#poseidon-hash #zero-knowledge-proofs #zero-knowledge #scalar-field #cryptography #crypto

no-std dusk-poseidon

Implementation of Poseidon hash algorithm over the Bls12-381 Scalar field

39 releases (21 breaking)

0.39.0 May 8, 2024
0.37.0 Mar 27, 2024
0.32.0 Dec 13, 2023
0.31.0 Oct 11, 2023
0.20.0-pre.1 Mar 31, 2021

#129 in Algorithms

Download history 85/week @ 2024-01-26 167/week @ 2024-02-02 226/week @ 2024-02-09 486/week @ 2024-02-16 498/week @ 2024-02-23 152/week @ 2024-03-01 197/week @ 2024-03-08 91/week @ 2024-03-15 255/week @ 2024-03-22 160/week @ 2024-03-29 60/week @ 2024-04-05 42/week @ 2024-04-12 138/week @ 2024-04-19 90/week @ 2024-04-26 158/week @ 2024-05-03 42/week @ 2024-05-10

434 downloads per month
Used in 13 crates (11 directly)

MPL-2.0 license

70KB
843 lines

Build Status Repository Documentation

Dusk-Poseidon

Reference implementation for the Poseidon Hashing algorithm.

Reference: Starkad and Poseidon: New Hash Functions for Zero Knowledge Proof Systems

This repository has been created so there's a unique library that holds the tools & functions required to perform Poseidon Hashes on field elements of the bls12-381 elliptic curve.

The hash uses the Hades design for its inner permutation and the SAFE framework for contstructing the sponge.

The library provides the two hashing techniques of Poseidon:

  • The 'normal' hashing functionalities operating on BlsScalar.
  • The 'gadget' hashing functionalities that build a circuit which outputs the hash.

Example

use rand::rngs::StdRng;
use rand::SeedableRng;

use dusk_poseidon::{Domain, Hash};
use dusk_bls12_381::BlsScalar;
use ff::Field;

// generate random input
let mut rng = StdRng::seed_from_u64(0xbeef);
let mut input = [BlsScalar::zero(); 42];
for scalar in input.iter_mut() {
    *scalar = BlsScalar::random(&mut rng);
}

// digest the input all at once
let hash = Hash::digest(Domain::Other, &input);

// update the input gradually
let mut hasher = Hash::new(Domain::Other);
hasher.update(&input[..3]);
hasher.update(&input[3..]);
assert_eq!(hash, hasher.finalize());

// create a hash used for merkle tree hashing with arity = 4
let merkle_hash = Hash::digest(Domain::Merkle4, &input[..4]);

// which is different when another domain is used
assert_ne!(merkle_hash, Hash::digest(Domain::Other, &input[..4]));

Benchmarks

There are benchmarks for hashing, encrypting and decrypting in their native form, operating on Scalar, and for a zero-knowledge circuit proof generation and verification.

To run all benchmarks on your machine, run

cargo bench --features=zk,encryption

in the repository.

Licensing

This code is licensed under Mozilla Public License Version 2.0 (MPL-2.0). Please see LICENSE for further info.

About

Implementation designed by the dusk team.

Contributing

  • If you want to contribute to this repository/project please, check CONTRIBUTING.md
  • If you want to report a bug or request a new feature addition, please open an issue on this repository.

Dependencies

~4MB
~89K SLoC