Перейти к основному содержанию

# Merkle proofs for offline data integrity

storage
Ori Pomerantz
30 декабря 2021 г.
10 минута прочтения

Ideally we'd like to store everything in Ethereum storage, which is stored across thousands of computers and has extremely high availability (the data cannot be censored) and integrity (the data cannot be modified in an unauthorized manner), but storing a 32-byte word typically costs 20,000 gas. As I'm writing this, that cost is equivalent to \$6.60. At 21 cents per byte this is too expensive for many uses.

To solve this problem the Ethereum ecosystem developed many alternative ways to store data in a decentralized fashion. Usually they involve a tradeoff between availability and price. However, integrity is usually assured.

In this article you learn how to ensure data integrity without storing the data on the blockchain, using Merkle proofs(opens in a new tab).

## How does it work?

In theory we could just store the hash of the data on chain, and send all the data in transactions that require it. However, this is still too expensive. A byte of data to a transaction costs about 16 gas, currently about half a cent, or about \$5 per kilobyte. At \$5000 per megabyte, this is still too expensive for many uses, even without the added cost of hashing the data.

The solution is to repeatedly hash different subsets of the data, so for the data that you don't need to send you can just send a hash. You do this using a Merkle tree, a tree data structure where each node is a hash of the nodes below it:

The root hash is the only part that needs to be stored on chain. To prove a certain value, you provide all the hashes that need to be combined with it to obtain the root. For example, to prove `C` you provide `D`, `H(A-B)`, and `H(E-H)`.

## Implementation

### Off-chain code

In this article we use JavaScript for the off-chain computations. Most decentralized applications have their off-chain component in JavaScript.

#### Creating the Merkle root

First we need to provide the Merkle root to the chain.

```.css-xgv4ep{display:table-row;}.css-pfnbjh{display:table-cell;text-align:right;padding-right:2rem;-webkit-user-select:none;-moz-user-select:none;-ms-user-select:none;user-select:none;opacity:0.4;}1.css-plv82s{display:table-cell;}const ethers = require("ethers")2
.css-1wlmr9d{display:-webkit-box;display:-webkit-flex;display:-ms-flexbox;display:flex;-webkit-box-pack:end;-ms-flex-pack:end;-webkit-justify-content:flex-end;justify-content:flex-end;position:absolute;top:0.75rem;right:1rem;}```
```1// The raw data whose integrity we have to verify. The first two bytes a2// are a user identifier, and the last two bytes the amount of tokens the3// user owns at present.4const dataArray = [5  0x0bad0010, 0x60a70020, 0xbeef0030, 0xdead0040, 0xca110050, 0x0e660060,6  0xface0070, 0xbad00080, 0x060d0091,7]8
```

Encoding each entry into a single 256-bit integer results in less readable code than using JSON, for example. However, this means significantly less processing to retrieve the data in the contract, so much lower gas costs. You can read JSON on chain(opens in a new tab), it's just a bad idea if avoidable.

```1// The array of hash values, as BigInts2const hashArray = dataArray3
```

In this case our data is 256-bit values to begin with, so no processing is needed. If we use a more complicated data structure, such as strings, we need to make sure we hash the data first to get an array of hashes. Note that this is also because we don't care if users know other users' information. Otherwise we would have had to hash so user 1 won't know the value for user 0, user 2 won't know the value for user 3, etc.

```1// Convert between the string the hash function expects and the2// BigInt we use everywhere else.3const hash = (x) =>4  BigInt(ethers.utils.keccak256("0x" + x.toString(16).padStart(64, 0)))5
```

The ethers hash function expects to get a JavaScript string with a hexadecimal number, such as `0x60A7`, and responds with another string with the same structure. However, for the rest of the code it's easier to use `BigInt`, so we convert to a hexadecimal string and back again.

```1// Symmetrical hash of a pair so we won't care if the order is reversed.2const pairHash = (a, b) => hash(hash(a) ^ hash(b))3
```

This function is symmetrical (hash of a xor(opens in a new tab) b). This means that when we check the Merkle proof we don't need to worry about whether to put the value from the proof before or after the calculated value. Merkle proof checking is done on chain, so the less we need to do there the better.

Warning: Cryptography is harder than it looks. The initial version of this article had the hash function `hash(a^b)`. That was a bad idea because it meant that if you knew the legitimate values of `a` and `b` you could use `b' = a^b^a'` to prove any desired `a'` value. With this function you'd have to calculate `b'` such that `hash(a') ^ hash(b')` is equal to a known value (the next branch on the way to root), which is a lot harder.

```1// The value to denote that a certain branch is empty, doesn't2// have a value3const empty = 0n4
```

When the number of values is not an integer power of two we need to handle empty branches. The way this program does it is to put zero as a place holder.

```1// Calculate one level up the tree of a hash array by taking the hash of2// each pair in sequence3const oneLevelUp = (inputArray) => {4  var result = []5  var inp = [...inputArray] // To avoid over writing the input // Add an empty value if necessary (we need all the leaves to be // paired)6
7  if (inp.length % 2 === 1) inp.push(empty)8
9  for (var i = 0; i < inp.length; i += 2)10    result.push(pairHash(inp[i], inp[i + 1]))11
12  return result13} // oneLevelUp14

This function "climbs" one level in the Merkle tree by hashing the pairs of values at the current layer. Note that this is not the most efficient implementation, we could have avoided copying the input and just added `hashEmpty` when appropriate in the loop, but this code is optimized for readability.

```1const getMerkleRoot = (inputArray) => {2  var result3
4  result = [...inputArray] // Climb up the tree until there is only one value, that is the // root. // // If a layer has an odd number of entries the // code in oneLevelUp adds an empty value, so if we have, for example, // 10 leaves we'll have 5 branches in the second layer, 3 // branches in the third, 2 in the fourth and the root is the fifth5
6  while (result.length > 1) result = oneLevelUp(result)7
8  return result[0]9}10
Показать все```

To get the root, climb until there is only one value left.

#### Creating a Merkle proof

A Merkle proof is the values to hash together with the value being proved to get back the Merkle root. The value to prove is often available from other data, so I prefer to provide it separately rather than as part of the code.

```1// A merkle proof consists of the value of the list of entries to2// hash with. Because we use a symmetrical hash function, we don't3// need the item's location to verify the proof, only to create it4const getMerkleProof = (inputArray, n) => {5    var result = [], currentLayer = [...inputArray], currentN = n6
7    // Until we reach the top8    while (currentLayer.length > 1) {9        // No odd length layers10        if (currentLayer.length % 2)11            currentLayer.push(empty)12
13        result.push(currentN % 214               // If currentN is odd, add with the value before it to the proof15            ? currentLayer[currentN-1]16               // If it is even, add the value after it17            : currentLayer[currentN+1])18
19
Показать все```

We hash `(v[0],v[1])`, `(v[2],v[3])`, etc. So for even values we need the next one, for odd values the previous one.

```1        // Move to the next layer up2        currentN = Math.floor(currentN/2)3        currentLayer = oneLevelUp(currentLayer)4    }   // while currentLayer.length > 15
6    return result7}   // getMerkleProof8
```

### On-chain code

Finally we have the code that checks the proof. The on-chain code is written in Solidity(opens in a new tab). Optimization is a lot more important here because gas is relatively expensive.

```1//SPDX-License-Identifier: Public Domain2pragma solidity ^0.8.0;3
4import "hardhat/console.sol";5
.css-1q1t0h4{display:block;cursor:pointer;}.css-14rjhd7{display:inline-block;margin-top:0;margin-right:0;margin-bottom:0;margin-left:0;}.css-14rjhd7>img{width:1em!important;height:1em!important;margin:0!important;} Копировать```

I wrote this using the Hardhat development environment(opens in a new tab), which allows us to have console output from Solidity(opens in a new tab) while developing.

```1
2contract MerkleProof {3    uint merkleRoot;4
5    function getRoot() public view returns (uint) {6      return merkleRoot;7    }8
9    // Extremely insecure, in production code access to10    // this function MUST BE strictly limited, probably to an11    // owner12    function setRoot(uint _merkleRoot) external {13      merkleRoot = _merkleRoot;14    }   // setRoot15
Показать все Копировать```

Set and get functions for the Merkle root. Letting everybody update the Merkle root is an extremely bad idea in a production system. I do it here for the sake of simplicity for sample code. Don't do it on a system where data integrity actually matters.

```1    function hash(uint _a) internal pure returns(uint) {2      return uint(keccak256(abi.encode(_a)));3    }4
5    function pairHash(uint _a, uint _b) internal pure returns(uint) {6      return hash(hash(_a) ^ hash(_b));7    }8
Копировать```

This function generates a pair hash. It is just the Solidity translation of the JavaScript code for `hash` and `pairHash`.

Note: This is another case of optimization for readability. Based on the function definition(opens in a new tab), it might be possible to store the data as a `bytes32`(opens in a new tab) value and avoid the conversions.

```1    // Verify a Merkle proof2    function verifyProof(uint _value, uint[] calldata _proof)3        public view returns (bool) {4      uint temp = _value;5      uint i;6
7      for(i=0; i<_proof.length; i++) {8        temp = pairHash(temp, _proof[i]);9      }10
11      return temp == merkleRoot;12    }13
14}  // MarkleProof15
Показать все Копировать```

In mathematical notation Merkle proof verification looks like this: `H(proof_n, H(proof_n-1, H(proof_n-2, ... H(proof_1, H(proof_0, value))...)))`. This code implements it.

## Merkle proofs and rollups don't mix

Merkle proofs don't work well with rollups. The reason is that rollups write all the transaction data on L1, but process on L2. The cost to send a Merkle proof with a transaction averages to 638 gas per layer (currently a byte in call data costs 16 gas if it isn't zero, and 4 if it is zero). If we have 1024 words of data, a Merkle proof requires ten layers, or a total of 6380 gas.

Looking for example at Optimism(opens in a new tab), writing L1 gas costs about 100 gwei and L2 gas costs 0.001 gwei (that is the normal price, it can rise with congestion). So for the cost of one L1 gas we can spend a hundred thousand gas on L2 processing. Assuming we don't overwrite storage, this means that we can write about five words to storage on L2 for the price of one L1 gas. For a single Merkle proof we can write the entire 1024 words to storage (assuming they can be calculated on chain to begin with, rather than provided in a transaction) and still have most of the gas left over.

## Conclusion

In real life you might never implement Merkle trees on your own. There are well known and audited libraries you can use and generally speaking it is best not to implement cryptographic primitives on your own. But I hope that now you understand Merkle proofs better and can decide when they are worth using.

Note that while Merkle proofs preserve integrity, they do not preserve availability. Knowing that nobody else can take your assets is small consolation if the data storage decides to disallow access and you can't construct a Merkle tree to access them either. So Merkle trees are best used with some kind of decentralized storage, such as IPFS.

Последнее редактирование: , Invalid DateTime

### Была ли эта страница полезной?

Последнее обновление страницы: 25 мая 2023 г.
(opens in a new tab)(opens in a new tab)(opens in a new tab)(opens in a new tab)

### Использование Ethereum

• Найти кошелек
• Получить ETH
• Децентрализованные приложения (dapps)
• Слой 2
• Запуск узла
• Stablecoins
• Вложить ETH