Skip to content

Latest commit

 

History

History
334 lines (240 loc) · 18.2 KB

README.md

File metadata and controls

334 lines (240 loc) · 18.2 KB

FH-EVM T-Rex Token Protocol - Enhanced Privacy Edition

1st place of Zama Season 6 Bounties

https://github.com/zama-ai/bounty-program

image

Overview

This repository contains the upgraded version of the T-Rex Token protocol, integrating Fully Homomorphic Encryption Virtual Machine (FHEVM) technology. The protocol is designed to enhance the privacy of token transactions by hiding the transfer amounts, balances, and total supply of the T-Rex Token.

What is the problem ?

Privacy Enhancement

In traditional blockchain systems like Ethereum, all transaction details are publicly visible on the blockchain. This includes:

  • Transfer Amounts: How much of a token is being transferred from one address to another.
  • Balances: The total amount of tokens held by each address.
  • Total Supply: The total amount of tokens in circulation.

While this transparency is beneficial for auditability and trust, it can compromise privacy. Anyone can trace transactions, identify patterns, and potentially link addresses to real-world identities. This is particularly concerning for individuals and organizations who prioritize confidentiality in their financial activities.

Benefits of Hiding Information

  1. Enhanced Privacy: By hiding transfer amounts, balances, and total supply using FHEVM (Fully Homomorphic Encryption Virtual Machine), the T-Rex Token protocol ensures that sensitive financial data remains private. This is crucial for users who need to conduct transactions without exposing their financial details to the public.

  2. Preventing Financial Surveillance: In a fully transparent blockchain, it’s easy for anyone to monitor the financial activities of others. By encrypting these details, the T-Rex Token protocol makes it significantly harder for third parties to conduct financial surveillance or track user behavior.

  3. Increased Security: When financial details are hidden, it reduces the risk of targeted attacks. For example, if a malicious actor can’t see how much wealth is stored in an address, they have less incentive to target that address.

  4. Confidential Business Transactions: For businesses, maintaining confidentiality in their transactions is critical. Hiding transaction details ensures that business strategies, supply chain payments, and other sensitive activities remain confidential, protecting competitive advantages.

How Does It Make the T-Rex Token Protocol Better?

  1. Adoption in Privacy-Conscious Industries: By addressing privacy concerns, the T-Rex Token protocol becomes more appealing to industries and users who require confidentiality, such as healthcare, finance, and supply chain management.

  2. Compliance with Privacy Regulations: As global regulations increasingly emphasize the protection of personal data, the T-Rex Token protocol’s privacy features can help users and organizations comply with these laws while still leveraging blockchain technology.

  3. Future-Proofing: Privacy is becoming a critical aspect of blockchain technology as it evolves. By integrating advanced privacy features now, the T-Rex Token protocol positions itself at the forefront of this trend, making it more relevant in the future.

How Does It Work?

  1. Replacement of Standard Data Types in the T-Rex token:
    • The standard uint256 type used in the ERC20 token contract for storing balances, transfer amounts, and approval amounts has been replaced with a new encrypted data type, euint64.
    • euint64 is a type introduced by FHEVM that represents an encrypted unsigned 64-bit integer. This encryption ensures that all numerical values related to token operations are kept private, even as they are processed within smart contracts.
    /// @dev ERC20 basic variables
    mapping(address => euint64) internal _balances;
    mapping(address => mapping(address => euint64)) internal _allowances;
    euint64 internal _totalSupply;
    
    /// @dev Variables of freeze and pause functions
    mapping(address => bool) internal _frozen;
    mapping(address => euint64) internal _frozenTokens;
  1. Adapt functions in the T-Rex token that use those values:

Example on the approve function :

    // Function needed to be able to send encrypted amount from an EOA
    function approve(
        address spender,
        einput encryptedAmount,
        bytes calldata inputProof
    ) external override returns (bool) {
        approve(spender, TFHE.asEuint64(encryptedAmount, inputProof));
        return true;
    }

    function approve(address _spender, euint64 _amount) public returns (bool) {
        // Sender need to have the rights to access _amount cypher
        require(TFHE.isSenderAllowed(_amount));
        _approve(msg.sender, _spender, _amount);
        emit Approval(msg.sender, _spender);
        return true;
    }

    function _approve(address _owner, address _spender, euint64 _amount) internal virtual {
        require(_owner != address(0), "ERC20: approve from the zero address");
        require(_spender != address(0), "ERC20: approve to the zero address");
        _allowances[_owner][_spender] = _amount;
        // Need to give the rights to _owner, _spender and the contract to access this new cypher
        TFHE.allow(_allowances[_owner][_spender], address(this));
        TFHE.allow(_allowances[_owner][_spender], _owner);
        TFHE.allow(_allowances[_owner][_spender], _spender);
    }

One of the most challenging aspects of adapting the T-Rex Token protocol to use FHEVM is ensuring that the system accurately checks whether a token transfer is permitted. In the original ERC20 standard, checking the right to transfer tokens is relatively straightforward, as all relevant data—like balances, allowances, and compliance rules—are stored as plain uint256 values and can be easily compared and verified.

However, with the introduction of encrypted data types like euint64, the process becomes significantly more complex:

  • Encrypted Data: Since balances, transfer amounts, and allowances are now encrypted, they cannot be directly compared or processed in the same way as plain integers. Special cryptographic methods must be used to ensure that compliance checks are accurate while preserving the privacy of the data.
  • Complex Compliance Requirements: The T-Rex Token protocol, like many other advanced token systems, include various compliance modules that enforce rules such as:
    • ConditionalTransferModule : this module allows to require the pre-validation of a transfer before allowing it to be executed.
    • CountryAllowModule : This module aims to define the allowed country that an investors can trade the token.
    • CountryRestrictModule : This module aims to define the restricted country that an investors can trade the token.
    • MaxBalanceModule : Aimed at regulating the concentration of token ownership, this module enables the setting of maximum token balances that an investor can hold. Unlike other balance restrictions that might apply at the wallet level, this module enforces the limit at the identity level, ensuring that an investor cannot circumvent the rule by distributing tokens across multiple wallets. This feature is particularly useful for maintaining a broad distribution of token ownership or complying with regulatory caps on investment amounts.
    • SupplyLimitModule : This module aims to define the total supply that a token can have.
    • TimeExchangeLimitsModule : This module enforces restrictions on the volume of tokens a holder can transfer within a specified timeframe. The timeframe is customizable, allowing issuers to set daily, weekly, monthly, or any custom period limits. This flexibility ensures adaptability to a wide range of regulatory and policy requirements.
    • ExchangeMonthlyLimitsModule : Similar to the Time-Based Exchange Limits module, but with a fixed monthly timeframe. This optimization simplifies the module's logic, offering a gas-efficient solution for monthly transfer volume restrictions to CEXs.
    • TimeTransfersLimitsModule : This module limits the total volume of transfers an investor can execute within a customizable timeframe, focusing on peer-to-peer transactions rather than deposits to CEXs. It ensures that the overall volume of transfers remains within predefined limits, excluding transfers between an investor's own wallets to prevent self-transfer loopholes.
    • TransferFeesModule : This module introduces the ability to levy fees on token transfers, offering token issuers the flexibility to set the fee percentage and designate a specific wallet to collect these fees. It also allows for the exclusion of certain addresses from the fee mechanism, providing a way to tailor the fee structure to accommodate operational needs or incentivize particular transaction patterns within the ecosystem.
    • TransferRestrictModule : Designed to enforce transfer restrictions exclusively to whitelisted addresses, this module ensures that tokens can only be sent to approved destinations. This capability is crucial for scenarios where token transfers need to be routed through intermediary contracts for additional off-chain verifications or other compliance checks, even if the recipient address belongs to an eligible investor. It enhances control over token circulation, aligning with specific compliance or operational strategies.

To maintain these compliance requirements in the context of encrypted data, significant modifications are necessary:

  • Encrypted Compliance Checks : Each compliance module must be adapted to work with encrypted data. This may involve using homomorphic encryption techniques that allow certain computations to be performed on encrypted data without needing to decrypt it. These checks ensure that the rules are enforced without compromising the privacy provided by euint64.
  • Modular Redesign : The existing compliance modules, which were originally designed to work with plain uint256 data, need to be redesigned to integrate with the FHEVM environment. This might involve breaking down the logic into smaller, more modular components that can work within the constraints of encrypted operations.
  • Performance Considerations : Performing operations on encrypted data can be computationally intensive. As a result, the compliance modules must be optimized to minimize the performance impact while still ensuring that all necessary checks are performed.

Tech Stack

  • Smart Contracts: Solidity
  • Blockchain: Ethereum-compatible (FHEVM)
  • Development Environment: Hardhat
  • Package Manager: pnpm

Prerequisites

Before getting started, ensure you have the following installed:

WARNING ! Read that before executing anything !

  • In this project, i used the latest fhevm hardhat template. Please note that i need to modify the scripts in order to make it works. In the task taskDeploy, i get error that ethers cannot find the contract in this location : await ethers.getContractFactory("fhevm/...");. I modify it to await ethers.getContractFactory("fhevmTemp/..."); in order to be able to use the mock mode.
  • And for local node test mode, i need to modify it to await ethers.getContractFactory("fhevmTemp/fhevm/...");
  • Total supply is set to a cypher because in mint function we need to verify the eligibility of the transfer. So it needs to be a cypher because other values are. I know that maintaining a list of investors make the token not scalable as there will be more and more investors and the allowEachInvestorToAccessTotalSupply will be more and more expensive. It can even make the transaction failed because of the max amount of gas in a block. This is a problem that need to be considered, however we have the function removeInvestor to remove useless investors from the list and for a security token as the T-REX one. We will not have that many investors. So normally it should be ok.

Mock mode

1. Clone the Repository

git clone https://github.com/QiteBlock/fhevm-hardhat-t-rex.git
cd fhevm-hardhat-t-rex

2. Install Dependencies

pnpm install

3. Configure Environment

Rename .env.example to .env.

4. Run tests

pnpm test:mock

Tests

5. Run coverage

pnpm coverage:mock

Token Coverage Compliance Coverage Registry Coverage

Local node mode

1. Clone the Repository

git clone https://github.com/QiteBlock/fhevm-hardhat-t-rex.git
cd fhevm-hardhat-t-rex

2. Install Dependencies

pnpm install

3. Configure Environment

Rename .env.example to .env.

4. Start Fhevm

pnpm fhevm:start

5. Deploy the first token to swap

pnpm task:deployTREX --token-name TREXA --token-symbol TREXA  

6. Deploy the second token to swap

pnpm task:deployTREX --token-name TREXB --token-symbol TREXB 

7. Deploy the Dvd transfer manager

pnpm task:deployDVD

8. Update the .env file with addresses of the deployed contracts

export TOKEN_TREX_A=TO_BE_DEFINED
export TOKEN_TREX_B=TO_BE_DEFINED
export DVD_MANAGER=TO_BE_DEFINED

9. Execute the DVD (Delivery vs Delivery)

pnpm script:executeDVD

Dvd result

Dev network

1. Deployment with Zama default account

T-Rex token A

  • ClaimTopicsRegistry: 0x7C547CCBf006E1006b91613723A1C9601b7cDC24
  • TrustedIssuersRegistry: 0x83CDB3f4A621f37e1e88F05EB469E69B5dc011c4
  • IdentityRegistryStorage: 0x92e6950B5c4d57e97DD74dC9427C1D2eb8dA529a
  • IdentityRegistry: 0x2f3595f5E7fB2b4c598e31f617A293c3BD9f9651
  • ModularCompliance: 0x2FbDF3a294012c2CD10eDd60C2fcF110D999c431
  • Token: 0x0e1cE0b2782127a1a156Ece0a1a448fBA7344EAd
  • identityImplementationAuthority: 0xd60Ea44B5e1438458Ec2768fD14735A995c1c7cc
  • TREXImplementationAuthority: 0x444aC71c8f624Cc0ace5922097FeDF5e5d70f026
  • TREXFactory: 0xC6c9DE17858159039955Dc9803851106e25e0fd8
  • ClaimTopicsRegistryProxy: 0x6EDaE25094B5d2B350F75418623C6567C00a3513
  • TrustedIssuersRegistryProxy: 0x0D437D0e3bfb8801D7c61e399C89A355f02c82C0
  • IdentityRegistryStorageProxy: 0xb82aC5e885FC20E6e61CdffBa609AeA3A6681027
  • IdentityRegistry: 0x6086368F3c5ec0AeF255a589A784021EFDfc4266
  • Token: 0xF229Ac63a3283eF8F740cdEb6aAe573ceA7c6Bd4
  • ClaimIssuer: 0x4D3fD28893CA137547C7303f0992BB835079Cc24
  • Token Address : 0xF229Ac63a3283eF8F740cdEb6aAe573ceA7c6Bd4

T-Rex token B

  • ClaimTopicsRegistry: 0xB142D73E2d27d4ADAc6a8Ba6318c922Bb2A2751e
  • TrustedIssuersRegistry: 0x0FB2c0253b702C07CB12eD3e84Ae57C4Ad3ee389
  • IdentityRegistryStorage: 0x73EB565AbF39B46722Bbc55c74fB1935e458a315
  • IdentityRegistry: 0x59Fc7585fB74afB869FeB1f05a17380D65632C5E
  • ModularCompliance: 0x84398F663560bC04f898E765D58b17997D6697c0
  • Token: 0x6893e54298d30e432EA055e35fF0461FEeFc16D7
  • identityImplementationAuthority: 0x146Ed57f7Bc4900766bEDF9988e12C07CC6969F2
  • TREXImplementationAuthority: 0xa600222B99beCe6055ab42bfe3d7002C760d7dCb
  • TREXFactory: 0x342CDC4cDa84945a9B7067a36de00f034DDF9b5F
  • ClaimTopicsRegistryProxy: 0x840434F30c0169b993342C69B8A7C9cafb7df815
  • TrustedIssuersRegistryProxy: 0x10f79e2De7C68D003C6e13123fec30c21dE7CcEe
  • IdentityRegistryStorageProxy: 0x5A6c34958d7a1850f74cA68F34e55C56F2d24d54
  • IdentityRegistry: 0xd50b4cE73A39B433651788942bB8817bCb5bdFA9
  • Token: 0xbde3D6095e85c822CAA2144C13497Da24b8BB076
  • ClaimIssuer: 0xB678Df3AB09331C84748fe7C2FB2f704F04e6404
  • Token Address : 0xbde3D6095e85c822CAA2144C13497Da24b8BB076

DVD Contract

  • Transfer Manager Address : 0xA3Ac498301992Dd6830974E7B6CdbCc170BeE15b

Result in Devnet

Tests

2. Deployment with my account (Get some Zama token)

T-Rex token A

  • ClaimTopicsRegistry: 0x3a92280BE1AaD4f41F695D4d473b5Ef984239C67
  • TrustedIssuersRegistry: 0xb3bad50A6bBcda892c7C8Db80493EBd518D69084
  • IdentityRegistryStorage: 0xed376b1280EEDB6E0F42725Be8f47D9B8305c808
  • IdentityRegistry: 0x8e5547bD15024eB11e1c6F0d2FF674589aEa0bF5
  • ModularCompliance: 0x002047D5A69D9e6d4553dF9d698895F17e7E6526
  • Token: 0xCe367a9355dCf347582b110DCb544BdEdcf71E51
  • identityImplementationAuthority: 0x1c9cA5a3e38a66C772cc7f1068dB596C13EC013c
  • TREXImplementationAuthority: 0xBe4346F858E41826218bC0dCdA0145e9606c7344
  • TREXFactory: 0x98CFFd819F5ee4903eA3A3f165b8E9fF680dfd8E
  • ClaimTopicsRegistryProxy: 0x172bC8CA8521Ec05863165E34CE96D4eE272836e
  • TrustedIssuersRegistryProxy: 0x3B2a425e4C65622D15f7579C9A802109AD70E112
  • IdentityRegistryStorageProxy: 0x6e7F8a81FceE513903F35b44736B787714c82DcD
  • IdentityRegistry: 0x41618CC59932871df486Ed2D0869C1E1C96e67E1
  • Token: 0x26bD50BA2E69Cd1716D1ABAa66A52Ec14122f649
  • ClaimIssuer: 0xb24C4F10a6bD4e9a115342988bd4EB4e10587121
  • Token Address : 0x26bD50BA2E69Cd1716D1ABAa66A52Ec14122f649

T-Rex token B

  • ClaimTopicsRegistry: 0x1f906731f0B5372f85f102c58FEDD4280d0D5391
  • TrustedIssuersRegistry: 0x1105F9d87758B5c26Eb5F8fFf03f49e4813F31cc
  • IdentityRegistryStorage: 0x8c439643E984A93bc4f48645EcD65Cb67d540ec7
  • IdentityRegistry: 0xF3AF800399E59f1D1e7eE6269FAE674DCA720c40
  • ModularCompliance: 0xA392d63ed3a3FB78A016592fbf0A696557073C7E
  • Token: 0xF17A779C607793FD2864C7f9c4d98e1eBb79125d
  • identityImplementationAuthority: 0x51e90903b55d3D92B168615F99e336CB388C63EB
  • TREXImplementationAuthority: 0x48444ee50cA8f08529E308a0D6A444762c36381e
  • TREXFactory: 0xBfCFf52689754e486230B90d1CB909eB76B22F83
  • ClaimTopicsRegistryProxy: 0x3940aBf98686044DAA85D77e252e6E8260CDC91D
  • TrustedIssuersRegistryProxy: 0x327C8cFb1548F76390882034E296A3Eeef673e53
  • IdentityRegistryStorageProxy: 0xEFd3750b8a91A283a63352B70a258CaEA7743154
  • IdentityRegistry: 0x1e344EFA7cFCfbbC4f5C1aD50290F2CD49740FF2
  • Token: 0xa839d945bAB88b36b6DC885631AAA5ae8942471F
  • ClaimIssuer: 0xef40bFf54ADf9618F2EAF313D1E311cc871078a3
  • Token Address : 0xa839d945bAB88b36b6DC885631AAA5ae8942471F

DVD Contract

  • Transfer Manager Address : 0x885eF30fa1dE57f80cA1084CBA9fCf75f7925Ecf

Result in Devnet

Tests

7. License

This project is licensed under the GPL-3.0 License. See the LICENSE file for details.