Crates.io | dapol |
lib.rs | dapol |
version | 0.4.0 |
source | src |
created_at | 2023-11-16 09:39:10.142891 |
updated_at | 2024-07-06 09:12:59.341198 |
description | DAPOL+ Proof of Liabilities protocol |
homepage | |
repository | https://github.com/silversixpence-crypto/dapol |
max_upload_size | |
id | 1037467 |
size | 800,037 |
Licensed under MIT.
This repo is a Rust implementation of the DAPOL+ protocol, which was introduced in the "Generalized Proof of Liabilities" ACM CCS 2021 paper, by Yan Ji and Konstantinos Chalkias (available here).
DAPOL+ (Distributed Auditing Proof of Liabilities) is a protocol around a Merkle Sum Tree that allows an entity to cryptographically commit to it's liabilities in a way that maintains data privacy and verifiability. Some examples of where this protocol is useful:
This repo is part of a larger Proof of Reserves project. For more information on Proof of Liabilities you can check out this blog. And for more information on the Proof of Reserves project in general you can check out this top-level doc for the project.
If you would like to contact the owners to get advice on how to integrate this protocol into your system, then reach out here.
This repo is still a work in progress, but is ready for use as is. The code has not been audited yet (as of May 2024) and so it is not recommended to use it in production yet. Progress on the audit can be tracked here.
Important tasks still to be done:
There is both a Rust API and a CLI. Details for both can be found in the sections below.
The API has the following capabilities:
See the examples directory or docs for details on how to use the API.
Install with cargo:
cargo install dapol
You can invoke the CLI like so:
dapol help
The CLI offers 3 main operations: tree building, proof generation & proof verification. All options can be explored with:
dapol build-tree help
dapol gen-proofs help
dapol verify-proof help
Building a tree can be done:
Build a tree using config file (full log verbosity):
dapol -vvv build-tree config-file ./examples/dapol_config_example.toml
Add serialization:
dapol -vvv build-tree config-file ./examples/dapol_config_example.toml --serialize .
Deserialize a tree from a file:
dapol -vvv build-tree deserialize <file>
Generate proofs (proofs will live in the ./inclusion_proofs/
directory):
dapol -vvv build-tree config-file ./examples/dapol_config_example.toml --gen-proofs ./examples/entities_example.csv
Build a tree using cli args as apposed to a config file:
# this will generate 1000 random entities
dapol -vvv build-tree new --accumulator ndm-smt --height 16 --random-entities 1000 --secrets-file ./examples/dapol_secrets_example.toml
As seen above, the proof generation can be done via the tree build command, but it can also be done via its own command, which offers some more options around how the proofs are generated.
dapol -vvv gen-proofs --entity-ids ./examples/entities_example.csv --tree-file <serialized_tree_file>
echo "david.martin@example.com" | dapol -vvv gen-proofs --tree-file examples/my_serialized_tree_for_testing.dapoltree --entitiy-ids -
The proof generation command only offers 1 way to inject the tree (deserialization), as apposed to the tree build which offers different options.
dapol -vvv verify-proof --file-path <inclusion_proof_file> --root-hash <hash>
The root hash is logged out at info level when the tree is built or deserialized.
To get access to the CLI for a local copy of the repo you can do the following:
cargo build --release
./target/release/dapol help
To run the doc, unit & integration tests you can do
cargo test
Follow the steps in the Rust Fuzz Book to get started. Essentially:
# The cargo-fuzz / libfuzzer duo is used
cargo install cargo-fuzz
# Need nightly for cargo-fuzz
rustup default nightly
# Run the max_nodes_to_store block, and don't do more than 300k runs.
cargo fuzz run max_nodes_to_store -- -runs=300000
To run the benchmarks first clone the repo and then run:
# Run the benchmarks written in the Criterion framework.
cargo bench --bench criterion_benches
# Run the benchmarks written without a framework.
cargo bench --bench manual_benches
# available env vars (with their default values):
MIN_TOTAL_THREAD_COUNT=0
MIN_ENTITIES=0
MAX_ENTITIES=250000000
MIN_HEIGHT=2
MAX_HEIGHT=64
LOG_VERBOSITY=none # supports error, warn, info, debug
A set of tuples is used as input to the benches:
The benches are split into 2 parts: Criterion (for small benches) and manual (for large benches). Some of the values of $n$ cause the benchmarks to take really long (up to an hour), and so using Criterion (which takes a minimum of 10 samples per bench) makes things too slow. It is advised to run Criterion benches for $n<1000000$ and manual benches otherwise.
You may experience an error building the benches if you are on a fresh Linux machine. If the jemalloc-sys package fails to build then maybe this will help.