Skip to main content
Version: 2.0.0-beta-4

Circuits

A circuits enum is exported from the package.

enum Circuit {
epochKey,
proveReputation,
userStateTransition,
signup,
epochKeyLite,
preventDoubleAction
}

Use it like so:

import { Circuit } from '@unirep/circuits'

Signup Proof​

The signup proof outputs a state tree leaf and an identity commitment for the user. The state tree leaf will have zero values for all data fields.

Control field:

  • 48 bits epoch
  • 160 bits attester_id

Inputs:

  • attester_id
  • epoch
  • identity_nullifier
  • identity_trapdoor

Outputs:

  • identity_commitment
  • state_tree_leaf
  • control
info

Control fields are used to encode many small values into a single field element. This reduces the number of public signals needed to operate a circuit.

Epoch Key Proof​

The epoch key proof allows a user to prove control of an epoch key in a certain epoch. This proof calculates two things: merkle inclusion of a state leaf against the current state root, and an epoch key. A data value can be included and endorsed by this proof.

The nonce used to calculate the epoch key may optionally be revealed. This can be used to prevent users from executing an action multiple times using different epoch keys.

Control field:

  • 8 bits nonce
  • 48 bits epoch
  • 160 bits attester_id
  • 1 bit reveal_nonce

Inputs:

  • nonce
  • epoch
  • attester_id
  • reveal_nonce
  • data[FIELD_COUNT]
  • state_tree_indexes[STATE_TREE_DEPTH]
  • state_tree_elements[STATE_TREE_DEPTH]
  • identity_secret
  • sig_data (public)

Outputs:

  • epoch_key
  • state_tree_root
  • control
info

Control fields are used to encode many small values into a single field element. This reduces the number of public signals needed to operate a circuit.

Epoch Key Lite Proof​

The epoch key lite proof allows a user to prove control of an epoch key. Unlike the epoch key proof, this proof does not perform a state tree inclusion. A data value can be included and endorsed by this proof.

The nonce used to calculate the epoch key may optionally be revealed. This can be used to prevent users from executing an action multiple times using different epoch keys.

tip

Don't use this proof for keys in the current epoch. If a user has not inserted a leaf into the current state tree they may choose not to accept reputation.

Instead this proof is more useful for proving control of keys from past epochs.

Control field:

  • 8 bits nonce
  • 48 bits epoch
  • 160 bits attester_id
  • 1 bit reveal_nonce

Inputs:

  • nonce
  • epoch
  • attester_id
  • reveal_nonce
  • sig_data (public)
  • identity_secret

Outputs:

  • epoch_key
  • control
info

Control fields are used to encode many small values into a single field element. This reduces the number of public signals needed to operate a circuit.

Prove Reputation Proof​

The prove reputation proof allows a user to prove a reputation balance in the state tree. The user is not able to prove reputation received in the current epoch. The user can optionally prove some minimum amount of reputation, maximum amount of reputation, net zero reputation (e.g. posRep == negRep), and their graffiti.

In this proof, we assign data[0] = posRep, data[1] = negRep, data[SUM_FIELD_COUNT] = graffiti.

info

See data in UniRep protocol for more information.

danger

Please avoid assigning the min_rep = data[0] - data[1] or max_rep = data[1] - data[0].
The proof could allow a user to accidentally publish their overall reputation (i.e. data[0]-data[1]). Depending on the circumstances (such as the length of the attestation history) this could reveal a user’s epoch key(s) as well.

The nonce used to calculate the epoch key may optionally be revealed. This can be used to prevent users from executing an action multiple times using different epoch keys.

Control field 0:

  • 8 bits nonce
  • 48 bits epoch
  • 160 bits attester_id
  • 1 bit reveal_nonce

Control field 1:

  • 64 bits min_rep
  • 64 bits max_rep
  • 1 bit prove_min_rep
  • 1 bit prove_max_rep
  • 1 bit prove_zero_rep
  • 1 bit prove_graffiti

Inputs:

  • identity_secret
  • graffiti (public)
  • state_tree_indexes[STATE_TREE_DEPTH]
  • state_tree_elements[STATE_TREE_DEPTH]
  • data[FIELD_COUNT]
  • nonce
  • epoch
  • attester_id
  • reveal_nonce
  • sig_data (public)

Outputs:

  • epoch_key
  • state_tree_root
  • control[2]
info

Control fields are used to encode many small values into a single field element. This reduces the number of public signals needed to operate a circuit.

User State Transition Proof​

The user state transition proof allows a user to prove how much reputation they have at the end of an epoch and output a new state tree leaf. The proof calculates an inclusion proof for the state tree, and for each epoch key nonce an inclusion proof for the epoch tree. If the epoch key does not exist in the epoch tree it is instead output as a public signal. If the epoch key does exist in the tree a random value will be output instead. The verifier must check that the output epoch keys are not included in the epoch tree.

Once it has proved inclusion it sums the reputation values stored in the leaves. Then it takes the replacement values with the highest timestamps and outputs a new state tree leaf for the next epoch.

Inputs:

  • identity_secret
  • from_epoch
  • to_epoch (public)
  • attester_id (public)
  • epoch_tree_root
  • state_tree_indexes[STATE_TREE_DEPTH]
  • state_tree_elements[STATE_TREE_DEPTH]
  • data[FIELD_COUNT]
  • new_data[EPOCH_KEY_NONCE_PER_EPOCH][FIELD_COUNT]
  • epoch_tree_elements[EPOCH_KEY_NONCE_PER_EPOCH][EPOCH_TREE_DEPTH]
  • epoch_tree_indices[EPOCH_KEY_NONCE_PER_EPOCH][EPOCH_TREE_DEPTH]
  • history_tree_indices[HISTORY_TREE_DEPTH]
  • history_tree_elements[HISTORY_TREE_DEPTH]

Outputs:

  • history_tree_root
  • state_tree_leaf
  • epks[EPOCH_KEY_NONCE_PER_EPOCH]