Sin7Y Tech Review (18): Zero-Knowledge Proof Algorithm: ZK-Stark — FRI Protocol

Summary:

For the FRI protocol, the complexity of the verification satisfies the logarithmic relationship. The algorithm ensures that the round consistency verifications can be passed if and only if the initial polynomial satisfies . The actual implementation may vary slightly. For more information, please refer to the DEEP-FRI paper. In comparison to FRI, DEEP-FRI increases the system’s reliability while maintaining an optimal level of proof and verification complexity.

The ZK-STARK algorithm can be summarized as follows:

1. The algorithm is divided into two parts: Arithmeticalization and LDT.

2. Arithmeticalization converts the issue to polynomial equality and polynomial LDT issue.

3. The FRI protocol is used in the LDT stage to ensure the complexity of linear proof and the complexity of logarithmic verification

4. The zero-knowledge attribute ensures that the verifier cannot access the points in the trajectory polynomial and that the trajectory polynomial contains privacy values.

5. Simultaneously, to ensure the zero-knowledge attribute, random values for rows must be added to the trajectory polynomial, which is determined by the verifier and prover after negotiation.

6. CRS is not required as a third party throughout the process.

7. The entire process does not depend on any mathematical problems.

Details of this article can be found in Sin7Y’s HackMD channel.


About Sin7Y

Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry. Powered by top-notch blockchain developers, Sin7Y analyzes the most cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, and autonomous payment solutions, etc.

Follow Us

Twitter: https://twitter.com/Sin7Y_Labs

Medium: http://medium.com/@sin7y

Subscribe to Sin7Y
Receive the latest updates directly to your inbox.
Verification
This entry has been permanently stored onchain and signed by its creator.