Home

zkSTARKs

zk-STARKs, or zero-knowledge scalable transparent arguments of knowledge, are a type of cryptographic proof system designed to allow a prover to convince a verifier that a computation was carried out correctly without revealing any sensitive information, with verification costs that scale favorably to large computations. They are transparent in the sense that they do not require a trusted setup, and they are post-quantum secure because their security rests on cryptographic hash functions rather than on discrete mathematics that are vulnerable to quantum attacks. They are scalable because the verifier's workload is polylogarithmic in the size of the computation, and the proofs themselves can be generated for very large computations.

Construction overview: Given a computation, the prover encodes the execution trace into algebraic constraints and then

Applications and status: zk-STARKs have been proposed and implemented for verifiable computation and blockchain scaling, notably

expresses
these
constraints
as
low-degree
polynomials
over
a
finite
field.
Using
low-degree
extensions
and
algebraic
techniques,
the
prover
commits
to
these
polynomials
and
produces
a
proof
that
certain
polynomial
identities
hold.
A
proximity
check,
typically
via
the
Fast
Reed-Solomon
Interactive
Oracle
Proof
of
Proximity
(FRI),
certifies
that
the
purported
polynomials
are
indeed
low-degree
and
consistent
across
evaluations.
The
verifier
samples
a
small
number
of
points
and
checks
the
identities,
providing
strong
probabilistic
guarantees.
Non-interactivity
is
achieved
by
applying
the
Fiat-Shamir
heuristic
to
the
underlying
interactive
protocol,
yielding
a
single
public,
non-interactive
proof.
in
StarkWare’s
systems
for
throughput
improvements
and
layer-2
solutions.
They
are
valued
for
post-quantum
security
and
the
absence
of
a
trusted
setup,
at
the
cost
of
larger
proof
sizes
and
more
intensive
prover
work
compared
to
some
SNARK-based
systems.
As
a
research
area,
zk-STARKs
continue
to
evolve
with
improvements
in
FRI
efficiency
and
practical
implementations.