Skip to content

Cryptographic operations not via crypto backend #20

@han0110

Description

@han0110

While running some benchmark I found OpenVM's guest has much longer trace than other zkVMs, after digging I found there are some expensive cryptographic operations not covered by revm_precompile::interface::Crypto or alloy_consensus::crypto::CryptoProvider (OpenVM uses the crypto backend instead of crate patching):

  1. verify_and_compute_sender in reth-stateless - Which uses k256 or secp256k1 to do ECDSA verification
    This blowup the trace of normal block because every tx has the sig to be verified.
  2. Directly usage of sha256 (could be negligible)

For 1. we could probably bring back the crate patching as a short term solution, for 2. it seems there is no simple fix for now.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions