summa-solvency
Last updated
Last updated
This section describes how to use summa-solvency
backend to perform a full Protocol Flow.
First of all, it is essential to determine two key parameters:
The number of currencies that will be handled simultaneously in a single Proof of Solvency - N_CURRENCIES
The number of users included in a proof of solvency - N_USERS
Take, for example, a scenario where a Custodian opts to include ten currencies and 64 users in one proof. This setup enables the commitment to cover 64 users. Furthermore, it allows users to simultaneously verify their inclusion proof for all ten currencies in one go, rather than having to verify ten separate proofs.
Therefore, before starting, Custodians need to thoughtfully determine the N_CURRENCIES
and N_USERS
values.
Zero-knowledge-proof systems require a Trusted Setup. Summa uses the Plonkish backend with the multilinear KZG polynomial commitment. The Summa
circuit requires a one-time, universal trusted setup, commonly known as a powers-of-tau ceremony.
However, there is no existing SRS file, which is a result of trusted setup, that has undergone a trusted setup ceremony for the Plonkish backend, especially for the HyperPlonk used in the backend of V3.
We provide SRS files that were generated for testing purposes only. These files were created temporarily and were not produced through a formal ceremony process.
To download the appropriate SRS file, the custodian needs to know the size of the SRS file, which is related to the K parameter. Identifying the correct K
value is essential for Summa's circuit. The minimum circuit size can be accurately determined based on the number of users by applying the following formula:
This formula ensures that the chosen K
value satisfies both the prerequisite condition N_USERS < 2^K - 2
and the minimum rows required for the range check circuit.
Pre-existing trusted setup files can be found at here - Prerequisites of Backend. To download a specific SRS file, use the following command:
This action downloads an SRS file for a circuit size of k=17
.
Once the setup is completed, the custodian can utilize summa-solvency backend to perform a full Proof of Solvency flow.
The Summa Solvency Flow Example illustrates the process for performing the necessary steps, as outlined below.
To generate the liabilities commitment and user inclusion proofs, the custodian has to prepare a CSV file, referred to as "entry.csv", which contains all usernames and their N_CURRENCIES
balances. The csv file format looks like this:
The first column header must be the username, and the rest of the columns should follow the pattern balance_[Currency]_[Chain]. Assuming the CSV file is named as entry.csv
, initialize Summa circuit as follows:
Initializing a round requires multiple parameters: zk_snark_proof
, advice_polys
, prover_arams
, verifier_params
, and timestamp
:
zk_snark_proof
: The proof generated from the Summa
circuit.
advice_polys
: The advice polynomials that were used as witness data to create the zk_snark_proof.
prover_params
: An instance of HyperPlonkProverParam
from the plonkish backend. It is used in generating the commitment proof, which corresponds to zk_snark_proof
.
verifier_params
: The verifying parameters for the zk_snark_proof
and inclusion proofs.
timestamp
: A UNIX timestamp marking the moment the liabilities snapshot (reflected in the "entry_16.csv" file) was taken.
Now, the custodian can retrieve the commitment and verifier params as files using the gen_commitment_and_vp
method:
At the end of this step, the custodian should ready to publish the commitment and the verifier params to user in public way.
Now, the custodian can generate inclusion proofs for their users using the round
, Initialized from the previous step.
The get_proof_of_inclusion
method requires a user_index
, which corresponds to the index of the user's data within the Entry CSV file ("entry.csv"), as established in the prior section.
The custodian can then provide these inclusion proofs to their users.
Generating proofs for all the users at once can present some scaling issues. Alternatively, the custodian can generate such proof only if the user queries it. Please refer to the benchmarks.
In V3 of Summa, users who have received an inclusion proof and commitment for a specific round can verify their proofs using a locally executable verifier provided by the custodian. This process differs from other Summa versions, as V3 does not utilize an on-chain verifier contract.
The executable verifier may include the verifying parameter necessary for verifying the inclusion proof. However, in the interest of transparency, we assume that the verifying parameter will be served separately, like a file. This means that the custodian must provide both the executable verifier and the verifying parameter either before or immediately after sending inclusion proofs to users.
The executable verifier would consist of three parts:
Reading Proofs and Verifying Parameters from files:
Getting evaluation from the inclusion proof:
Verifying the inclusion proof with the commitment and verifying parameters:
If the verifying process in the verifier completes without error, it will return a successful message.
For more detailed information on the verifying process, refer to the Summa Solvency Flow Example -3. Verifying Inclusion Proof
Now, users who receive an inclusion proof can verify their proof with this kind of executable verifier on their local machine.