, in the order of their having participated, so that i.e. main_00004.zkey
corresponds to the output of the contribution made by the 4-th participant to have completed their contribution.
Each contribution may be verified by running the command
npx [email protected] zkey verify main.r1cs powersOfTau28_hez_final_21.ptau contributions/<contribution_filename>.zkey -v
Depending on your machine, this commands can take upwards of 20 minutes. Upon completion, it will produce an output of the following form:
[INFO] snarkJS: Circuit Hash:
0a9aeb1f 247e8652 46a00128 ab2fbe10
86ad8f2a 86a17f72 bd35f095 dfde1a86
646f6faa fdaa46d6 9dde1ad5 88f21d4d
0d4e9e74 519b561d 9e71e768 9c739b68
[INFO] snarkJS: -------------------------
[INFO] snarkJS: contribution #3 sherry-x-55457892:
0125c8cb de936779 25ff1b62 49eff731
15a68679 899678bb 83a19c0e cf8daf28
20dcf4a9 78192394 2895cbc0 1ba661b3
1628f395 f553b409 16428355 cfd53f6b
[INFO] snarkJS: -------------------------
[INFO] snarkJS: contribution #2 michaelaptos-158355435:
63c5d60f 668bd588 d6c86d0e a459f24d
d75c207a 76dbc07a 36c466c5 97ef3ba7
760e6dd3 b3162767 313935eb afe8fd59
1b4868b0 238ee70c beb60e3b a46a38d6
[INFO] snarkJS: -------------------------
[INFO] snarkJS: contribution #1 alinush-1724810:
65c3e44a e8ae9dcd 2406d1b4 7413e09c
72a6587b 5dbc6e00 ac607c84 cefbc4c1
a9dd4d2c 39d78381 ea2a8cf2 8d3f4e91
c32c2e8b eaf17465 b9bc8045 a529ecf1
[INFO] snarkJS: -------------------------
[INFO] snarkJS: ZKey Ok!
This is a list of all contribution hashes up to and including the current contribution that you have just verified. If you participated in the setup, you can verify that your contribution is being used correctly by running this command on the final .zkey
file, contributions/main_final.zkey
, and comparing the output contribution hash corresponding to your contribution to the one which was printed out when you finished contributing during the ceremony.
This may be done with the following command:
npx [email protected] zkey verify main.r1cs powersOfTau28_hez_final_21.ptau contributions/main_final.zkey -v
Note that the contribution hash is not simply a hash of the .zkey
file, but a hash of the participant-specific parameters stored by every .zkey
file after a participant's contribution has been made. Verification on the i
-th .zkey
file includes checks on these parameters for participants 1
through i
. The output of this process is used in verifying the .zkey
file overall when running the above zkey verify
command.
To eliminate potential bias, we apply the Drand randomness beacon to the final .zkey
file to obtain our final .zkey
file for use in production. To regenerate our randomness, first follow the instructions here and then run
./drand-client --round 3793809 \
--chain-hash 8990e7a9aaed2ffed73dbd7092123d6f289930540d7651336225dc172e51b2ce \
--url http://api.drand.sh \
--relay /dnsaddr/api.drand.sh
3793809 da44fdb1c88a25fd68d8581e077dd9e4d6d4c8af22c30b127a23dd8343995565
which should output round number 3793809
and randomness
da44fdb1c88a25fd68d8581e077dd9e4d6d4c8af22c30b127a23dd8343995565
You can recreate the final .zkey
file by running
npx [email protected] zkey beacon contributions/main_00141.zkey main_final.zkey da44fdb1c88a25fd68d8581e077dd9e4d6d4c8af22c30b127a23dd8343995565 10 -v
This command may take 10-15 minutes. It should output
[INFO] snarkJS: Contribution Hash:
fe2a67c9 267a89ac 401e1e0c f6967df5
84f10fcd 07f49b71 cd204771 f7eff35f
f60bc605 195b1912 0b698f0b 15b4247e
84188144 2c7bd57a 9143de22 430379cd
As with other contributions, this .zkey
file may be verified by running
npx [email protected] zkey verify main.r1cs powersOfTau28_hez_final_21.ptau main_final.zkey -v
The b2sum
hash of the resulting main_final.zkey
should be
6f603ff9f8cb0d66fa6c86531fae6a7e1b73b9ccfa6bb42f4c2e64bbf6e65f1e6994ace9ad84b21338c19242125123cf066db74b6fdd65bf8dd219f1d55e10e9
which is identical to the b2sum
hash of contributions/main_final.zkey
.
The final verification key can be exported using
npx [email protected] zkey export verificationkey contributions/main_final.zkey verification_key_regen.json
Its b2sum
hash is
e1b963bac4c8f58b91e35b8695e72c0872e4fcd112f732450b03087088b7edf276d9ea8047f91df730a374a1d04fffcea04e3ace0a45c56e29f92950bcfdca0d
This should be identical to the verification_key.json
file already in the repo.
The list of participants who both completed their contribution and consented to have their identity listed are presented below. We would like to sincerely thank both them and those who have chosen to remain anonymous for contributing to the security of Aptos Keyless.
Aaron Gao
Aaron Lint
Ahri
Aleks
Aleksandre Khokhiashvili
Alin Tomescu
Alyssa Ponzo
Andrea Cappa
Andrei
Anna
Anna Maria
Anne B
Anto
antotg
Artsiom Holikau
Avery
Benny Pinkas
Blake Zimmerman
Bowen Yang
Brian Boehlke
Brian Li
Brian Murphy
change
Christian Theilemann
Christopher Dowle
CryptoJack
Daniel Porteous
Darren Park
Darron Park
David Conroy
David Wolinsky
Davide
Dmytro
Edouard Lavidalle
Evgeny Garanin
Gabriele Della Casa Venturelli
Geoff Tang
Greg Nazario
Greg North
guguru
HWANGJAE LEE
Hudson Jang
hyerim kim
Hyung-Kyu Choi (DSRV)
Jad
Jill Xu
John Youngseok Yang
Josh Lind
Jumanzi Han
Junha Park
Junkil Park
KappaRoss
Kent White
Keyrock
Kirill
Kshitij Chakravarty
Larry Liu
Lazy Notre
Maayan
Maksim Voloshin
Marco Ilardi
Marcus | Elagabalx
Mark Ellis
Mason Hall
mason money
Max Kaplan
moran666666
Michael Straka
Olrise
Pacobits | Stakely
Pavel Zykin
Perry Randall
Phil
Philip Vu
Polina Voloshina
Prasanna Gautam
Renee Tso
Rex Fernando
Richard Zhang
Robert Chen
Rustie Lin
Saanika
Sasha Spiegelman
Schultzie
Shachindra
Sherry Xiao
Silviu Gae
Slava
spichloner
Suryansh
Taras
Teng Zhang
Tim Ch
Victor Gao
Vineeth Kashyap
Vladislav Anikeev
William White
winlin
Xianyun Li
Ye Park
Young Yan Liauw
Yuun Lim
Zekun Li
Zekun Wang
Zhuolun Xiang