perf: Stop expensive cryptographic validation when deserializing shielded transactions #7939
Labels
A-blockchain-scanner
Area: Blockchain scanner of shielded transactions
A-state
Area: State / database changes
C-bug
Category: This is a bug
I-slow
Problems with performance or responsiveness
S-needs-triage
Status: A bug report needs triage
Motivation
Zebra's transaction deserialization does a lot of CPU-heavy cryptography for shielded transactions.
Since we know that transactions in our database are valid, we can deserialize them without checking the validity of curve points.
API Reference
TODO: which methods are causing this CPU usage, and what can they be replaced with?
Detailed Analysis
See #4583 (comment)
Designs
In
zebra-chain
:In
zebra-state
:Related Work
The text was updated successfully, but these errors were encountered: