This crate contains an implementation of Miden VM. It can be used to execute Miden VM programs and to verify correctness of program execution.
Miden VM is a simple stack machine. This means all values live on the stack and all operations work with values near the top of the stack.
Currently, Miden VM stack can be up to 32 items deep (this limit will be removed in the future). However, the more stack space a program uses, the longer it will take to execute, and the larger the execution proof will be. So, it pays to use stack space judiciously.
Values on the stack are elements of a prime field with modulus 340282366920938463463374557953744961537
(which can also be written as 2128 - 45 * 240 + 1). This means that all valid values are in the range between 0
and 340282366920938463463374557953744961536
- this covers almost all 128-bit integers.
All arithmetic operations (e.g., addition, multiplication) happen in the same prime field. This means that overflow happens after a value reaches field modulus. So, for example: 340282366920938463463374557953744961536 + 1 = 0
.
Besides being field elements, values in Miden VM are untyped. However, some operations expect binary values and will fail if you attempt to execute them using non-binary values. Binary values are values which are either 0
or 1
.
Programs in Miden VM are structured as an execution graph of program blocks each consisting of a sequence of VM instructions. There are two ways of constructing such a graph:
- You can manually build it from blocks of raw Miden VM instructions.
- You can compile Miden assembly source code into it.
The latter approach is strongly encouraged because building programs from raw Miden VM instructions is tedious, error-prone, and requires an in-depth understanding of VM internals. All examples throughout these docs use assembly syntax.
Currently, there are 3 ways to get values onto the stack:
- You can use
push
operations to push values onto the stack. These values become a part of the program itself, and, therefore, cannot be changed between program executions. You can think of them as constants. - You can initialize the stack with a set of public inputs as described here. Because these inputs are public, they must be shared with a verifier for them to verify program execution.
- You can provide unlimited number of secret inputs via input tapes
A
andB
. Similar to public inputs, these tapes are defined as a part of program inputs. To move secret inputs onto the stack, you'll need to useread
operations.
Values remaining on the stack after a program is executed can be returned as program outputs. You can specify exactly how many values (from the top of the stack) should be returned. Currently, the number of outputs is limited to 8. A way to return a large number of values (hundreds or thousands) is not yet available, but will be provided in the future.
Currently, Miden VM has no random access memory - all values live on the stack. However, a memory module will be added in the future to enable saving values to and reading values from RAM.
All Miden programs can be reduced to a single 32-byte value, called program hash. Once a Program
object is constructed (e.g. by compiling assembly code), you can access this hash via Program::hash()
method. This hash value is used by a verifier when they verify program execution. This ensure that the verifier verifies execution of a specific program (e.g. a program which the prover had committed to previously). The methodology for computing program hash is described here.
Miden crate exposes execute()
and verify()
functions which can be used to execute programs and verify their execution. Both are explained below, but you can also take a look at several working examples here.
To execute a program on Miden VM, you can use execute()
function. The function takes the following parameters:
program: &Program
- the program to be executed. A program can be constructed manually by building a program execution graph, or compiled from Miden assembly (see here).inputs: &ProgramInputs
- inputs for the program. These include public inputs used to initialize the stack, as well as secret inputs consumed during program execution (see here).num_outputs: usize
- number of items on the stack to be returned as program output. Currently, at most 8 outputs can be returned.options: &ProofOptions
- config parameters for proof generation. The default options target 96-bit security level.
If the program is executed successfully, the function returns a tuple with 2 elements:
outputs: Vec<u128>
- the outputs generated by the program. The number of elements in the vector will be equal to thenum_outputs
parameter.proof: StarkProof
- proof of program execution.StarkProof
can be easily serialized and deserialized usingto_bytes()
andfrom_bytes()
functions respectively.
To provide inputs for a program, you must create a ProgramInputs
object which can contain the following:
- A list of public inputs which will be used to initialize the stack. Currently, at most 8 public inputs can be provided.
- Two lists of secret inputs. These lists can be thought of as tapes
A
andB
. You can useread
operations to read values from these tapes and push them onto the stack.
Besides the ProgramInputs::new()
function, you can also use ProgramInputs::from_public()
and ProgramInputs:none()
convenience functions to construct the inputs object.
Here is a simple example of executing a program which pushes two numbers onto the stack and computes their sum:
use miden::{assembly, ProgramInputs, ProofOptions};
// this is our program, we compile it from assembly code
let program = assembly::compile("begin push.3 push.5 add end").unwrap();
// let's execute it
let (outputs, proof) = miden::execute(
&program,
&ProgramInputs::none(), // we won't provide any inputs
1, // we'll return one item from the stack
&ProofOptions::default(), // we'll be using default options
)
.unwrap();
// the output should be 8
assert_eq!(vec![8], outputs);
To verify program execution, you can use verify()
function. The function takes the following parameters:
program_hash: &[u8; 32]
- an array of 32 bytes representing a hash of the program to be verified.public_inputs: &[u128]
- a list of public inputs against which the program was executed.outputs: &[u128]
- a list of outputs generated by the program.proof: &StarkProof
- the proof generated during program execution.
The function returns Result<(), VerifierError>
which will be Ok(())
if verification passes, or Err(VerifierError)
if verification fails, with VerifierError
describing the reason for the failure.
Verifying execution proof of a program basically means the following:
If a program with the provided hash is executed against some secret inputs and the provided public inputs, it will produce the provided outputs.
Notice how the verifier needs to know only the hash of the program - not what the actual program was.
Here is a simple example of verifying execution of the program from the previous example:
use miden;
let program = /* value from previous example */;
let proof = /* value from previous example */;
// let's verify program execution
match miden::verify(*program.hash(), &[], &[8], proof) {
Ok(_) => println!("Execution verified!"),
Err(msg) => println!("Something went terribly wrong: {}", msg),
}
Let's write a simple program for Miden VM (using Miden assembly. Our program will compute the 5-th Fibonacci number:
push.0 // stack state: 0
push.1 // stack state: 1 0
swap // stack state: 0 1
dup.2 // stack state: 0 1 0 1
drop // stack state: 1 0 1
add // stack state: 1 1
swap // stack state: 1 1
dup.2 // stack state: 1 1 1 1
drop // stack state: 1 1 1
add // stack state: 2 1
swap // stack state: 1 2
dup.2 // stack state: 1 2 1 2
drop // stack state: 2 1 2
add // stack state: 3 2
Notice that except for the first 2 operations which initialize the stack, the sequence of swap dup.2 drop add
operations repeats over and over. In fact, we can repeat these operations an arbitrary number of times to compute an arbitrary Fibonacci number. In Rust, it would like like this (this is actually a simplified version of the example in fibonacci.rs):
use miden::{assembly, ProgramInputs, ProofOptions};
// set the number of terms to compute
let n = 50;
// build the program
let mut source = format!("
begin
repeat.{}
swap dup.2 drop add
end
end",
n - 1
);
let program = assembly::compile(&source).unwrap();
// initialize the stack with values 0 and 1
let inputs = ProgramInputs::from_public(&[1, 0]);
// execute the program
let (outputs, proof) = miden::execute(
&program,
&inputs,
1, // top stack item is the output
&ProofOptions::default(), // use default proof options
)
.unwrap();
// the output should be the 50th Fibonacci number
assert_eq!(vec![12586269025], outputs);
Above, we used public inputs to initialize the stack rather than using push
operations. This makes the program a bit simpler, and also allows us to run the program from arbitrary starting points without changing program hash.
This program is rather efficient: the stack never gets more than 4 items deep. For some benchmarks of executing this program on the VM see here.
Miden VM can be compiled with the following features:
std
- enabled by default and relies on the Rust standard library.concurrent
- impliesstd
and also enables multi-threaded proof generation.no_std
does not rely on the Rust standard library and enables compilation to WebAssembly.
To compile with no_std
, disable default features via --no-default-features
flag.
When compiled with concurrent
feature enabled, the VM will generate STARK proofs using multiple threads. The number of threads can be configured via RAYON_NUM_THREADS
environment variable, and usually defaults to the number of logical cores on the machine. For benefits of concurrent proof generation check out these benchmarks.
This project is MIT licensed.