github.com/consensys/gnark-crypto@v0.14.0/ecc/bw6-633/kzg/kzg_test.go (about)

     1  // Copyright 2020 Consensys Software Inc.
     2  //
     3  // Licensed under the Apache License, Version 2.0 (the "License");
     4  // you may not use this file except in compliance with the License.
     5  // You may obtain a copy of the License at
     6  //
     7  //     http://www.apache.org/licenses/LICENSE-2.0
     8  //
     9  // Unless required by applicable law or agreed to in writing, software
    10  // distributed under the License is distributed on an "AS IS" BASIS,
    11  // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    12  // See the License for the specific language governing permissions and
    13  // limitations under the License.
    14  
    15  // Code generated by consensys/gnark-crypto DO NOT EDIT
    16  
    17  package kzg
    18  
    19  import (
    20  	"bytes"
    21  	"crypto/sha256"
    22  	"github.com/stretchr/testify/assert"
    23  	"github.com/stretchr/testify/require"
    24  	"math/big"
    25  	"testing"
    26  
    27  	"github.com/consensys/gnark-crypto/ecc"
    28  	"github.com/consensys/gnark-crypto/ecc/bw6-633"
    29  	"github.com/consensys/gnark-crypto/ecc/bw6-633/fr"
    30  	"github.com/consensys/gnark-crypto/ecc/bw6-633/fr/fft"
    31  
    32  	"github.com/consensys/gnark-crypto/utils/testutils"
    33  )
    34  
    35  // Test SRS re-used across tests of the KZG scheme
    36  var testSrs *SRS
    37  var bAlpha *big.Int
    38  
    39  func init() {
    40  	const srsSize = 230
    41  	bAlpha = new(big.Int).SetInt64(42) // randomise ?
    42  	testSrs, _ = NewSRS(ecc.NextPowerOfTwo(srsSize), bAlpha)
    43  }
    44  
    45  func TestToLagrangeG1(t *testing.T) {
    46  	assert := require.New(t)
    47  
    48  	const size = 32
    49  
    50  	// convert the test SRS to Lagrange form
    51  	lagrange, err := ToLagrangeG1(testSrs.Pk.G1[:size])
    52  	assert.NoError(err)
    53  
    54  	// generate the Lagrange SRS manually and compare
    55  	w, err := fr.Generator(uint64(size))
    56  	assert.NoError(err)
    57  
    58  	var li, n, d, one, acc, alpha fr.Element
    59  	alpha.SetBigInt(bAlpha)
    60  	li.SetUint64(uint64(size)).Inverse(&li)
    61  	one.SetOne()
    62  	n.Exp(alpha, big.NewInt(int64(size))).Sub(&n, &one)
    63  	d.Sub(&alpha, &one)
    64  	li.Mul(&li, &n).Div(&li, &d)
    65  	expectedSrsLagrange := make([]bw6633.G1Affine, size)
    66  	_, _, g1Gen, _ := bw6633.Generators()
    67  	var s big.Int
    68  	acc.SetOne()
    69  	for i := 0; i < size; i++ {
    70  		li.BigInt(&s)
    71  		expectedSrsLagrange[i].ScalarMultiplication(&g1Gen, &s)
    72  
    73  		li.Mul(&li, &w).Mul(&li, &d)
    74  		acc.Mul(&acc, &w)
    75  		d.Sub(&alpha, &acc)
    76  		li.Div(&li, &d)
    77  	}
    78  
    79  	for i := 0; i < size; i++ {
    80  		assert.True(expectedSrsLagrange[i].Equal(&lagrange[i]), "error lagrange conversion")
    81  	}
    82  }
    83  
    84  func TestCommitLagrange(t *testing.T) {
    85  
    86  	assert := require.New(t)
    87  
    88  	// sample a sparse polynomial (here in Lagrange form)
    89  	size := 64
    90  	pol := make([]fr.Element, size)
    91  	pol[0].SetRandom()
    92  	for i := 0; i < size; i = i + 8 {
    93  		pol[i].SetRandom()
    94  	}
    95  
    96  	// commitment using Lagrange SRS
    97  	lagrange, err := ToLagrangeG1(testSrs.Pk.G1[:size])
    98  	assert.NoError(err)
    99  	var pkLagrange ProvingKey
   100  	pkLagrange.G1 = lagrange
   101  
   102  	digestLagrange, err := Commit(pol, pkLagrange)
   103  	assert.NoError(err)
   104  
   105  	// commitment using canonical SRS
   106  	d := fft.NewDomain(uint64(size))
   107  	d.FFTInverse(pol, fft.DIF)
   108  	fft.BitReverse(pol)
   109  	digestCanonical, err := Commit(pol, testSrs.Pk)
   110  	assert.NoError(err)
   111  
   112  	// compare the results
   113  	assert.True(digestCanonical.Equal(&digestLagrange), "error CommitLagrange")
   114  }
   115  
   116  func TestDividePolyByXminusA(t *testing.T) {
   117  
   118  	const pSize = 230
   119  
   120  	// build random polynomial
   121  	pol := make([]fr.Element, pSize)
   122  	pol[0].SetRandom()
   123  	for i := 1; i < pSize; i++ {
   124  		pol[i] = pol[i-1]
   125  	}
   126  
   127  	// evaluate the polynomial at a random point
   128  	var point fr.Element
   129  	point.SetRandom()
   130  	evaluation := eval(pol, point)
   131  
   132  	// probabilistic test (using Schwartz Zippel lemma, evaluation at one point is enough)
   133  	var randPoint, xminusa fr.Element
   134  	randPoint.SetRandom()
   135  	polRandpoint := eval(pol, randPoint)
   136  	polRandpoint.Sub(&polRandpoint, &evaluation) // f(rand)-f(point)
   137  
   138  	// compute f-f(a)/x-a
   139  	// h re-uses the memory of pol
   140  	h := dividePolyByXminusA(pol, evaluation, point)
   141  
   142  	if len(h) != 229 {
   143  		t.Fatal("inconsistent size of quotient")
   144  	}
   145  
   146  	hRandPoint := eval(h, randPoint)
   147  	xminusa.Sub(&randPoint, &point) // rand-point
   148  
   149  	// f(rand)-f(point)	==? h(rand)*(rand-point)
   150  	hRandPoint.Mul(&hRandPoint, &xminusa)
   151  
   152  	if !hRandPoint.Equal(&polRandpoint) {
   153  		t.Fatal("Error f-f(a)/x-a")
   154  	}
   155  }
   156  
   157  func TestSerializationSRS(t *testing.T) {
   158  	// create a SRS
   159  	srs, err := NewSRS(64, new(big.Int).SetInt64(42))
   160  	assert.NoError(t, err)
   161  	t.Run("proving key round-trip", testutils.SerializationRoundTrip(&srs.Pk))
   162  	t.Run("proving key raw round-trip", testutils.SerializationRoundTripRaw(&srs.Pk))
   163  	t.Run("verifying key round-trip", testutils.SerializationRoundTrip(&srs.Vk))
   164  	t.Run("whole SRS round-trip", testutils.SerializationRoundTrip(srs))
   165  	t.Run("unsafe whole SRS round-trip", testutils.UnsafeBinaryMarshalerRoundTrip(srs))
   166  }
   167  
   168  func TestCommit(t *testing.T) {
   169  
   170  	// create a polynomial
   171  	f := make([]fr.Element, 60)
   172  	for i := 0; i < 60; i++ {
   173  		f[i].SetRandom()
   174  	}
   175  
   176  	// commit using the method from KZG
   177  	_kzgCommit, err := Commit(f, testSrs.Pk)
   178  	if err != nil {
   179  		t.Fatal(err)
   180  	}
   181  	var kzgCommit bw6633.G1Affine
   182  	kzgCommit.Unmarshal(_kzgCommit.Marshal())
   183  
   184  	// check commitment using manual commit
   185  	var x fr.Element
   186  	x.SetString("42")
   187  	fx := eval(f, x)
   188  	var fxbi big.Int
   189  	fx.BigInt(&fxbi)
   190  	var manualCommit bw6633.G1Affine
   191  	manualCommit.Set(&testSrs.Vk.G1)
   192  	manualCommit.ScalarMultiplication(&manualCommit, &fxbi)
   193  
   194  	// compare both results
   195  	if !kzgCommit.Equal(&manualCommit) {
   196  		t.Fatal("error KZG commitment")
   197  	}
   198  
   199  }
   200  
   201  func TestVerifySinglePoint(t *testing.T) {
   202  
   203  	// create a polynomial
   204  	f := randomPolynomial(60)
   205  
   206  	// commit the polynomial
   207  	digest, err := Commit(f, testSrs.Pk)
   208  	if err != nil {
   209  		t.Fatal(err)
   210  	}
   211  
   212  	// compute opening proof at a random point
   213  	var point fr.Element
   214  	point.SetString("4321")
   215  	proof, err := Open(f, point, testSrs.Pk)
   216  	if err != nil {
   217  		t.Fatal(err)
   218  	}
   219  
   220  	// verify the claimed valued
   221  	expected := eval(f, point)
   222  	if !proof.ClaimedValue.Equal(&expected) {
   223  		t.Fatal("inconsistent claimed value")
   224  	}
   225  
   226  	// verify correct proof
   227  	err = Verify(&digest, &proof, point, testSrs.Vk)
   228  	if err != nil {
   229  		t.Fatal(err)
   230  	}
   231  
   232  	{
   233  		// verify wrong proof
   234  		proof.ClaimedValue.Double(&proof.ClaimedValue)
   235  		err = Verify(&digest, &proof, point, testSrs.Vk)
   236  		if err == nil {
   237  			t.Fatal("verifying wrong proof should have failed")
   238  		}
   239  	}
   240  	{
   241  		// verify wrong proof with quotient set to zero
   242  		// see https://cryptosubtlety.medium.com/00-8d4adcf4d255
   243  		proof.H.X.SetZero()
   244  		proof.H.Y.SetZero()
   245  		err = Verify(&digest, &proof, point, testSrs.Vk)
   246  		if err == nil {
   247  			t.Fatal("verifying wrong proof should have failed")
   248  		}
   249  	}
   250  }
   251  
   252  func TestVerifySinglePointQuickSRS(t *testing.T) {
   253  
   254  	size := 64
   255  	srs, err := NewSRS(64, big.NewInt(-1))
   256  	if err != nil {
   257  		t.Fatal(err)
   258  	}
   259  
   260  	// random polynomial
   261  	p := make([]fr.Element, size)
   262  	for i := 0; i < size; i++ {
   263  		p[i].SetRandom()
   264  	}
   265  
   266  	// random value
   267  	var x fr.Element
   268  	x.SetRandom()
   269  
   270  	// verify valid proof
   271  	d, err := Commit(p, srs.Pk)
   272  	if err != nil {
   273  		t.Fatal(err)
   274  	}
   275  	proof, err := Open(p, x, srs.Pk)
   276  	if err != nil {
   277  		t.Fatal(err)
   278  	}
   279  	err = Verify(&d, &proof, x, srs.Vk)
   280  	if err != nil {
   281  		t.Fatal(err)
   282  	}
   283  
   284  	// verify wrong proof
   285  	proof.ClaimedValue.SetRandom()
   286  	err = Verify(&d, &proof, x, srs.Vk)
   287  	if err == nil {
   288  		t.Fatal(err)
   289  	}
   290  
   291  }
   292  
   293  func TestBatchVerifySinglePoint(t *testing.T) {
   294  
   295  	size := 40
   296  
   297  	// create polynomials
   298  	f := make([][]fr.Element, 10)
   299  	for i := range f {
   300  		f[i] = randomPolynomial(size)
   301  	}
   302  
   303  	// commit the polynomials
   304  	digests := make([]Digest, len(f))
   305  	for i := range f {
   306  		digests[i], _ = Commit(f[i], testSrs.Pk)
   307  
   308  	}
   309  
   310  	// pick a hash function
   311  	hf := sha256.New()
   312  
   313  	// compute opening proof at a random point
   314  	var point fr.Element
   315  	point.SetString("4321")
   316  	proof, err := BatchOpenSinglePoint(f, digests, point, hf, testSrs.Pk)
   317  	if err != nil {
   318  		t.Fatal(err)
   319  	}
   320  
   321  	var salt fr.Element
   322  	salt.SetRandom()
   323  	proofExtendedTranscript, err := BatchOpenSinglePoint(f, digests, point, hf, testSrs.Pk, salt.Marshal())
   324  	if err != nil {
   325  		t.Fatal(err)
   326  	}
   327  
   328  	// verify the claimed values
   329  	for i := range f {
   330  		expectedClaim := eval(f[i], point)
   331  		if !expectedClaim.Equal(&proof.ClaimedValues[i]) {
   332  			t.Fatal("inconsistent claimed values")
   333  		}
   334  	}
   335  
   336  	// verify correct proof
   337  	err = BatchVerifySinglePoint(digests, &proof, point, hf, testSrs.Vk)
   338  	if err != nil {
   339  		t.Fatal(err)
   340  	}
   341  
   342  	// verify correct proof with extended transcript
   343  	err = BatchVerifySinglePoint(digests, &proofExtendedTranscript, point, hf, testSrs.Vk, salt.Marshal())
   344  	if err != nil {
   345  		t.Fatal(err)
   346  	}
   347  
   348  	{
   349  		// verify wrong proof
   350  		proof.ClaimedValues[0].Double(&proof.ClaimedValues[0])
   351  		err = BatchVerifySinglePoint(digests, &proof, point, hf, testSrs.Vk)
   352  		if err == nil {
   353  			t.Fatal("verifying wrong proof should have failed")
   354  		}
   355  	}
   356  	{
   357  		// verify wrong proof with quotient set to zero
   358  		// see https://cryptosubtlety.medium.com/00-8d4adcf4d255
   359  		proof.H.X.SetZero()
   360  		proof.H.Y.SetZero()
   361  		err = BatchVerifySinglePoint(digests, &proof, point, hf, testSrs.Vk)
   362  		if err == nil {
   363  			t.Fatal("verifying wrong proof should have failed")
   364  		}
   365  	}
   366  }
   367  
   368  func TestBatchVerifyMultiPoints(t *testing.T) {
   369  
   370  	// create polynomials
   371  	f := make([][]fr.Element, 10)
   372  	for i := 0; i < 10; i++ {
   373  		f[i] = randomPolynomial(40)
   374  	}
   375  
   376  	// commit the polynomials
   377  	digests := make([]Digest, 10)
   378  	for i := 0; i < 10; i++ {
   379  		digests[i], _ = Commit(f[i], testSrs.Pk)
   380  	}
   381  
   382  	// pick a hash function
   383  	hf := sha256.New()
   384  
   385  	// compute 2 batch opening proofs at 2 random points
   386  	points := make([]fr.Element, 2)
   387  	batchProofs := make([]BatchOpeningProof, 2)
   388  	points[0].SetRandom()
   389  	batchProofs[0], _ = BatchOpenSinglePoint(f[:5], digests[:5], points[0], hf, testSrs.Pk)
   390  	points[1].SetRandom()
   391  	batchProofs[1], _ = BatchOpenSinglePoint(f[5:], digests[5:], points[1], hf, testSrs.Pk)
   392  
   393  	// fold the 2 batch opening proofs
   394  	proofs := make([]OpeningProof, 2)
   395  	foldedDigests := make([]Digest, 2)
   396  	proofs[0], foldedDigests[0], _ = FoldProof(digests[:5], &batchProofs[0], points[0], hf)
   397  	proofs[1], foldedDigests[1], _ = FoldProof(digests[5:], &batchProofs[1], points[1], hf)
   398  
   399  	// check that the individual batch proofs are correct
   400  	err := Verify(&foldedDigests[0], &proofs[0], points[0], testSrs.Vk)
   401  	if err != nil {
   402  		t.Fatal(err)
   403  	}
   404  	err = Verify(&foldedDigests[1], &proofs[1], points[1], testSrs.Vk)
   405  	if err != nil {
   406  		t.Fatal(err)
   407  	}
   408  
   409  	// batch verify correct folded proofs
   410  	err = BatchVerifyMultiPoints(foldedDigests, proofs, points, testSrs.Vk)
   411  	if err != nil {
   412  		t.Fatal(err)
   413  	}
   414  
   415  	{
   416  		// batch verify tampered folded proofs
   417  		proofs[0].ClaimedValue.Double(&proofs[0].ClaimedValue)
   418  
   419  		err = BatchVerifyMultiPoints(foldedDigests, proofs, points, testSrs.Vk)
   420  		if err == nil {
   421  			t.Fatal(err)
   422  		}
   423  	}
   424  	{
   425  		// batch verify tampered folded proofs with quotients set to infinity
   426  		// see https://cryptosubtlety.medium.com/00-8d4adcf4d255
   427  		proofs[0].H.X.SetZero()
   428  		proofs[0].H.Y.SetZero()
   429  		proofs[1].H.X.SetZero()
   430  		proofs[1].H.Y.SetZero()
   431  		err = BatchVerifyMultiPoints(foldedDigests, proofs, points, testSrs.Vk)
   432  		if err == nil {
   433  			t.Fatal(err)
   434  		}
   435  	}
   436  }
   437  
   438  func TestUnsafeToBytesTruncating(t *testing.T) {
   439  	assert := require.New(t)
   440  	srs, err := NewSRS(ecc.NextPowerOfTwo(1<<10), big.NewInt(-1))
   441  	assert.NoError(err)
   442  
   443  	// marshal the SRS, but explicitly with less points.
   444  	var buf bytes.Buffer
   445  	err = srs.WriteDump(&buf, 1<<9)
   446  	assert.NoError(err)
   447  
   448  	r := bytes.NewReader(buf.Bytes())
   449  
   450  	// unmarshal the SRS
   451  	var newSRS SRS
   452  	err = newSRS.ReadDump(r)
   453  	assert.NoError(err)
   454  
   455  	// check that the SRS proving key has only 1 << 9 points
   456  	assert.Equal(1<<9, len(newSRS.Pk.G1))
   457  
   458  	// ensure they are equal to the original SRS
   459  	assert.Equal(srs.Pk.G1[:1<<9], newSRS.Pk.G1)
   460  
   461  	// read even less points.
   462  	var newSRSPartial SRS
   463  	r = bytes.NewReader(buf.Bytes())
   464  	err = newSRSPartial.ReadDump(r, 1<<8)
   465  	assert.NoError(err)
   466  
   467  	// check that the SRS proving key has only 1 << 8 points
   468  	assert.Equal(1<<8, len(newSRSPartial.Pk.G1))
   469  
   470  	// ensure they are equal to the original SRS
   471  	assert.Equal(srs.Pk.G1[:1<<8], newSRSPartial.Pk.G1)
   472  }
   473  
   474  const benchSize = 1 << 16
   475  
   476  func BenchmarkSRSGen(b *testing.B) {
   477  
   478  	b.Run("real SRS", func(b *testing.B) {
   479  		b.ResetTimer()
   480  		for i := 0; i < b.N; i++ {
   481  			NewSRS(ecc.NextPowerOfTwo(benchSize), new(big.Int).SetInt64(42))
   482  		}
   483  	})
   484  	b.Run("quick SRS", func(b *testing.B) {
   485  		b.ResetTimer()
   486  		for i := 0; i < b.N; i++ {
   487  			NewSRS(ecc.NextPowerOfTwo(benchSize), big.NewInt(-1))
   488  		}
   489  	})
   490  }
   491  
   492  func BenchmarkKZGCommit(b *testing.B) {
   493  
   494  	b.Run("real SRS", func(b *testing.B) {
   495  		srs, err := NewSRS(ecc.NextPowerOfTwo(benchSize), new(big.Int).SetInt64(42))
   496  		assert.NoError(b, err)
   497  		// random polynomial
   498  		p := randomPolynomial(benchSize / 2)
   499  
   500  		b.ResetTimer()
   501  		for i := 0; i < b.N; i++ {
   502  			_, _ = Commit(p, srs.Pk)
   503  		}
   504  	})
   505  	b.Run("quick SRS", func(b *testing.B) {
   506  		srs, err := NewSRS(ecc.NextPowerOfTwo(benchSize), big.NewInt(-1))
   507  		assert.NoError(b, err)
   508  		// random polynomial
   509  		p := randomPolynomial(benchSize / 2)
   510  
   511  		b.ResetTimer()
   512  		for i := 0; i < b.N; i++ {
   513  			_, _ = Commit(p, srs.Pk)
   514  		}
   515  	})
   516  }
   517  
   518  func BenchmarkDivideByXMinusA(b *testing.B) {
   519  	const pSize = 1 << 22
   520  
   521  	// build random polynomial
   522  	pol := make([]fr.Element, pSize)
   523  	pol[0].SetRandom()
   524  	for i := 1; i < pSize; i++ {
   525  		pol[i] = pol[i-1]
   526  	}
   527  	var a, fa fr.Element
   528  	a.SetRandom()
   529  	fa.SetRandom()
   530  
   531  	b.ResetTimer()
   532  	for i := 0; i < b.N; i++ {
   533  		dividePolyByXminusA(pol, fa, a)
   534  		pol = pol[:pSize]
   535  		pol[pSize-1] = pol[0]
   536  	}
   537  }
   538  
   539  func BenchmarkKZGOpen(b *testing.B) {
   540  	srs, err := NewSRS(ecc.NextPowerOfTwo(benchSize), new(big.Int).SetInt64(42))
   541  	assert.NoError(b, err)
   542  
   543  	// random polynomial
   544  	p := randomPolynomial(benchSize / 2)
   545  	var r fr.Element
   546  	r.SetRandom()
   547  
   548  	b.ResetTimer()
   549  	for i := 0; i < b.N; i++ {
   550  		_, _ = Open(p, r, srs.Pk)
   551  	}
   552  }
   553  
   554  func BenchmarkKZGVerify(b *testing.B) {
   555  	srs, err := NewSRS(ecc.NextPowerOfTwo(benchSize), new(big.Int).SetInt64(42))
   556  	assert.NoError(b, err)
   557  
   558  	// random polynomial
   559  	p := randomPolynomial(benchSize / 2)
   560  	var r fr.Element
   561  	r.SetRandom()
   562  
   563  	// commit
   564  	comm, err := Commit(p, srs.Pk)
   565  	assert.NoError(b, err)
   566  
   567  	// open
   568  	openingProof, err := Open(p, r, srs.Pk)
   569  	assert.NoError(b, err)
   570  
   571  	b.ResetTimer()
   572  	for i := 0; i < b.N; i++ {
   573  		Verify(&comm, &openingProof, r, srs.Vk)
   574  	}
   575  }
   576  
   577  func BenchmarkKZGBatchOpen10(b *testing.B) {
   578  	srs, err := NewSRS(ecc.NextPowerOfTwo(benchSize), new(big.Int).SetInt64(42))
   579  	assert.NoError(b, err)
   580  
   581  	// 10 random polynomials
   582  	var ps [10][]fr.Element
   583  	for i := 0; i < 10; i++ {
   584  		ps[i] = randomPolynomial(benchSize / 2)
   585  	}
   586  
   587  	// commitments
   588  	var commitments [10]Digest
   589  	for i := 0; i < 10; i++ {
   590  		commitments[i], _ = Commit(ps[i], srs.Pk)
   591  	}
   592  
   593  	// pick a hash function
   594  	hf := sha256.New()
   595  
   596  	var r fr.Element
   597  	r.SetRandom()
   598  
   599  	b.ResetTimer()
   600  	for i := 0; i < b.N; i++ {
   601  		BatchOpenSinglePoint(ps[:], commitments[:], r, hf, srs.Pk)
   602  	}
   603  }
   604  
   605  func BenchmarkKZGBatchVerify10(b *testing.B) {
   606  	srs, err := NewSRS(ecc.NextPowerOfTwo(benchSize), new(big.Int).SetInt64(42))
   607  	if err != nil {
   608  		b.Fatal(err)
   609  	}
   610  
   611  	// 10 random polynomials
   612  	var ps [10][]fr.Element
   613  	for i := 0; i < 10; i++ {
   614  		ps[i] = randomPolynomial(benchSize / 2)
   615  	}
   616  
   617  	// commitments
   618  	var commitments [10]Digest
   619  	for i := 0; i < 10; i++ {
   620  		commitments[i], _ = Commit(ps[i], srs.Pk)
   621  	}
   622  
   623  	// pick a hash function
   624  	hf := sha256.New()
   625  
   626  	var r fr.Element
   627  	r.SetRandom()
   628  
   629  	proof, err := BatchOpenSinglePoint(ps[:], commitments[:], r, hf, srs.Pk)
   630  	if err != nil {
   631  		b.Fatal(err)
   632  	}
   633  
   634  	b.ResetTimer()
   635  	for i := 0; i < b.N; i++ {
   636  		BatchVerifySinglePoint(commitments[:], &proof, r, hf, testSrs.Vk)
   637  	}
   638  }
   639  
   640  func randomPolynomial(size int) []fr.Element {
   641  	f := make([]fr.Element, size)
   642  	for i := 0; i < size; i++ {
   643  		f[i].SetRandom()
   644  	}
   645  	return f
   646  }
   647  
   648  func BenchmarkToLagrangeG1(b *testing.B) {
   649  	const size = 1 << 14
   650  
   651  	var samplePoints [size]bw6633.G1Affine
   652  	fillBenchBasesG1(samplePoints[:])
   653  	b.ResetTimer()
   654  
   655  	for i := 0; i < b.N; i++ {
   656  		if _, err := ToLagrangeG1(samplePoints[:]); err != nil {
   657  			b.Fatal(err)
   658  		}
   659  	}
   660  }
   661  
   662  func BenchmarkSerializeSRS(b *testing.B) {
   663  	// let's create a quick SRS
   664  	srs, err := NewSRS(ecc.NextPowerOfTwo(1<<24), big.NewInt(-1))
   665  	if err != nil {
   666  		b.Fatal(err)
   667  	}
   668  
   669  	// now we can benchmark the WriteTo, WriteRawTo and WriteDump methods
   670  	b.Run("WriteTo", func(b *testing.B) {
   671  		b.ResetTimer()
   672  		var buf bytes.Buffer
   673  		for i := 0; i < b.N; i++ {
   674  			buf.Reset()
   675  			_, err := srs.WriteTo(&buf)
   676  			if err != nil {
   677  				b.Fatal(err)
   678  			}
   679  		}
   680  	})
   681  
   682  	b.Run("WriteRawTo", func(b *testing.B) {
   683  		b.ResetTimer()
   684  		var buf bytes.Buffer
   685  		for i := 0; i < b.N; i++ {
   686  			buf.Reset()
   687  			_, err := srs.WriteRawTo(&buf)
   688  			if err != nil {
   689  				b.Fatal(err)
   690  			}
   691  		}
   692  	})
   693  
   694  	b.Run("WriteDump", func(b *testing.B) {
   695  		b.ResetTimer()
   696  		var buf bytes.Buffer
   697  		for i := 0; i < b.N; i++ {
   698  			buf.Reset()
   699  			if err := srs.WriteDump(&buf); err != nil {
   700  				b.Fatal(err)
   701  			}
   702  		}
   703  	})
   704  
   705  }
   706  
   707  func BenchmarkDeserializeSRS(b *testing.B) {
   708  	// let's create a quick SRS
   709  	srs, err := NewSRS(ecc.NextPowerOfTwo(1<<24), big.NewInt(-1))
   710  	if err != nil {
   711  		b.Fatal(err)
   712  	}
   713  
   714  	b.Run("UnsafeReadFrom", func(b *testing.B) {
   715  		var buf bytes.Buffer
   716  		if _, err := srs.WriteRawTo(&buf); err != nil {
   717  			b.Fatal(err)
   718  		}
   719  		b.ResetTimer()
   720  		for i := 0; i < b.N; i++ {
   721  			var newSRS SRS
   722  			_, err := newSRS.UnsafeReadFrom(bytes.NewReader(buf.Bytes()))
   723  			if err != nil {
   724  				b.Fatal(err)
   725  			}
   726  		}
   727  	})
   728  
   729  	b.Run("ReadDump", func(b *testing.B) {
   730  		var buf bytes.Buffer
   731  		err := srs.WriteDump(&buf)
   732  		if err != nil {
   733  			b.Fatal(err)
   734  		}
   735  		data := buf.Bytes()
   736  		b.ResetTimer()
   737  		for i := 0; i < b.N; i++ {
   738  			var newSRS SRS
   739  			if err := newSRS.ReadDump(bytes.NewReader(data)); err != nil {
   740  				b.Fatal(err)
   741  			}
   742  		}
   743  	})
   744  }
   745  
   746  func fillBenchBasesG1(samplePoints []bw6633.G1Affine) {
   747  	var r big.Int
   748  	r.SetString("340444420969191673093399857471996460938405", 10)
   749  	samplePoints[0].ScalarMultiplication(&samplePoints[0], &r)
   750  
   751  	one := samplePoints[0].X
   752  	one.SetOne()
   753  
   754  	for i := 1; i < len(samplePoints); i++ {
   755  		samplePoints[i].X.Add(&samplePoints[i-1].X, &one)
   756  		samplePoints[i].Y.Sub(&samplePoints[i-1].Y, &one)
   757  	}
   758  }