Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: do not persist FHE public key hash in state #125

Merged
merged 1 commit into from
Aug 12, 2024

Conversation

dartdart26
Copy link
Collaborator

Persisting the FHE public key hash in state brings more issues (i.e. during deployment) than benefits. Furthermore, we will be changing the FHE keys in the future and that will require a redesign anyway.

Persisting the FHE public key hash in state brings more issues (i.e.
during deployment) than benefits. Furthermore, we will be changing the
FHE keys in the future and that will require a redesign anyway.
@dartdart26 dartdart26 self-assigned this Aug 9, 2024
@dartdart26 dartdart26 requested a review from stongo August 9, 2024 09:23
@stongo
Copy link

stongo commented Aug 9, 2024

Can we reason through FHE key rotation, to make sure this is the right change?

Am I correct in my interpretation that this relates to an FHEVM smart contract's state?

Procedural Scenario

  1. FHEVM network is launched, with FHEPubKey-Alpha (generated by the KMS Core) and set as the FHEPubKey in the initial Smart Contract (SC)
  2. User Data is encrypted to Ciphertext based on FHEPubKey-Alpha
  3. Update Point FHEPubKey-Beta is generated by the KMS Core, and is now the preferred key
    4a. If the original SC updates the FHEPubKey to Beta, does the Ciphertext encrypted with Alpha become inoperable?
    4a.1 If yes to the above, should the proper procedure be to launch a new smart contract with the Beta key,.. IOW the FHEPubKey must remain immutable per contract
    4a.2 Also does there become a migration path for Ciphertext encrypted with Alpha to re-encrypt to Beta? Does the KMS Core need to retain both FHE Keys, so Alpha Ciphertext can be decrypted later?

@dartdart26
Copy link
Collaborator Author

You raise good questions. If we change the FHE key pair, ciphertexts under Alpha will have to be converted to ones under Beta. We discussed that we will be doing it on the fly, when we detect that input ciphertexts to an FHE operation are under different keys, i.e. we will do it lazily.

This PR only deals with not storing the hash of the public key in a global place in storage (not per smart contract). We did store the hash initially just to protect from accidental changes of the key on disk, nothing more to it. Idea was that there was a commitment to the key on-chain (though it isn't used by anyone right now). To make it simpler, we could just push the hash or the key itself anywhere publicly (even on-chain) and expect that clients check it. Doesn't have to be the node checking it (as it was before this PR).

@dartdart26
Copy link
Collaborator Author

What I meant is that this PR removes a "feature" that brought more complication than benefit in the current Go-based fhEVM. For key rotation in the future, we will implement it outside of this repo (most likely) and with proper design.

@dartdart26 dartdart26 merged commit 98d95ba into main Aug 12, 2024
2 checks passed
@dartdart26 dartdart26 deleted the petar/do-not-persist-pks-hash branch August 12, 2024 09:06
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants