Releases: tlsnotary/tlsn
v0.1.0-alpha.12
Notary Server
Clients can now authenticate to the Notary Server using JSON Web Tokens (JWTs) in the Authorization: Bearer header.
Benchmarking
A new, enhanced harness CLI lets you benchmark the TLSNotary protocol under configurable network conditions—both in native and browser environments. See the harness README for details.
Mutual TLS (mTLS)
Standard TLS only verifies the server’s identity to the client. In compliance-sensitive environments, servers often require clients to authenticate via X.509 certificates. Now the Prover (acting as a TLS client) can present a client certificate during the TLS handshake.
Performance
Added several MPC optimizations to reduce the overall runtime of the protocol.
What's Changed
🚀 Features
- feat(notary): add JWT-based authorization mode by @kubkon in #817
- feat: prove server mac key by @themighty1 in #868
- feat: harness by @sinui0 in #703
- feat(mpc-tls): use concurrent ot setup and gc preprocessing by @themighty1 in #910
- feat(prover): client authentication by @themighty1 in #916
⚙️ Miscellaneous Tasks
- chore: bump prerelease version by @sinui0 in #895
- fix(wasm): expose reveal server identity. by @yuroitaki in #898
- Fix wasm-pack warnings by @heeckhau in #888
- feat: add logging to server fixture (#901) by @heeckhau in #903
- docs: improve example readme by @heeckhau in #904
- build: Lock + document Cargo.lock by @heeckhau in #885
- refactor(mpc-tls): remove commit-reveal from tag verification by @sinui0 in #907
- fix(ci): wasm tests by @sinui0 in #913
- fix(harness): retry browser connection until timeout by @sinui0 in #914
- fix: set TCP_NODELAY for prover and notary by @themighty1 in #911
- fix(prf): adapt logic to new default setting by @th4s in #920
- chore: bump mpz to ccc0057 by @sinui0 in #924
- fix(harness): iptable rule and bench config variable by @sinui0 in #925
- chore(wasm): expose client auth config to js by @themighty1 in #927
Full Changelog: v0.1.0-alpha.11...v0.1.0-alpha.12
v0.1.0-alpha.11
Core API Changes
Up until now our core APIs tlsn-(prover/verifier)
and examples have placed an emphasis on the issuance of attestations, i.e. "notarization". We've begun the process of decoupling our attestation model from these APIs, starting with placing a deprecation warning on the corresponding methods. All attestation related functionality will be pulled out into a dedicated crate in a future release and notarization will no longer be provided by the core APIs. Instead, the core APIs can continue to be used to generate commitments and proofs which are used to construct attestations. In fact, if you look at how it works in this release you can see that building an attestation is quite simple.
These changes are intended to simplify the core API, increase flexibility, and also to highlight that using our particular attestation model is optional! Perhaps your application would prefer to issue attestations in the Verifiable Credential model instead? Or perhaps you want an even simpler format to integrate with a smart contract verifier. Maybe your application doesn't need attestations at all!
Transcript Hash Commitments
This release delivers transcript hash commitments (#881), starting with SHA256
with additional algorithms on the way including KECCAK256
and BLAKE3
. It is now possible for the Prover to prove the hash of transcript data to the Verifier (which can be included in attestations). These commitments can be obtained using the existing TranscriptCommitConfig
API, selecting the TranscriptCommitmentKind::Hash { alg: HashAlgId::SHA256 }
commitment. Opening these commitments is simpler than the existing available "encoding" commitments, and should be significantly more performant.
Note: The now-deprecated notarization methods in the core API do not allow the Prover to commit to subsets of the transcript using hash commitments, only the entire transcript. This is to maintain the existing oblivious property of the reference Notary. In order to obtain hash commitments to the transcript the Notary would have to learn the indices of the data that are being committed, which themselves can leak sensitive information. The rest of the core API places no such restriction on commitments.
Performance
#735 introduced an optional mode which optimizes for low bandwidth connections between the Prover and Verifier. It offers a bandwidth/latency trade-off which reduces the amount of data uploaded from the Prover to the Verifier in MPC-TLS. This mode can be enabled with the ProtocolConfigBuilder::network
method (NetworkSetting::Latency
). When available bandwidth is on the order of 10Mbps this mode can reduce total proving time as illustrated in the figure below. However, it should be noted that this mode can cause reduced performance in higher latency (>50ms) settings or even in low latency settings where bandwidth is not a constraint (1Gbps). In the future we will look at providing a NetworkSetting::Auto
mode which probes the connection and selects the optimal setting.

Putting aside the above optional mode, this release provides overall performance improvements and reduced latency sensitivity.

Notary server
The notary server now starts without specifying a configuration file. If you want to use a custom configuration, you can still provide a config file path on the command line or set the relevant environment variables. For most users—especially for test or development instances—no changes are needed, and it's now even more convenient since signing keys are generated automatically at startup. If you are running in production, however, make sure to provide your own keys and configuration as appropriate. For details on configuring the server, see the updated README.
Additionally, the Dockerfile has been updated to use an explicit entrypoint. If you are running the notary server in Docker, you may need to update your deployment scripts or configuration to accommodate this change.
What's Changed
🚀 Features
- feat(prf): reduced MPC variant by @th4s in #735
- feat: SHA256 transcript commitments by @sinui0 in #881
- feat(wasm): allow max records config by @themighty1 in #810
- feat(notary): add support for custom extension by @yuroitaki in #872
⚙️ Miscellaneous Tasks
- chore(examples): fix formatting by @themighty1 in #793
- fix: Add missing concurreny param in tee config by @heeckhau in #791
- misc(notary): improve error msg when tls is expected by @themighty1 in #776
- build: set version number to 0.1.0-alpha.11-pre by @heeckhau in #798
- doc(example): add comments on verifying custom extension by @yuroitaki in #788
- chore: add rustls licence and attribution by @themighty1 in #795
- chore: support workspace lints in all crates by @themighty1 in #797
- fix(server): use custom HTTP header for authorization: X-API-Key by @kubkon in #804
- Tee dev cleanup by @heeckhau in #759
- chore(examples): inline custom crypto provider for clarity by @themighty1 in #815
- test: webpki roots fixes by @themighty1 in #823
- Build gramine-sgx for dev and tagged builds only by @heeckhau in #805
- browser bench fixes by @themighty1 in #821
- Move
defer_decryption_from_start
intoProtocolConfig
by @th4s in #839 - build: Check in Cargo lock files by @heeckhau in #742
- refactor(notary): remove config file and fixtures by @yuroitaki in #818
- misc(notary): add common crate for server and client by @yuroitaki in #871
- refactor(core): decouple attestation from core api by @sinui0 in #875
- misc(notary): update doc, docker, tee, ci by @yuroitaki in #874
- docs: correct notary-server command in example readme by @heeckhau in #883
- ci: build ci with explicit, fixed rust version (1.87.0) by @heeckhau in #879
- Automatic workflow to update
main
after a release by @heeckhau in #891 - Release automation by @heeckhau in #890
New Contributors
Full Changelog: v0.1.0-alpha.10...v0.1.0-alpha.11
v0.1.0-alpha.10
Alpha.10 brings a handful of changes including new features, improved error messaging and API simplifications.
Attestation Extensions
Attestations can now be extended with custom extensions to support application specific requirements. Both the Prover and Notary can be configured to include custom data. For example, a Prover could include their public key in the attestation to bind it to their identity. This has a number of potential uses during presentation to an attestation Verifier.
See the API docs for additional information.
Note: Even though the core Notary API supports adding extensions, currently the Notary reference server we provide can not be configured to include them without modifying its source and compiling yourself yet. Expect this to become possible in future releases.
Transcript Proof API
The TranscriptProofBuilder
API has been further simplified to automatically select the best commitments to open without specifying this explicitly. As we add support for additional transcript commitment types this will remove some burden from our users while building transcript proofs.
Notary Server Concurrency Limit
Previously the Notary server would accept an unbounded number of concurrent notarization requests from provers. The Notary server can now be configured to limit resource utilization and mitigate potential DoS attacks.
What's Changed
🚀 Features
- (notary): add concurrency limit by @themighty1 in #770
- attestation extensions by @sinui0 in #755
- mpc-tls: improve error message for incorrect transcript config by @sinui0 in #754
- find set cover across different commitment kinds in TranscriptProofBuilder by @yuroitaki in #765
- expose record count config by @sinui0 in #786
- Log notarization elapsed time by @LogvinovLeon in #746
⚙️ Miscellaneous Tasks
- DoS mitigation and additional validation by @themighty1 in #648
- SGX build: drop TEE GH environment, use regular secret by @heeckhau in #751
- Add
tlsn-wasm
to API docs by @heeckhau in #768 - doc: add minor comments by @yuroitaki in #761
- remove utils-aio dep by @sinui0 in #760
- perf: simplify encoding logic by @themighty1 in #781
Release artefacts
- notary-server docker container
- notary-server-sgx docker container
- notary-server-sgx.zip build attestation
Build log: build
Full Changelog: v0.1.0-alpha.9...v0.1.0-alpha.10
v0.1.0-alpha.9
Alpha.9 brings focused improvements to the reveal API and transcript construction, along with important bug fixes following alpha.8. This release reflects our shift toward faster, more frequent iterations — helping us build momentum as we head toward the end of the alpha phase and work towards version 1.0.
What's Changed
🚀 Features
- Find set cover solution for user in
TranscriptProofBuilder
(#664) - Ethereum compatible signer (#731)
- Make logging format configurable by @LogvinovLeon (#719)
- (notary) Build notary and publish docker image for dev branch(#726)
🐛 Bug Fixes
⚙️ Miscellaneous Tasks
- refactor: migrate to rand 0.9 (#734)
New Contributors
- @LogvinovLeon made their first contribution in #719
Release artefacts
- notary-server docker container
- notary-server-sgx docker container
- notary-servier-sgx.zip build attestation
Build log: build
Full Changelog: v0.1.0-alpha.8...v0.1.0-alpha.9
v0.1.0-alpha.8
Highlights
The main highlight of this release is the MPC-TLS upgrade (#698) which swaps out our MPC and ZK backends to incorporate the latest work in mpz
. Most prominently, we now use the VOLE-IZK Quicksilver protocol instead of Garbled Circuit ZK. This provides a significant reduction in bandwidth utilization. Additionally, we've incorporated many control flow optimizations which have reduced the online time by up to 96% compared to previous releases.
Performance Changes
Latency
As mentioned above, we've introduced a handful of control flow optimizations which have reduced the round complexity of our implementation. The figures below illustrate the effect of latency between the Prover and Verifier (Notary) with a 1Gbps connection. Notably, online time is now much less sensitive with respect to latency. This should resolve any TLS server timeout issues users were experiencing.


Bandwidth
Online time is now essentially invariant with respect to bandwidth, which again should eliminate most time out issues one may have experienced on slower connections. Total time has been reduced by approximately 50% across the board when holding latency constant at 50ms. Upload bandwidth is now the dominant factor in total proving time.


What's Next?
Regarding performance, we are approaching the theoretical limit for MPC-TLS dictated by the TLS PRF MPC cost (barring breakthroughs in MPC 😉). We have another optimization we will implement which reduces the upload size for computing the PRF by approximately 2/3 at the expense of increased latency sensitivity. This will reduce proving time by roughly the same factor, as it is the dominant cost. It will be available as a configuration option for when latency conditions are appropriate. We also have our eyes on some improvements to our WASM build to reduce CPU cost and bring it closer to native performance.
Aside from that, our focus will be turning towards features and tooling to support a wider range of use cases and improve developer experience. See the issue tracker for what's ahead, and feel free to open issues for feature requests!
What's Changed
🚀 Features
- (notary) Support reading config values from CLI and env var (#605)
- (notary) Intel-sgx attestation
🐛 Bug Fixes
- (notary) Fix client issue of not being able to specify the notary url path (#614)
- (notary) Implement timeout for notarization (#639)
- (notary) Make TLS keys and authorization whitelist configs optional (#589)
⚡ Performance
⚙️ Miscellaneous Tasks
- Generate coverage report
- Add core transcript unit tests (#649)
- (notary) Update
axum
to v0.8 (#681) - (notary) Fix TEE deployments (#686)
- (notary) Improve notary server html info (regular and TEE)
- (notary) Calculate SGX mr_enclave for notary server in gramine docker (#701)
- Bump deps (#704)
- Removed unused dependencies (
cargo machete
) - Re-added explicit getrandom dependency in the wasm crate (#646)
- Update wasm-bindgen and wasm-bindgen-rayon dependency (#662)
New Contributors
- @ElusAegis made their first contribution in #614
- @anthonykimani made their first contribution in #605
- @yorozunouchu made their first contribution in #589
Full Changelog: v0.1.0-alpha.7...v0.1.0-alpha.8
v0.1.0-alpha.7
Highlights
The main feature of this release is a rewrite of tlsn-core
summarized below:
- Improved the structure of attestations
- Header has a static smol size and now includes a version tag and unique identifier
- Body fields are now merkelized so that only fields necessary to prove desired statements need to be included
- Body is forward-compatible with new kinds of fields (for example, new kinds of commitments)
- Added a
Request
pattern which will allow a Prover to configure aspects of the attestation depending on what the Notary supports.- This paves the way for custom extensions, eg #342
- Further encapsulated various kinds of proofs
ServerIdentityProof
proves the server name using the certificate chainAttestationProof
proves the Notary signature and attestation bodyTranscriptProof
proves subsequences of the transcript using the encoding or hash commitments.
- Extensible cryptographic algorithms via
CryptoProvider
(inspired byrustls
).- Added keccak256 and sha256 to officially supported, including user provided custom algorithms.
- Added secp256k1 signatures, including user provided custom algorithms.
- Added a new
PlaintextHash
commitment type (not fully exposed yet) which will be implemented with authdecode. See #479 - Encapsulated more logic into this crate in the form of builders, reducing API surface area and making it more difficult to misuse.
We are open to requests for adding more officially supported algorithms, please open an issue. We already plan to add Poseidon hashes with popular parameters, such as being circomlib compatible.
Check out the API docs!
In addition to the tlsn-core
rewrite there are numerous stability, error handling and ergonomic improvements. Including consolidating all our crates into a single workspace, which improved compile times.
What's Changed
🚀 Features
- (tlsn-wasm) Wasm bindings (#536)
- (wasm) No-bundler flag (#546)
- Add protocol configuration negotiation (#513)
- Make defer-decryption default
- (wasm) Clone getters (#600)
- (wasm) Expose presentation verifying key
🐛 Bug Fixes
- Miscellaneous fixes on documentations (#528)
- Clippy gh action and linting (#531)
- Notary cd (#538)
- Correct paths following repo reorg (#554)
- Repair wasm build. (#567)
- Check if already committed in
commit
(#568) - Aead unit tests no longer deadlock
- (wasm) Attestation.deserialize should return Attestation (#597)
- (verifier) Correct error display (#599)
- Clippy fix
too_long_first_doc_paragraph
in enum_builders - (core) Remove serde flatten
- (wasm) Remove presentation verify from test
- (examples) Fix examples for alpha.7 release (#603)
🚜 Refactor
📚 Documentation
- Fix links in README.md (#544)
- Fix and improve interactive example (#552)
- Describe execution modes (#464)
- Fix typos (#569)
- Added note about "format on save" to the contribution guide
- Add section about linting to contribution guide
- Rustfmt wrap_comments (#611)
- (core) Additional documentation and examples (#613)
- Correct foldername in examples readme (#624)
⚙️ Miscellaneous Tasks
- Add check to identify number of stable versions deployed (#532)
- Cleanup after workspace consolidation
- Extend tls certs perpetually (#555)
- Temporarily disable deadlocked tests in aead (#547)
- (examples) Remove examples, fix bug (#585)
- Add favicon to wasm-test-runner to avoid 404 in tests
- Run test with debug logging, not the build
- Remove clippy::blocks_in_conditions (#592)
- (notary) Change fixture pub key to compressed form (#623)
- Prepare alpha.7 release (#620)
- Core-rewrite unit tests (#608)
New Contributors
Full Changelog: v0.1.0-alpha.6...v0.1.0-alpha.7
v0.1.0-alpha.6
This release includes performance and stability improvements, as well as preparation work for future upgrades.
Unfortunately, the long-awaited Authdecode feature is not included in this release (sad trombone noises). However, we plan to release updates at a faster pace, so it will land soon™. Join our next office hours event to hear more about our priorities and what's next.
Highlights
mpz
Upgrade
We have made significant improvements to mpz
, the MPC library used by TLSNotary. This release includes enhancements to the handshake/online time of the protocol, reducing online time by up to 30% on higher latency connections, which should help alleviate server timeout issues. More improvements in this area will be included in future releases, supported by further upgrades to mpz
.
GHASH Update
We've updated the 2PC-GHASH protocol so that the Prover no longer needs to reveal the MAC keys to the Verifier after the TLS connection is closed to perform consistency checks. This key revelation step was shown to be unnecessary by PADO in their Lightweight Authentication of Web Data via Garble-Then-Prove paper, demonstrating that semi-honest OLE is sufficient. We thank PADO Labs for their discussion and collaborative spirit.
Notary Client
We have added a client implementation in #489, which simplifies interacting with our reference Notary server. It handles the low-level details of setting up a notarization session, allowing developers to focus on their applications.
What's Changed
⛰️ Features
- Add notary client crate (#489)
🐛 Bug Fixes
- (tlsn-server-fixture) Update cert fixtures (#499)
🚜 Refactor
- Restructure notary crates (#508)
- (universal-hash) Mpz upgrade (#502)
- (key-exchange) Mpz upgrade (#496)
- (cipher) Mpz upgrade (#501)
- (prf) Mpz upgrade (#497)
- (prf) Relax hiding of transcript hash, optimize latency (#505)
- (aead) Mpz upgrade (#504)
- (tls-mpc) Mpz upgrade (#511)
- (tlsn) Mpz upgrade (#512)
📚 Documentation
- Miscellaneous fixups (#475)
- Fix style issues (#476)
- Fix style in components (except TLS) (#477)
- Update CONTRIBUTING.md (#483)
⚙️ Miscellaneous Tasks
v0.1.0-alpha.5
This release delivers performance improvements, bug fixes, and updates to our example documentation. We've opted to release these enhancements early to support our community in time for the ETHDam hackathon.
The AuthDecode PR is scheduled for inclusion in our next release. This decision allows us to expedite the current update, ensuring you have access to the latest improvements as quickly as possible.
Highlights
Transcript Size Configuration
Independent limits are now set for the sent and received data transcripts. This adjustment allows for more precise specification of expected data volumes and complements the record layer preprocessing described below.
Record Layer Preprocessing
The MPC-TLS protocol now preprocess the MPC for the sent data transcript, adhering to the configured sent data transcript limit. This enhancement shortens connection times with the server and helps mitigate timeouts.
The default sent data limit is 4KB, but it can be adjusted to accommodate larger HTTP requests or reduced to minimize overall proving time. For configuration options, see ProverConfigBuilder
and VerifierConfigBuilder
(make sure their settings match!).
Interactive Verifier Example
Explore the interactive verifier example to utilize the protocol's "trustless" configuration, which omits Notary attestation and directly proves data to the Verifier.
What's Changed
- Update notary server README on frequently asked questions. by @yuroitaki in #441
- Show basic html info response for notary server's root endpoint by @heeckhau in #439
- feat: separate transcript size limits by @sinui0 in #435
- Update repo readme. by @yuroitaki in #450
- interactive verifier example by @heeckhau in #451
- fix(tlsn-formats): fix commitment error caused by empty headers by @sinui0 in #452
- feat: automated network benches by @sinui0 in #457
- feat: record layer preprocessing by @sinui0 in #455
- Feat/automate bench docker by @heeckhau in #460
- Deployment of multiple stable versions by @ntampakas in #459
- Add branches info in readme. by @yuroitaki in #467
- Correct branch links in readme. by @yuroitaki in #469
- Add api key whitelist hot reloading and small touch-up by @yuroitaki in #458
- Readme for interactive example by @heeckhau in #471
- Bump versions for release alpha.5. by @yuroitaki in #470
- fix: interactive example by @sinui0 in #472
Full Changelog: v0.1.0-alpha.4...v0.1.0-alpha.5
v0.1.0-alpha.4
Highlights
This release contains new features, performance optimizations, bugfixes and, of course, breaking changes!
Interactive Verifier
This release introduces support for directly proving the server identity to the MPC-TLS verifier and selective disclosure of the transcript. This configuration is important as it is the "trustless" variant of the protocol which does not rely on a third-party attestation (from a Notary).
Examples and additional documentation are coming soon™
Deferred Decryption
The new deferred decryption feature is one to take a look at. It is an optimization which can be activated when server response data can be decrypted after the TLS connection is closed. For example, you can activate it before sending a final HTTP request to the server, and it will defer decryption of the response.
The benefit of doing this is two-fold:
- It significantly reduces upload bandwidth utilization from the Prover to the Verifier
- It reduces CPU utilization for both parties.
Both of which can lead to large reductions in the total runtime of the protocol, particularly for a Prover with an asymmetric internet connection to the Verifier.

An example of how to use this feature is demonstrated in the twitter example.
This feature paves the way for massive performance increases in the future when we integrate VOLE-based interactive ZK proofs. Unlocking the ability to prove data on the order of megabytes.
Selective Disclosure API
This release provides a simplified API for selective disclosure of HTTP and JSON data. The previous release provided a rather clunky builder style API for generating commitments and proofs for both formats. The new commitment API is closer to a "visitor" style, and provides reasonable defaults that should cover most use-cases so you don't need to implement it yourself (unless you want to). For selective disclosure you get to work with the format types directly.
Check out the twitter example to see it in action.
What's Changed
Features
- Interactive verifier (#379) (#401)
- Tls-client backend buffer (#414)
- Deferred decryption (#416)
- Network simulation benches (#417)
- Default commit to entire http request/response (#433)
Performance
- Adjust mux config (#418)
Bug Fixes
Documentation
- Updated examples based on the Progcrypto workshop (#399)
- Add style guide (#411)
- Update Direction docs (#427)
- Remove dead argument docs (#429)
Refactor
- Use tls prf from tls-core in rc backend (#413)
- Add AEAD prove/verify + tag methods (#415)
- Tlsn-common mux module (#420)
- Selective disclosure api (#380)
- Update hyper and use http prover (#434)
Miscellaneous Tasks
- Clippy fix (#400)
New Contributors
- @ntampakas made their first contribution in #419
Full Changelog: v0.1.0-alpha.3...v0.1.0-alpha.4
v0.1.0-alpha.3
What's Changed
- Show badges on top of README page on GitHub by @heeckhau in #346
- Check that benches compile in GitHub workflow by @heeckhau in #350
- Yamux send tls closenotify by @yuroitaki in #355
- axum server fixture by @sinui0 in #356
- tlsn-core fixtures by @sinui0 in #359
- chore: restore cert tests by @sinui0 in #361
- Migrate notary-server repo by @yuroitaki in #358
- Fix PRF benchmark by @0xvon in #363
- Tidy up examples folder. by @yuroitaki in #362
- Modify notary url parsing to make it generic for both ip and domain by @yuroitaki in #366
- feat: selective disclosure tooling by @sinui0 in #335
- refactor: tlsn-verifier by @sinui0 in #360
- Also redact some received data in simple_prover by @heeckhau in #370
- Enable clippy for examples in ci build by @heeckhau in #373
- perf: pre-garble key exchange and PRF by @sinui0 in #371
- Adapted readme for docker image by @th4s in #382
- Replace
std::time::SystemTime::now
to support wasm32 by @mhchia in #383 - Add auth middleware, info endpoint to notary server by @yuroitaki in #368
- Make CORS permissive by @mhchia in #385
- feat: stream cipher zk by @sinui0 in #384
- fix: unused doc comment by @sinui0 in #386
- Make tls optional between prover and notary. by @yuroitaki in #387
- Add git commit hash and timestamp to info endpoint by @yuroitaki in #392
- Use ring v0.17 by @mhchia in #391
- Optimise test to use release profile to speed up notary server integration test by @yuroitaki in #393
- Use ring 0.17 in prf tests too by @heeckhau in #395
- Add ci build for WASM target for specific packages by @heeckhau in #394
- Bump version for release 0.1.0-alpha.3 by @yuroitaki in #397
New Contributors
Full Changelog: v0.1.0-alpha.2...v0.1.0-alpha.3