|
1 |
| -use k256::schnorr::{signature::Signer, SigningKey}; |
2 |
| -use rand_core::OsRng; // requires 'getrandom' feature |
| 1 | +fn print_time<F: FnOnce()>(name: &str, f: F) { |
| 2 | + let start_time = std::time::Instant::now(); |
| 3 | + f(); |
| 4 | + let elapsed_time = start_time.elapsed(); |
| 5 | + println!("{} Elapsed time: {:?}", name, elapsed_time); |
| 6 | +} |
3 | 7 |
|
4 | 8 | pub fn main() {
|
5 |
| - let message = b"Schnorr signatures prove knowledge of a secret in the random oracle model"; |
6 |
| - // |
7 |
| - // Signing |
8 |
| - // |
9 |
| - let signing_key = SigningKey::random(&mut OsRng); // serialize with `.to_bytes()` |
10 |
| - let verifying_key_bytes = signing_key.verifying_key().to_bytes(); // 32-bytes |
| 9 | + print_time("native fib(1000)", || { |
| 10 | + guest::execute_fib(1000); |
| 11 | + }); |
| 12 | + let (prove_fib, _verify_fib) = guest::build_fib(); |
| 13 | + print_time("zkVM fib(1000)", || { |
| 14 | + let (_output, _proof) = prove_fib(1000); |
| 15 | + }); |
| 16 | + |
| 17 | + { |
| 18 | + // Schnorr Signature |
| 19 | + use k256::schnorr::{signature::Signer, SigningKey}; |
| 20 | + use rand_core::OsRng; // requires 'getrandom' feature |
| 21 | + |
| 22 | + let message = b"Schnorr signatures prove knowledge of a secret in the random oracle model"; |
| 23 | + // Signing |
| 24 | + let signing_key = SigningKey::random(&mut OsRng); // serialize with `.to_bytes()` |
| 25 | + let verifying_key_bytes = signing_key.verifying_key().to_bytes(); // 32-bytes |
| 26 | + let signature = signing_key.sign(message); // returns `k256::schnorr::Signature` |
| 27 | + let signature_bytes = signature.to_bytes(); // 64-bytes |
| 28 | + print_time("native Schnorr verify", || { |
| 29 | + guest::execute_schnorr( |
| 30 | + message, |
| 31 | + verifying_key_bytes.as_slice(), |
| 32 | + signature_bytes.as_slice(), |
| 33 | + ); |
| 34 | + }); |
| 35 | + let (prove_schnorr, _verify_schnorr) = guest::build_schnorr(); |
| 36 | + print_time("zkVM Schnorr verify", || { |
| 37 | + let (_output, _proof) = prove_schnorr( |
| 38 | + message, |
| 39 | + verifying_key_bytes.as_slice(), |
| 40 | + signature_bytes.as_slice(), |
| 41 | + ); |
| 42 | + }); |
| 43 | + // let is_valid = verify_schnorr(proof); |
| 44 | + // println!("output: {}", output); |
| 45 | + // println!("valid: {}", is_valid); |
| 46 | + } |
| 47 | + /* |
| 48 | + { |
| 49 | + // RSA Signature |
| 50 | + use rsa::pkcs1v15::{SigningKey, VerifyingKey}; |
| 51 | + use rsa::pkcs1::EncodeRsaPublicKey; |
| 52 | + use rsa::sha2::{Digest, Sha256}; |
| 53 | + use rsa::signature::{Keypair, RandomizedSigner, SignatureEncoding, Verifier}; |
| 54 | + use rsa::RsaPrivateKey; |
11 | 55 |
|
12 |
| - let signature = signing_key.sign(message); // returns `k256::schnorr::Signature` |
13 |
| - let signature_bytes = signature.to_bytes(); // 64-bytes |
| 56 | + let mut rng = rand::thread_rng(); |
14 | 57 |
|
15 |
| - let (prove_schnorr, verify_schnorr) = guest::build_schnorr(); |
| 58 | + let bits = 2048; |
| 59 | + let private_key = RsaPrivateKey::new(&mut rng, bits).expect("failed to generate a key"); |
| 60 | + let signing_key = SigningKey::<Sha256>::new(private_key); |
| 61 | + let verifying_key = signing_key.verifying_key(); |
16 | 62 |
|
17 |
| - let (_output, proof) = prove_schnorr( |
18 |
| - message, |
19 |
| - verifying_key_bytes.as_slice(), |
20 |
| - signature_bytes.as_slice(), |
21 |
| - ); |
22 |
| - let is_valid = verify_schnorr(proof); |
| 63 | + // Sign |
| 64 | + let data = b"hello world"; |
| 65 | + let signature = signing_key.sign_with_rng(&mut rng, data); |
| 66 | + assert_ne!(signature.to_bytes().as_ref(), data.as_slice()); |
| 67 | + let signature_bytes = signature.to_bytes(); |
| 68 | + let verifying_key_bytes = verifying_key.to_pkcs1_der().unwrap(); |
23 | 69 |
|
24 |
| - // println!("output: {}", output); |
25 |
| - println!("valid: {}", is_valid); |
| 70 | + print_time("native RSA verify", || { |
| 71 | + guest::execute_rsa( |
| 72 | + data, |
| 73 | + verifying_key_bytes.as_bytes(), |
| 74 | + &signature_bytes.as_ref(), |
| 75 | + ); |
| 76 | + }); |
| 77 | + let (prove_rsa, _verify_rsa) = guest::build_rsa(); |
| 78 | + print_time("zkVM RSA verify", || { |
| 79 | + let (_output, _proof) = prove_rsa( |
| 80 | + data, |
| 81 | + verifying_key_bytes.as_bytes(), |
| 82 | + &signature_bytes.as_ref(), |
| 83 | + ); |
| 84 | + }); |
| 85 | + } |
| 86 | + */ |
26 | 87 | }
|
0 commit comments