You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This is being added in AztecProtocol/aztec-packages#6039 at which point we'll be able to replace the SchnorrVerify opcode with an implementation in Noir.
Note that this could end up being less efficient without #4928 but it would be good to demonstrate that it's possible.
The text was updated successfully, but these errors were encountered:
# Description
## Problem\*
Resolves#5054 and #4929
## Summary\*
Schnorr signature verification in Noir, using the MSM blackbox.
## Additional Context
The code is added to the schnorr test case, and it has also an assert
version.
This should be moved to the stdlib once we have numeric generics.
Meanwhile you need to pass a message with 32 additional bytes so we can
create an 'hash_input' array of the proper size.
## Documentation\*
Check one:
- [X] No documentation needed.
- [ ] Documentation included in this PR.
- [ ] **[For Experimental Features]** Documentation to be submitted in a
separate PR.
# PR Checklist\*
- [X] I have tested the changes locally.
- [X] I have formatted the changes with [Prettier](https://prettier.io/)
and/or `cargo fmt` on default settings.
Currently the only primitive we're missing to perform schnorr signature verification in Noir is variable base scalar multiplication.
https://github.com/AztecProtocol/aztec-packages/blob/82b17c8f0e9207db803fd3b824e63bac25ea69f6/barretenberg/cpp/src/barretenberg/stdlib/encryption/schnorr/schnorr.cpp#L41-L61
This is being added in AztecProtocol/aztec-packages#6039 at which point we'll be able to replace the
SchnorrVerify
opcode with an implementation in Noir.Note that this could end up being less efficient without #4928 but it would be good to demonstrate that it's possible.
The text was updated successfully, but these errors were encountered: