-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use ECDSA/k256 for sov signatures #1798
base: nightly
Are you sure you want to change the base?
Conversation
crates/sovereign-sdk/module-system/sov-modules-stf-blueprint/src/stf_blueprint.rs
Outdated
Show resolved
Hide resolved
@@ -1,5 +1,6 @@ | |||
[public_keys] | |||
sequencer_public_key = "4682a70af1d3fae53a5a26b682e2e75f7a1de21ad5fc8d61794ca889880d39d1" | |||
# TODO: Add sequencer_k256_public_key |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
TODO
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
crates/sovereign-sdk/rollup-interface/src/state_machine/soft_confirmation.rs
Outdated
Show resolved
Hide resolved
crates/sovereign-sdk/rollup-interface/src/state_machine/soft_confirmation.rs
Outdated
Show resolved
Hide resolved
crates/sovereign-sdk/module-system/sov-modules-stf-blueprint/src/lib.rs
Outdated
Show resolved
Hide resolved
crates/sovereign-sdk/rollup-interface/src/state_machine/zk/batch_proof/output/v3.rs
Outdated
Show resolved
Hide resolved
crates/sovereign-sdk/module-system/module-implementations/sov-accounts/src/hooks.rs
Outdated
Show resolved
Hide resolved
SignedSoftConfirmation::new( | ||
signed_soft_confirmation.l2_height(), | ||
signed_soft_confirmation.hash(), | ||
signed_soft_confirmation.prev_hash(), | ||
signed_soft_confirmation.da_slot_height(), | ||
signed_soft_confirmation.da_slot_hash(), | ||
signed_soft_confirmation.da_slot_txs_commitment(), | ||
signed_soft_confirmation.l1_fee_rate(), | ||
signed_soft_confirmation.blobs().to_vec().into(), | ||
parsed_txs.into(), | ||
signed_soft_confirmation.deposit_data().to_vec(), | ||
signed_soft_confirmation.signature().to_vec(), | ||
signed_soft_confirmation.pub_key().to_vec(), | ||
signed_soft_confirmation.timestamp(), | ||
) | ||
}; |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
try to get rid of this
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not sure if possible
because I would need to do from SignedSoftConfirmation<PreForkTransaction> for SignedSoftConfirmation
I can not do this outside of the crate, I cannot do this in the crate because I do not have access to those concrete types
so pass I think
…y constants in guest
Description
Uses k256 after fork2 instead of dalek signatures
With this pr we will be getting rid of sha 512 after fork2 and we will be using k256 signatures.
Main reason to do this is ABOUT 10% our cycles are coming form Dalek signatures and sha512, and risc0 has k256 accelerator so our cycles will drop quite a bit.
Linked Issues
Benchmark
Some stats with 3055 txs in around 15 blocks:
Nightly:
this pr:
with 3055 txs in around 15 blocks we can see ~3.5% drop in cycle counts, this drop will be much more in real scenarios when txs are more spread to more blocks, instead 3000 txs being compressed to 15 blocks like in this case.