This page is a placeholder. All examples on this page are currently AI-generated and are not correct. This documentation will be completed in the future with accurate, tested examples.
Overview
Address: 0x0000000000000000000000000000000000000001
Introduced: Frontier
EIP: EIP-2 (Signature Malleability Protection)
The ecRecover precompile recovers the Ethereum address from an ECDSA signature using the secp256k1 elliptic curve. Given a message hash and signature components (v, r, s), it returns the 20-byte Ethereum address of the signer. This is fundamental for transaction validation and signature verification in Ethereum.
EIP-2 enhanced this precompile by enforcing signature malleability protection, requiring that the s value be in the lower half of the curve order. This prevents transaction replay attacks where the same signature could be used with different s values.
Gas Cost
Fixed: 3000 gas
The cost is constant regardless of input validity. Even invalid signatures consume the full gas amount.
Offset | Length | Description
-------|--------|-------------
0 | 32 | Message hash (keccak256 of signed data)
32 | 32 | v (recovery id, padded - last byte is 27, 28, 0, or 1)
64 | 32 | r (signature component)
96 | 32 | s (signature component, must be ≤ secp256k1_n/2)
Total input length: 128 bytes (padded/truncated to this size)
Offset | Length | Description
-------|--------|-------------
0 | 12 | Zero padding
12 | 20 | Recovered Ethereum address
Total output length: 32 bytes
Returns 32 zero bytes if signature is invalid.
Usage Example
import { execute, PrecompileAddress } from '@tevm/voltaire/precompiles';
import { Hardfork } from '@tevm/voltaire/primitives/Hardfork';
import * as Hex from '@tevm/voltaire/Hex';
// Prepare input (hash || v || r || s)
// Message hash (keccak256 of signed data)
const hash = Hex('0x47173285a8d7341e5e972fc677286384f802f8ef42a5ec5f03bbfa254cb01fad');
// v = 27 (padded to 32 bytes)
const v = Hex('0x000000000000000000000000000000000000000000000000000000000000001b');
// Signature r component
const r = Hex('0x9242685bf161793cc25603c231bc2f568eb630ea16aa137d2664ac8038825608');
// Signature s component
const s = Hex('0x4f8ae3bd7535248d0bd448298cc2e2071e56992d0774dc340c368ae950852ada');
const input = new Uint8Array(128);
input.set(hash, 0);
input.set(v, 32);
input.set(r, 64);
input.set(s, 96);
// Execute precompile
const result = execute(
PrecompileAddress.ECRECOVER,
input,
10000n,
Hardfork.CANCUN
);
if (result.success) {
// Address is in last 20 bytes
const address = result.output.slice(12, 32);
console.log('Recovered address:', address);
console.log('Gas used:', result.gasUsed); // 3000
} else {
console.error('Error:', result.error);
}
Error Conditions
- Out of gas (gasLimit < 3000)
- Invalid v value (not 0, 1, 27, or 28) → returns zero address
- r = 0 or r ≥ secp256k1_n → returns zero address
- s = 0 or s > secp256k1_n/2 → returns zero address (EIP-2)
- Point not on curve → returns zero address
- Invalid signature → returns zero address
Note: Invalid signatures do NOT revert. They return a zero address and consume gas.
Use Cases
- Transaction validation: Ethereum nodes use this to recover sender addresses from transaction signatures
- Signature verification: Smart contracts verify off-chain signed messages (EIP-191, EIP-712)
- Meta-transactions: Contracts validate user signatures for gasless transactions
- Multisig wallets: Verify multiple signers approved a transaction
- Account abstraction: Validate custom signature schemes
Implementation Details
- Zig: Uses secp256k1 public key recovery from crypto module, applies keccak256 to derive address
- TypeScript: Wraps Secp256k1.recoverPublicKey and Keccak256.hash
- Integration: Depends on Secp256k1 and Keccak256 crypto modules
- Security: Enforces EIP-2 malleability protection - rejects s > secp256k1_n/2
- Validation: Checks r and s are in valid range [1, secp256k1_n)
Signature Malleability (EIP-2)
Before EIP-2, signatures had malleability: for every valid signature (r, s, v), there exists another valid signature (r, -s mod n, v’). This allowed attackers to modify transaction signatures without invalidating them.
EIP-2 solved this by requiring s ≤ secp256k1_n/2, where secp256k1_n = 0xFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141. Any signature with s in the upper half is rejected.
Test Vectors
import * as Hex from '@tevm/voltaire/Hex';
// Valid signature recovery
const hash = Hex('0x4747474747474747474747474747474747474747474747474747474747474747');
const v = Hex('0x000000000000000000000000000000000000000000000000000000000000001c');
const r = Hex('0x6969696969696969696969696969696969696969696969696969696969696969');
const s = Hex('0x7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a7a');
// Should recover valid address
// Invalid: s too high (EIP-2 violation)
const s_high = Hex('0x8000000000000000000000000000000000000000000000000000000000000000');
// Should return zero address
// Invalid: v out of range
const v_invalid = Hex('0x000000000000000000000000000000000000000000000000000000000000001d');
// Should return zero address
References
Specifications