From 2cdc52238e50d99af7c09228cd234a50f2c534a9 Mon Sep 17 00:00:00 2001 From: benesjan Date: Wed, 28 Aug 2024 09:52:42 +0000 Subject: [PATCH] WIP --- cspell.json | 1 + .../aztec/concepts/storage/partial_notes.md | 45 ++++++++++++++++--- 2 files changed, 40 insertions(+), 6 deletions(-) diff --git a/cspell.json b/cspell.json index c84e2e3e1ff5..c6cbe0fd5238 100644 --- a/cspell.json +++ b/cspell.json @@ -117,6 +117,7 @@ "hasher", "headstart", "herskind", + "homomorphic", "ierc", "indexeddb", "initialise", diff --git a/docs/docs/aztec/concepts/storage/partial_notes.md b/docs/docs/aztec/concepts/storage/partial_notes.md index caf292c23e03..e15d271ebc99 100644 --- a/docs/docs/aztec/concepts/storage/partial_notes.md +++ b/docs/docs/aztec/concepts/storage/partial_notes.md @@ -4,8 +4,43 @@ description: Describes how partial notes are used in Aztec tags: [notes, storage] --- -Partial notes are a concept that allow users to commit to an encrypted value, and allow a counterparty to update that value without knowing the specific details of the encrypted value. To do this, we can leverage the homomorphic properties of the pedersen commitment. - +Partial notes are a concept that allow users to commit to an encrypted value, and allow a counterparty to update that value without knowing the specific details of the encrypted value. +To do this, we leverage the following properties of elliptic curve operations: + +1. `x_1 * G + x_2 * G` equals `(x_1 + x_2) * G` and +2. `f(x) = x * G` being a one-way function. + +Property 1 allows us to be continually adding to a point on elliptic curve and property 2 allows us to pass the point to a public realm without revealing anything about the point preimage. + +Before getting to partial notes let's recap what is the flow of standard notes. + +## Note lifecycle recap +The standard note flow is as follows: +1. Create a note in your contract, +2. compute the note hash/commitment, +3. emit the note hash, +4. emit the note (note hash preimage) as an encrypted note log, +5. sequencer picks up the transaction, includes it in a block (note hash gets included in a note hash tree) and submits the block on-chain, +6. nodes following the network pick up the new block, update its internal state and if they have accounts attached they try decrypting all the encrypted note logs, +7. if a node succeeds in decrypting a log it stores the note in its database, +8. later on when we want to spend a note, a contract obtains it via oracle and stores a note hash read request within the function context (note hash read request contains a newly computed note hash), +9. based on the note and a nullifier secret key a nullifier is computed and emitted, +10. protocol circuits check that the note is a valid note by checking that the note hash read request corresponds to a real note in the note hash tree and that the new nullifier does not yet exist in the nullifier tree, +11. if the conditions in point 10. are satisfied the nullifier is inserted into the nullifier tree and the note is at the end of its life. + +Now let's do the same for partial notes. + +## Partial notes life cycle +1. Create a partial/unfinished note in a private function of your contract --> partial here means that the values within the note are not yet considered finalized (e.g. `amount` in a `TokenNote`), +2. compute a note hiding point of the partial note using a multi scalar multiplication on an elliptic curve. For `TokenNote` this would be done as `G_amt * amount0 + G_npk * npk_m_hash + G_rnd * randomness + G_slot * slot`, +3. pass the note hiding point to a public function, +4. in a public function determine the value you want to add to the note (e.g. adding a value to an amount) and add it to the note hiding point (e.g. `NOTE_HIDING_POINT + G_amt * amount`), +5. get the note hash by finalizing the note hiding point (the note hash is the x coordinate of the point), +6. emit the note hash, +7. manually construct the note in your application and add it to your node (PXE) --> this currently has to be done manually and not automatically via encrypted note logs because we have not yet implemented partial notes delivery (tracked in [issue #8238](https://github.com/AztecProtocol/aztec-packages/issues/8238)) +8. from this point on the partial note is equal normal note and hence the rest of the life cycle is the same. + +## Use cases Why is this useful? Consider the case where a user wants to pay for a transaction fee, using a [fee-payment contract](../../../protocol-specs/gas-and-fees/index.md) and they want to do this privately. They can't be certain what the transaction fee will be because the state of the network will have progressed by the time the transaction is processed by the sequencer, and transaction fees are dynamic. So the user can commit to a value for the transaction fee, publicly post this commitment, the fee payer can update the public commitment, deducting the final cost of the transaction from the commitment and returning the unused value to the user. @@ -23,7 +58,7 @@ And the fee payer is: The idea of committing to a value and allowing a counterparty to update that value without knowing the specific details of the encrypted value is a powerful concept that can be used in many different applications. For example, this could be used for updating timestamp values in private, without revealing the exact timestamp, which could be useful for many defi applications. -## Private Fee Payment Example +### Private Fee Payment Example Alice wants to use a fee-payment contract for fee abstraction, and wants to use private balances. That is, she wants to pay the FPC (fee-payment contract) some amount in an arbitrary token privately (e.g. bananas), and have the FPC pay the `transaction_fee`. @@ -47,11 +82,9 @@ $$ P_a' := \text{funded amount}*G_{amount} + \text{alice address}*G_{address} + \text{rand}_a*G_{randomness} $$ -Where did that $\text{rand}_a$ come from? Well from Alice of course. So we can't trust it is random. So we hash it with Alice's address and emit it as a nullifier. - We also need to create a point for the owner of the FPC (whom we call Bob) to receive the transaction fee, which will also need randomness. -So we compute $\text{rand}_b := h(\text{rand}_a, \text{msg_sender})$, and emit that as a nullifier (to make sure it is unique) and as an unencrypted log (so Bob can recreate his refund note after the transaction). +So in the contract we compute $\text{rand}_b := h(\text{rand}_a, \text{msg_sender})$, and emit that as a nullifier (to make sure it is unique) and as an unencrypted log (so Bob can recreate his refund note after the transaction). $$ P_b' := \text{bob address}*G_{address} + \text{rand}_b*G_{randomness}