Read formal description here
Read RFC here
The main goal of RLN v2 circuits is to make it possible to have a custom amount of messages (signals) per epoch without using a separate circuit or high-degree polynomials for Shamir's Secret Sharing.
The Current RLN circuit uses a first-degree polynomial for shares generation (and slashing). Therefore, there is a limit - one message per epoch.
There have been attempts to make schemes in which the message limit per epoch is greater than one. For example, N-RLN scheme & N-RLN Circuits. But this approach is very problematic; the bigger the epoch limit, the higher the polynomial for Shamir's Secret Sharing, and the more complicated the circuit is(more R1CS, etc.).
We have generally advised using 1 message/signal per epoch and adjusting the epoch length to match the rate limit desired for your use case. However, this isn’t very flexible and constrains the epoch length for all users to be the same per semaphore group (merkle tree).
Before we move on, this is a quick refresher on the inputs/outputs of the RLN v1 circuits and their general purpose. If you want more detail on how RLN circuits work, please read this, which goes into more detail.
Inputs:
Public:
external_nullifier
=h(rln_identifier, epoch)
- This identifies a unique epoch per app, whererln_identifier
is some unique identifier for an app andepoch
is some unique identifier for an event or time;x
=h(message)
.
Private:
- Secret Key
h(trapdoor, nullifier)
- This is to prove you are in some merkle tree, and to make they_share
, andinternal_nullifier
unique to anid_commitment
.
Outputs:
Internal_Nullifier
- Used to identify a unique user during a specific epoch (external_nullifier)
Y_Share
- This is the Shamir's Secret Sharing share
graph TD
ext_null>External Nullifier] --> h1(hash)
secret{{Secret Trapdoor & nullifier}} --> h0(hash) --> a_0
a_0{{Secret hashed a_0}} --> h1
msg_id>Message_ID `k`] --> h1
msg_id --> limit_check(Message Limit Check)
msg_limit>Message Limit] --> limit_check
h1 --> a_1 --> h2(hash) --> int_null([Internal Nullifier])
a_1 --> times
m>Message] --> h3(hash) --> times(*) --> plus(+)
a_0 --> plus --> sss([Shamir's Share y_share])
a_0 --> h4(hash) --> id_com([id_commitment])
h4 --> merkle(MerkleProof)
Instead of using higher degree polynomials to generate coefficients for higher epoch limits, we can add an input to the hash function, which is a counter k
that ranges from 1 to n
, the epoch limit
(which can be id_commitment
specific, for example in a registry contract.
The scheme would work as follows:
- The user generates a secret
a_0
- The coefficient
a_1
is generated by taking the hash ofa_0
, an external nullifier, and the counterk
: h(a_0
,external_nullifier
,k
) - The
internal_nullifier
is then generated by taking the hash ofa_1
: h(a_1
)
By adding the counter k
as an input to the hash function, the scheme becomes more flexible but still simple. It ensures that the user cannot use a value of k
greater than n
, which is the epoch limit, and if the user uses the same value of k
twice, they will have two or more internal_nullifiers
that collide, which allow the y_shares
to be used determine their slashing credentials.
Overall, this proposal aims to provide more flexibility to the scheme while maintaining its simplicity.
The only additional inputs are:
- [private] Message ID (Counter)
k
- a unique id per message per epoch, somewhere between the range1 < k < n
- [public] Message Limit
n
- the max number of messages a user can send
There are also other cool features that come along with using this scheme:
- Internal nullifier value is different for different messages during the epoch (so it's more anonymous), even when having more than 1 signal per epoch
- It's more secure and resistant to algebraic attacks (which could arise in the N-RLN scheme linked above)
By using this scheme we created a circuit, that will allow us to use different rate-limits for different users, for example based on their stake.
We can do that by committing to not only our secret, but our secret and limit:
- Registry (map) is stored on a smart-contract, where keys are public keys (
id_commitment = Hash(identity_secret)
) of users and values are some metadata (for examplelimit
number or stake amount); - Merkle tree, where leaves are
rate_limit
's =Hash(id_commitment, userMessagelimit)
For example, the possible limit is 1000 (n
= 1000), and each message costs 0.001 ETH (so you will have 1000 messages limit if you stake 1 ETH).
So, when you join app you attach the amount of stake you want and also send the id_commitment
and rate_commitment = Hash(id_commitment, userMessageLimit)
will be calculated on-chain based on your stake.
Signaling will use other circuit, where your limit
is private input, and the counter k
is checked that it's in the range from 1 to userMessageLimit
.
This text is from @AtHeartEngineer post on zkResear.ch.