skip to Main Content
bitcoin
Bitcoin (BTC) $ 95,684.64 2.70%
ethereum
Ethereum (ETH) $ 3,343.77 3.62%
tether
Tether (USDT) $ 1.00 0.17%
xrp
XRP (XRP) $ 2.17 4.74%
bnb
BNB (BNB) $ 692.10 1.73%
solana
Solana (SOL) $ 188.87 4.46%
dogecoin
Dogecoin (DOGE) $ 0.315305 4.61%
usd-coin
USDC (USDC) $ 1.00 0.25%
staked-ether
Lido Staked Ether (STETH) $ 3,341.98 3.69%
cardano
Cardano (ADA) $ 0.869763 4.63%

zk-STARKs vs. zk-SNARKs explained

You must confirm the subscription in your inbox.”,”subscribe_email_required”:”Email required”,”subscribe_email_invalid”:”A valid email address must be provided. “,”shares”:”Total shares”,”views”:”Total views”,”sponsoredBadge”:”stretch_banners.sponsored.badge”}” :post=”{“id”:90448,”seo_title”:”zk-STARKs vs. zk-SNARKs explained”,”seo_description”:”zk-STARKs and zk-SNARKs are the two most well-known zero-knowledge proof technologies. Learn what they mean and the difference between the two in this guide”,”keywords”:”Blockchain”,”canonical”:”https://cointelegraph.com/explained/zk-starks-vs-zk-snarks-explained”,”thumb”:”https://images.cointelegraph.com/images/1024_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hMzgwMGE2YmQ1ZWUzMzllZWZlYzc5ZjhiOTNkZWNkMy5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/2048_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hMzgwMGE2YmQ1ZWUzMzllZWZlYzc5ZjhiOTNkZWNkMy5qcGc=.jpg”,”youtube”:””,”og_title”:”zk-STARKs vs. zk-SNARKs explained”,”og_description”:”zk-STARKs and zk-SNARKs are the two most well-known zero-knowledge proof technologies. Learn what they mean and the difference between the two in this guide.”,”twitter_title”:”zk-STARKs vs. zk-SNARKs explained”,”twitter_description”:”zk-STARKs and zk-SNARKs are the two most well-known zero-knowledge proof technologies. Learn what they mean and the difference between the two in this guide.”,”published”:”2022-07-25T16:14:00+01:00″,”noindex”:0,”modified”:”2022-07-25T16:21:39+01:00″,”title”:”zk-STARKs vs. zk-SNARKs explained”,”leadtext”:”zk-STARKs and zk-SNARKs are the two most well-known zero-knowledge proof technologies. Learn what they mean and the difference between the two in this guide.”,”amp”:”https://cointelegraph.com/explained/zk-starks-vs-zk-snarks-explained/amp”,”alternates”:[],”alternatesLinks”:[],”url”:”zk-starks-vs-zk-snarks-explained”,”url_full”:”/explained/zk-starks-vs-zk-snarks-explained”,”category”:{“id”:65,”url”:”explained”,”priority”:0,”created”:null,”modified”:null,”parent_id”:0,”is_hidden”:0,”created_at”:”-0001-11-30 00:00:00″,”updated_at”:”2022-02-22 18:25:15″,”deleted_at”:null,”admin_weight”:30,”enabled”:1,”is_blog”:0,”relevant”:0,”category_id”:65,”language_id”:1,”title”:”Explained”,”alt”:””,”keywords”:””,”seo_title”:”Explained: articles for beginners about cryptocurrency and blockchain.”,”description”:”

What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.

rn”,”seo_description”:”What is Bitcoin? How does blockchain work? How to mine cryptocurrency? We are glad to help you answer these questions with our quick guides in Explained section.”},”words_count”:766,”description”:”zk-STARKs and zk-SNARKs are the two most well-known zero-knowledge proof technologies. Learn what they mean and the difference between the two in this guide”,”author”:{“id”:1415,”title”:”Jagjit Singh”,”url”:”jagjit-singh”,”twitter”:””,”google_plus”:””,”photo”:””,”gender”:”male”,”description”:”Jagjit is passionate about the blockchain and crypto space and has been closely following the trends in the crypto space. He’s himself a HODLer, which makes his voice authoritative and his writings an exciting piece of work.”,”facebook”:””,”email”:””,”linkedin”:””,”created_at”:”2021-11-03 12:47:28″,”updated_at”:”2022-06-02 09:53:58″,”deleted_at”:null,”avatar”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2phZ2ppdC1zaW5naA==”,”relativeUrl”:”https://cointelegraph.com/authors/jagjit-singh”,”user_id”:1415,”language_id”:1,”name”:”Jagjit Singh”,”desc”:”Jagjit is passionate about the blockchain and crypto space and has been closely following the trends in the crypto space. He’s himself a HODLer, which makes his voice authoritative and his writings an exciting piece of work.”,”seo_title”:””,”seo_description”:””,”enabled”:1,”show_in_authors”:0,”show_in_experts”:0},”category_id”:65,”audio”:”https://s3.cointelegraph.com/audio/90448.6447b571-31df-4e98-ba75-003d0f990b0e.mp3″,”tags”:[{“name”:”Blockchain”,”uri”:”/tags/blockchain”,”super”:1,”page_title”:”Blockchain News”}],”tag_title”:”Blockchain”,”date”:”29 MINUTES AGO”,”badge”:{“title”:”Explained”,”label”:”default”},”qty”:0,”stats_pixel”:”“,”stats_pixel_url”:”https://zoa.cointelegraph.com/pixel?postId=90448&regionId=1″,”shares”:9,”infographic”:false,”sponsored”:false,”explained”:true,”press_release”:false,”show_referral”:false,”social_description”:”A zero knowledge proof is a cryptographic approach that allows one person to verify a claim made by another without disclosing any supporting information. The two most popular technologies are zk-STARKs and zk-SNARKs, but what makes them stand out?”,”social_translators”:{“clipboard_popup_label”:”Link copied”,”socialWechatFooterError”:”WeChat error”,”socialWechatFooterText”:”WeChat share”,”socialWechatHeaderText”:”WeChat share”},”social_shares”:{“post_id”:90448,”post_url”:”https://cointelegraph.com/explained/zk-starks-vs-zk-snarks-explained”,”post_titles”:{“normal”:”zk-STARKs vs. zk-SNARKs explained”,”twitter”:”zk-STARKs vs. zk-SNARKs explained”},”post_text”:{“normal”:”zk-STARKs vs. zk-SNARKs explained”,”twitter”:”zk-STARKs vs. zk-SNARKs explained https://cointelegraph.com/explained/zk-starks-vs-zk-snarks-explained via @cointelegraph”},”accounts”:{“twitter”:”@cointelegraph”}},”socials”:{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained”,”count”:null,”short”:”fb”,”fa”:”facebook”},”twitter”:{“url”:”https://twitter.com/intent/tweet?text=zk-STARKs+vs.+zk-SNARKs+explained https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained via @cointelegraph”,”count”:null,”short”:”tw”,”fa”:”twitter”},”telegram”:{“url”:”https://telegram.me/share/url?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained &text=zk-STARKs+vs.+zk-SNARKs+explained”,”count”:null,”short”:”tg”,”fa”:”paper-plane”},”whatsapp”:{“url”:”https://api.whatsapp.com/send?text=zk-STARKs+vs.+zk-SNARKs+explained&href=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained”,”count”:null,”short”:”wu”,”fa”:”whatsapp”},”gplus”:{“url”:”https://plus.google.com/share?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained”,”count”:null,”short”:”gplus”,”fa”:”google-plus”},”reddit”:{“url”:”https://www.reddit.com/submit?url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained&title=zk-STARKs+vs.+zk-SNARKs+explained”,”count”:null,”short”:”reddit”,”fa”:”reddit-alien”},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fcointelegraph.com%2Fexplained%2Fzk-starks-vs-zk-snarks-explained&title=zk-STARKs+vs.+zk-SNARKs+explained”,”count”:null,”short”:”li”,”fa”:”linkedin”}},”hide_disclaimer”:false,”elink”:”https://cointelegraph.com”,”etitle”:”Cointelegraph”,”elogo_x2″:”https://images.cointelegraph.com/images/528_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_x1″:”https://images.cointelegraph.com/images/260_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hYjAzYTJhMmNlOWEyMWRjMWYwOTYxZDkxNzMxYzhiYS5wbmc=.png”,”elogo_svg”:false,”content”:[{“id”:3582,”post_id”:90448,”title”:”What is zero-knowledge-proof (ZKP) technology and how does it work?”,”content”:”

ZKPs are cryptographic protocols that, as their name implies, prevent eavesdroppers from accessing data or violating privacy throughout the process.

nn

A zero-knowledge proof (ZKP) is a cryptographic approach that allows one person (the prover) to verify a claim made by another without the prover disclosing any supporting information. You might wonder who invented ZKPs? In the 1980s, Shafi Goldwasser, Silvio Micali and Charles Rackoff of MIT proposed the idea of “zero knowledge technologies.”

nn

A demonstration of zero knowledge must meet the following three requirements:

nn

    nt

  • Completeness/Irrefutability: If the claim is genuine, an honest prover will be persuaded of its integrity by an equally honest verifier (i.e., one correctly following the protocol).
  • nt

  • Soundness: If the claim is untrue, there is only a slim chance that the dishonest prover can persuade the honest verifier that it is. 
  • nt

  • Zero-Knowledge: If the claim is accurate, the only thing the verifier knows is that the claim is valid.
  • n

nn

Before we look at how zero-knowledge proofs work, let’s understand the two types. First are the interactive zero-knowledge proofs, which include repeated interactions between the prover and the verifier. The prover is “challenged” by the verifier to repeatedly demonstrate their knowledge of a fact. The process is repeated until the verifier is confident that the prover is truthful. On the other hand, non-interactive proofs are the antithesis of this process. They demand that the two parties exchange a single transaction that verifies the prover’s veracity just once.

nn

The real-world implementations of ZKPs make use of several cryptographic techniques like Schnorr Non-Interactive Zero Knowledge (NIZK) proof to make it possible to verify a computational statement. The Schnorr NIZK proof enables one to demonstrate familiarity with a discrete logarithm without disclosing its value. Many cryptographic protocols can benefit from using it as a valuable building component to ensure that participants honestly adhere to the protocol’s specifications.

nn

For instance, a payment recipient can use ZKP techniques to confirm that the payer has a sufficient balance in their bank account without learning anything further about the payer’s balance. Therefore, by using ZKPs, the privacy and security of users’ information can be ensured.

nn

Are you curious about whether Bitcoin uses zero-knowledge proofs? The simple answer is that the underlying cryptographic algorithm used by Bitcoin (BTC) is called an Elliptic Curve Digital Signature Algorithm (ECDSA) and does not rely on zero-knowledge methods to ensure increased levels of privacy and security. Digital signatures are most frequently used to sign transactions and send BTC, and ECDSA enables the use of a private key to sign any communication.

nnn”,”created_at”:”2022-07-25 16:16:20″,”updated_at”:”2022-07-25 16:21:41″,”sort”:1,”translations”:{“id”:3575,”explained_post_id”:3582,”title_en”:”What is zero-knowledge-proof (ZKP) technology and how does it work?”,”content_en”:”

ZKPs are cryptographic protocols that, as their name implies, prevent eavesdroppers from accessing data or violating privacy throughout the process.

nn

A zero-knowledge proof (ZKP) is a cryptographic approach that allows one person (the prover) to verify a claim made by another without the prover disclosing any supporting information. You might wonder who invented ZKPs? In the 1980s, Shafi Goldwasser, Silvio Micali and Charles Rackoff of MIT proposed the idea of “zero knowledge technologies.”

nn

A demonstration of zero knowledge must meet the following three requirements:

nn

    nt

  • Completeness/Irrefutability: If the claim is genuine, an honest prover will be persuaded of its integrity by an equally honest verifier (i.e., one correctly following the protocol).
  • nt

  • Soundness: If the claim is untrue, there is only a slim chance that the dishonest prover can persuade the honest verifier that it is. 
  • nt

  • Zero-Knowledge: If the claim is accurate, the only thing the verifier knows is that the claim is valid.
  • n

nn

Before we look at how zero-knowledge proofs work, let’s understand the two types. First are the interactive zero-knowledge proofs, which include repeated interactions between the prover and the verifier. The prover is “challenged” by the verifier to repeatedly demonstrate their knowledge of a fact. The process is repeated until the verifier is confident that the prover is truthful. On the other hand, non-interactive proofs are the antithesis of this process. They demand that the two parties exchange a single transaction that verifies the prover’s veracity just once.

nn

The real-world implementations of ZKPs make use of several cryptographic techniques like Schnorr Non-Interactive Zero Knowledge (NIZK) proof to make it possible to verify a computational statement. The Schnorr NIZK proof enables one to demonstrate familiarity with a discrete logarithm without disclosing its value. Many cryptographic protocols can benefit from using it as a valuable building component to ensure that participants honestly adhere to the protocol’s specifications.

nn

For instance, a payment recipient can use ZKP techniques to confirm that the payer has a sufficient balance in their bank account without learning anything further about the payer’s balance. Therefore, by using ZKPs, the privacy and security of users’ information can be ensured.

nn

Are you curious about whether Bitcoin uses zero-knowledge proofs? The simple answer is that the underlying cryptographic algorithm used by Bitcoin (BTC) is called an Elliptic Curve Digital Signature Algorithm (ECDSA) and does not rely on zero-knowledge methods to ensure increased levels of privacy and security. Digital signatures are most frequently used to sign transactions and send BTC, and ECDSA enables the use of a private key to sign any communication.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-07-25 16:16:20″,”updated_at”:”2022-07-25 16:21:41″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3583,”post_id”:90448,”title”:”What are zk-SNARKs and how do they work?”,”content”:”

The necessity of a trusted setup is one of the zk-SNARKs’ key characteristics. It also requires the creation of cryptographic keys, which serve as the evidence necessary for verification and carrying out confidential transactions.

nn

But what does zk-SNARK stand for? The term “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge,” or “zk-SNARK,” refers to a proof architecture where one can demonstrate ownership of specific knowledge, such as a secret key, without disclosing that knowledge and without interacting with either the prover or the verifier. 

nn

Most cryptocurrencies use a network check to ensure that specific requirements have been met before validating a transaction. The requirements are to verify that the sender has the funds available and that they have supplied the correct private key to prove that the money is theirs.

nn

The transaction’s sender can demonstrate all this using zk-SNARKs without disclosing any addresses or transaction amounts. For example, the blockchain network uses zk-SNARKs to encode a part of its consensus rules to offer this functionality. 

nn

The information that needs to be proven is transformed into equations by zk-SNARKs during the transaction procedure. Without revealing the actual data, these equations can be assessed and solved. So, which coins use zk-SNARKs?

nn

Zcash was applied zk-SNARKs for the first time to demonstrate that a transaction’s requirements can be met without disclosing any significant details about the addresses or values involved. Even though zk-SNARKs don’t have any apparent flaws, someone with the private key needed to set up the protocol could fabricate evidence and create fake money. Therefore, Zk-SNARK-based privacy coins must ensure that no single party has access to the private key.

nnn”,”created_at”:”2022-07-25 16:16:48″,”updated_at”:”2022-07-25 16:21:41″,”sort”:2,”translations”:{“id”:3576,”explained_post_id”:3583,”title_en”:”What are zk-SNARKs and how do they work?”,”content_en”:”

The necessity of a trusted setup is one of the zk-SNARKs’ key characteristics. It also requires the creation of cryptographic keys, which serve as the evidence necessary for verification and carrying out confidential transactions.

nn

But what does zk-SNARK stand for? The term “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge,” or “zk-SNARK,” refers to a proof architecture where one can demonstrate ownership of specific knowledge, such as a secret key, without disclosing that knowledge and without interacting with either the prover or the verifier. 

nn

Most cryptocurrencies use a network check to ensure that specific requirements have been met before validating a transaction. The requirements are to verify that the sender has the funds available and that they have supplied the correct private key to prove that the money is theirs.

nn

The transaction’s sender can demonstrate all this using zk-SNARKs without disclosing any addresses or transaction amounts. For example, the blockchain network uses zk-SNARKs to encode a part of its consensus rules to offer this functionality. 

nn

The information that needs to be proven is transformed into equations by zk-SNARKs during the transaction procedure. Without revealing the actual data, these equations can be assessed and solved. So, which coins use zk-SNARKs?

nn

Zcash was applied zk-SNARKs for the first time to demonstrate that a transaction’s requirements can be met without disclosing any significant details about the addresses or values involved. Even though zk-SNARKs don’t have any apparent flaws, someone with the private key needed to set up the protocol could fabricate evidence and create fake money. Therefore, Zk-SNARK-based privacy coins must ensure that no single party has access to the private key.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-07-25 16:16:48″,”updated_at”:”2022-07-25 16:21:41″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3584,”post_id”:90448,”title”:”What are zk-STARKs and how do they work?”,”content”:”

zk-STARKs are one of the two transparent and scalable privacy-enhancing methods. The public availability of the randomness utilized by the verifier negates the need for a trusted setup.

nn

But, what does zk-STARK stand for? zk-STARK stands for Zero-Knowledge Scalable Transparent Argument of Knowledge, which is a type of cryptographic proof technology. zk-STARKs, also known as zero-knowledge proofs, allow users to communicate validated data or execute computations with a third party without the data or analysis being revealed to the other party.

nn

zk-SNARKs, which were used to build zk-proof systems before the development of zk-STARKs, solved the vulnerability of those trusted parties jeopardizing the system’s privacy because they had to set up the zk-proof system initially. zk-STARKs advance this technology by distancing away from the requirement for a reliable setup.

nn

Moreover, the scalability and privacy issues with permissionless blockchains are improved with STARKs. The present zk-STARK research being conducted by STARK technology pioneer StarkWare Industries is primarily concerned with scalability, with privacy coming later.

nn

By enabling developers to relocate computations and storage off-chain, STARKs increase scalability. STARK proofs that verify the accuracy of off-chain computations can be produced by off-chain services. After that, these proofs are re-posted on the chain so that anyone with interest can verify the computation.

nn

In addition, STARKs enable existing blockchain infrastructure to scale exponentially without compromising computational integrity by off-chaining the majority of computing effort. So, which coins use zk-STARKs?

nn

Layer-2 solutions compute thousands of transactions in a single batch using STARKs, and then use a single STARK proof to confirm their validity on-chain. All of the transactions in the batch share the cost of the on-chain operation, offering a low gas cost for each transaction. Starkware is implementing Zero-Knowledge Scalable Transparent Argument of Knowledge in many blockchains, including the Ethereum blockchain.

nnn”,”created_at”:”2022-07-25 16:17:15″,”updated_at”:”2022-07-25 16:21:41″,”sort”:3,”translations”:{“id”:3577,”explained_post_id”:3584,”title_en”:”What are zk-STARKs and how do they work?”,”content_en”:”

zk-STARKs are one of the two transparent and scalable privacy-enhancing methods. The public availability of the randomness utilized by the verifier negates the need for a trusted setup.

nn

But, what does zk-STARK stand for? zk-STARK stands for Zero-Knowledge Scalable Transparent Argument of Knowledge, which is a type of cryptographic proof technology. zk-STARKs, also known as zero-knowledge proofs, allow users to communicate validated data or execute computations with a third party without the data or analysis being revealed to the other party.

nn

zk-SNARKs, which were used to build zk-proof systems before the development of zk-STARKs, solved the vulnerability of those trusted parties jeopardizing the system’s privacy because they had to set up the zk-proof system initially. zk-STARKs advance this technology by distancing away from the requirement for a reliable setup.

nn

Moreover, the scalability and privacy issues with permissionless blockchains are improved with STARKs. The present zk-STARK research being conducted by STARK technology pioneer StarkWare Industries is primarily concerned with scalability, with privacy coming later.

nn

By enabling developers to relocate computations and storage off-chain, STARKs increase scalability. STARK proofs that verify the accuracy of off-chain computations can be produced by off-chain services. After that, these proofs are re-posted on the chain so that anyone with interest can verify the computation.

nn

In addition, STARKs enable existing blockchain infrastructure to scale exponentially without compromising computational integrity by off-chaining the majority of computing effort. So, which coins use zk-STARKs?

nn

Layer-2 solutions compute thousands of transactions in a single batch using STARKs, and then use a single STARK proof to confirm their validity on-chain. All of the transactions in the batch share the cost of the on-chain operation, offering a low gas cost for each transaction. Starkware is implementing Zero-Knowledge Scalable Transparent Argument of Knowledge in many blockchains, including the Ethereum blockchain.

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-07-25 16:17:15″,”updated_at”:”2022-07-25 16:21:41″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}},{“id”:3585,”post_id”:90448,”title”:”zk-STARKs vs. zk-SNARKs: Main differences”,”content”:”

Both zk-STARKS and zk-SNARKs are types of non-interactive ZKPs. However, they are different from various perspectives, as discussed in the table below:

nn

nn

Based on the above discussion, are STARKs better than SNARKs? zk-STARKs are clearly portrayed favorably in the comparison with zk-SNARKs. Compared to zk-SNARKs, they provide more scalability, transparency and security for the blockchains. However, it is crucial to remember that ZK-STARKs have a larger proof size and take longer to verify.

nn

As a result, zk-SNARKs would have much more support than zk-STARKs if a developer started employing zero-knowledge technologies. Additionally, zk-SNARKs are anticipated to use only 24% of the gas, suggesting that employing zk-SNARKs for transactions would be substantially less expensive for the end user. Also, zk-STARKs are still in the initial phase and have a long time to prove their efficiency to developers and other stakeholders in the blockchain ecosystem.

nn

 

nnn”,”created_at”:”2022-07-25 16:19:25″,”updated_at”:”2022-07-25 16:21:41″,”sort”:4,”translations”:{“id”:3578,”explained_post_id”:3585,”title_en”:”zk-STARKs vs. zk-SNARKs: Main differences”,”content_en”:”

Both zk-STARKS and zk-SNARKs are types of non-interactive ZKPs. However, they are different from various perspectives, as discussed in the table below:

nn

nn

Based on the above discussion, are STARKs better than SNARKs? zk-STARKs are clearly portrayed favorably in the comparison with zk-SNARKs. Compared to zk-SNARKs, they provide more scalability, transparency and security for the blockchains. However, it is crucial to remember that ZK-STARKs have a larger proof size and take longer to verify.

nn

As a result, zk-SNARKs would have much more support than zk-STARKs if a developer started employing zero-knowledge technologies. Additionally, zk-SNARKs are anticipated to use only 24% of the gas, suggesting that employing zk-SNARKs for transactions would be substantially less expensive for the end user. Also, zk-STARKs are still in the initial phase and have a long time to prove their efficiency to developers and other stakeholders in the blockchain ecosystem.

nn

 

nnn”,”title_es”:””,”content_es”:”n”,”title_cn”:””,”content_cn”:”n”,”title_de”:””,”content_de”:”n”,”title_fr”:””,”content_fr”:”n”,”title_it”:””,”content_it”:”n”,”title_ar”:””,”content_ar”:”n”,”title_br”:””,”content_br”:”n”,”title_jp”:””,”content_jp”:”n”,”created_at”:”2022-07-25 16:19:25″,”updated_at”:”2022-07-25 16:21:41″,”title_kr”:””,”content_kr”:”n”,”title_tr”:””,”content_tr”:”n”}}],”is_partner_material”:false,”commentsSection”:{“schemaEntityUrl”:”//cointelegraph.com/explained/zk-starks-vs-zk-snarks-explained”,”list”:[],”amount”:0,”i18n”:{“addComment”:”Add a comment…”,”amountOnePostfix”:”Comment”,”amountPostfix”:”Comments”,”cancel”:”Cancel”,”delete”:”Delete”,”edit”:”Edit”,”errorBig”:”Comment text cannot be longer than 2000 characters”,”errorDuplicate”:”Duplicate comment”,”errorSmall”:”Comment text must be at least 2 characters long”,”hideButton”:”Hide comments”,”noComments”:” “,”commentOnModeration”:”Comment on moderation”,”postComment”:”Post”,”reply”:”Reply”,”showAllComments”:”Show All Comments”,”showButtonPostfix”:”comments”,”showButtonPrefix”:”Show”,”signIn”:”Sign in”,”update”:”Update comment”,”commentWasDeleted”:”This comment has been deleted”}},”related”:[{“id”:86800,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hNDM1NDhjYzJkYmQ4MzI1NzU1MmJkMjZlZWI0MjJmNi5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hNDM1NDhjYzJkYmQ4MzI1NzU1MmJkMjZlZWI0MjJmNi5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hNDM1NDhjYzJkYmQ4MzI1NzU1MmJkMjZlZWI0MjJmNi5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hNDM1NDhjYzJkYmQ4MzI1NzU1MmJkMjZlZWI0MjJmNi5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hNDM1NDhjYzJkYmQ4MzI1NzU1MmJkMjZlZWI0MjJmNi5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9hNDM1NDhjYzJkYmQ4MzI1NzU1MmJkMjZlZWI0MjJmNi5qcGc=.jpg”,”url”:”https://cointelegraph.com/explained/what-is-total-value-locked-tvl-in-crypto-and-why-does-it-matter”,”title”:”What is total value locked (TVL) in crypto and why does it matter?”,”lead”:”DeFi participants must be aware of the total value locked (TVL) indicator.Find out here what it is, how it is calculated and why it matters in DeFi.”,”leadfull”:””,”category_id”:65,”category_url”:”https://cointelegraph.com/explained”,”category_title”:”Explained”,”author_url”:”https://cointelegraph.com/authors/emi-lacapra”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2VtaS1sYWNhcHJh”,”author_title”:”Emi Lacapra”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_female.png”,”date”:”MAY 22, 2022″,”flash_date”:”MAY 22, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:true,”badge”:{“title”:”Explained”,”label”:”default”},”published”:{“date”:”2022-05-22 20:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:443,”rss_date”:”Sun, 22 May 2022 20:00:00 +0100″,”publishedW3″:”2022-05-22T20:00:00+01:00″,”show_referral”:false,”isMagazine”:false},{“id”:89852,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZWU1ZjIzYzFhZDk0ZTgzMzVmMzJiZjlmMmFhNTA5ZC5qcGc=.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZWU1ZjIzYzFhZDk0ZTgzMzVmMzJiZjlmMmFhNTA5ZC5qcGc=.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZWU1ZjIzYzFhZDk0ZTgzMzVmMzJiZjlmMmFhNTA5ZC5qcGc=.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZWU1ZjIzYzFhZDk0ZTgzMzVmMzJiZjlmMmFhNTA5ZC5qcGc=.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZWU1ZjIzYzFhZDk0ZTgzMzVmMzJiZjlmMmFhNTA5ZC5qcGc=.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9kZWU1ZjIzYzFhZDk0ZTgzMzVmMzJiZjlmMmFhNTA5ZC5qcGc=.jpg”,”url”:”https://cointelegraph.com/news/blockchain-based-platform-reinvents-omnichain-interoperability-through-validated-event-data”,”title”:”Blockchain-based platform reinvents omnichain interoperability through validated event data”,”lead”:”Any data that includes time is considered time-stamped, yet, no project until now has thought to use blockchain technology for something far more fundamental: t…”,”leadfull”:””,”category_id”:1,”category_url”:”https://cointelegraph.com/category/fintech”,”category_title”:”Fintech”,”author_url”:”https://cointelegraph.com/authors/sarah-jansen”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL3NhcmFoLWphbnNlbg==”,”author_title”:”Sarah Jansen”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy84N2IwYjRjMzkyZjlhYmM4ZjlhZDNiZTU3Y2FjZGJmZC5qcGc=.jpg”,”date”:”JUL 15, 2022″,”flash_date”:”JUL 15, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Sponsored”,”label”:”default”},”published”:{“date”:”2022-07-15 13:00:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:686,”rss_date”:”Fri, 15 Jul 2022 13:00:00 +0100″,”publishedW3″:”2022-07-15T13:00:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:90388,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzJkNTg2YzAtMWVmMi00NzY5LTk2ODgtM2E0ZWJmNmU0OTIxLmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzJkNTg2YzAtMWVmMi00NzY5LTk2ODgtM2E0ZWJmNmU0OTIxLmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzJkNTg2YzAtMWVmMi00NzY5LTk2ODgtM2E0ZWJmNmU0OTIxLmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzJkNTg2YzAtMWVmMi00NzY5LTk2ODgtM2E0ZWJmNmU0OTIxLmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzJkNTg2YzAtMWVmMi00NzY5LTk2ODgtM2E0ZWJmNmU0OTIxLmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzJkNTg2YzAtMWVmMi00NzY5LTk2ODgtM2E0ZWJmNmU0OTIxLmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/hacker-drains-1-08m-from-audius-following-passing-of-malicious-proposal”,”title”:”Hacker drains $1.08M from Audius following passing of malicious proposal”,”lead”:”A malicious governance proposal (Proposal #85) requesting the transfer of 18 million Audius’ in-house AUDIO tokens worth $6.1 million was approved via an exploi…”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/arijit-sarkar”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2FyaWppdC1zYXJrYXI=”,”author_title”:”Arijit Sarkar”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy8zNDRiYzQ0MWU3OWQyMDE3NTdlOTZmZWQxMTEyYjQxMi5qcGc=.jpg”,”date”:”JUL 24, 2022″,”flash_date”:”JUL 24, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2022-07-24 06:26:42.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:7066,”rss_date”:”Sun, 24 Jul 2022 06:26:42 +0100″,”publishedW3″:”2022-07-24T06:26:42+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:90393,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvY2ZhZmI4ZGUtNTBjMy00NDQ2LWExNWQtODRhNzU5NmQyYzI4LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvY2ZhZmI4ZGUtNTBjMy00NDQ2LWExNWQtODRhNzU5NmQyYzI4LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvY2ZhZmI4ZGUtNTBjMy00NDQ2LWExNWQtODRhNzU5NmQyYzI4LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvY2ZhZmI4ZGUtNTBjMy00NDQ2LWExNWQtODRhNzU5NmQyYzI4LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvY2ZhZmI4ZGUtNTBjMy00NDQ2LWExNWQtODRhNzU5NmQyYzI4LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvY2ZhZmI4ZGUtNTBjMy00NDQ2LWExNWQtODRhNzU5NmQyYzI4LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/the-merge-is-ethereum-s-chance-to-take-over-bitcoin-researcher-says”,”title”:”The Merge is Ethereum’s chance to take over Bitcoin, researcher says”,”lead”:”Ethereum’s imminent transition to a proof-of-stake consensus mechanism will transform its monetary policy, potentially making ETH more scarce than Bitcoin.”,”leadfull”:””,”category_id”:86,”category_url”:”https://cointelegraph.com/category/interview”,”category_title”:”Interview”,”author_url”:”https://cointelegraph.com/authors/ed-felten”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2VkLWZlbHRlbg==”,”author_title”:”Ed Felten”,”author_img”:”https://cointelegraph.com/assets/img/icons/author_male.jpg”,”date”:”23 HOURS AGO”,”flash_date”:”JUL 24, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Video”,”label”:”success”},”published”:{“date”:”2022-07-24 17:30:00.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:18107,”rss_date”:”Sun, 24 Jul 2022 17:30:00 +0100″,”publishedW3″:”2022-07-24T17:30:00+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:90410,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvYjgzODNjNGUtMjc5My00MGUwLTgxODYtMzNlMjUxNjBlN2NlLkpQRw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvYjgzODNjNGUtMjc5My00MGUwLTgxODYtMzNlMjUxNjBlN2NlLkpQRw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvYjgzODNjNGUtMjc5My00MGUwLTgxODYtMzNlMjUxNjBlN2NlLkpQRw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvYjgzODNjNGUtMjc5My00MGUwLTgxODYtMzNlMjUxNjBlN2NlLkpQRw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvYjgzODNjNGUtMjc5My00MGUwLTgxODYtMzNlMjUxNjBlN2NlLkpQRw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvYjgzODNjNGUtMjc5My00MGUwLTgxODYtMzNlMjUxNjBlN2NlLkpQRw==.jpg”,”url”:”https://cointelegraph.com/news/experts-clash-on-where-virtual-reality-sits-in-the-metaverse”,”title”:”Experts clash on where virtual reality sits in the Metaverse”,”lead”:”Experts have given mixed views on what role virtual reality technology will have in the Metaverse.”,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/brian-newar”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2JyaWFuLW5ld2Fy”,”author_title”:”Brian Newar”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9mNGNlMjkxNTliODY0YmIyZTdlN2M4NzliNWY5YjcyMS5qcGc=.jpg”,”date”:”9 HOURS AGO”,”flash_date”:”JUL 25, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”News”,”label”:”default”},”published”:{“date”:”2022-07-25 07:12:57.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1245,”rss_date”:”Mon, 25 Jul 2022 07:12:57 +0100″,”publishedW3″:”2022-07-25T07:12:57+01:00″,”show_referral”:true,”isMagazine”:false},{“id”:90420,”retina”:”https://images.cointelegraph.com/images/1480_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzcyMmQ1NjgtNTdmMS00ZDY5LThlMWItZjE1OTNlZDE1MjU0LmpwZw==.jpg”,”img”:”https://images.cointelegraph.com/images/740_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzcyMmQ1NjgtNTdmMS00ZDY5LThlMWItZjE1OTNlZDE1MjU0LmpwZw==.jpg”,”thumb”:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzcyMmQ1NjgtNTdmMS00ZDY5LThlMWItZjE1OTNlZDE1MjU0LmpwZw==.jpg”,”thumb370″:”https://images.cointelegraph.com/images/370_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzcyMmQ1NjgtNTdmMS00ZDY5LThlMWItZjE1OTNlZDE1MjU0LmpwZw==.jpg”,”amp_thumb”:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzcyMmQ1NjgtNTdmMS00ZDY5LThlMWItZjE1OTNlZDE1MjU0LmpwZw==.jpg”,”thumb150″:”https://images.cointelegraph.com/images/150_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS91cGxvYWRzLzIwMjItMDcvNzcyMmQ1NjgtNTdmMS00ZDY5LThlMWItZjE1OTNlZDE1MjU0LmpwZw==.jpg”,”url”:”https://cointelegraph.com/news/the-best-bear-market-plan-relentless-optimism-for-the-future-says-fintech-ceo”,”title”:”The best bear market plan? ‘Relentless optimism for the future,’ says fintech CEO”,”lead”:”Paystand CEO Jeremy Almond said that companies must be resilient and optimistic about the world that they are creating. “,”leadfull”:””,”category_id”:2,”category_url”:”https://cointelegraph.com/category/latest-news”,”category_title”:”Latest News”,”author_url”:”https://cointelegraph.com/authors/ezra-reguerra”,”author_hash”:”aHR0cHM6Ly9jb2ludGVsZWdyYXBoLmNvbS9hdXRob3JzL2V6cmEtcmVndWVycmE=”,”author_title”:”Ezra Reguerra”,”author_img”:”https://images.cointelegraph.com/images/32_aHR0cHM6Ly9zMy5jb2ludGVsZWdyYXBoLmNvbS9zdG9yYWdlL3VwbG9hZHMvdmlldy9iM2YxOTZjYTA4ZGI5MzhkNjkxZWU3NzY5OWFhZjRmZi5qcGc=.jpg”,”date”:”6 HOURS AGO”,”flash_date”:”JUL 25, 2022″,”sponsored”:false,”press_release”:false,”sponsored_label”:”Sponsored”,”explained”:false,”badge”:{“title”:”Interview”,”label”:”default”},”published”:{“date”:”2022-07-25 10:26:18.000000″,”timezone_type”:3,”timezone”:”Europe/London”},”stat_uniqs”:1351,”rss_date”:”Mon, 25 Jul 2022 10:26:18 +0100″,”publishedW3″:”2022-07-25T10:26:18+01:00″,”show_referral”:true,”isMagazine”:false}]}” :shares=”{“facebook”:{“url”:”https://www.facebook.com/sharer/sharer.php?u=%URL%”,”icon”:”facebook”,”title”:”Facebook”,”sizesAllowed”:[{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”xs”,”label”:”Smartphones”,”breakpoint”:”> 480px”},{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"}],"position":1,"status":true},"twitter":{"url":"https://twitter.com/intent/tweet?text=%TEXT%","icon":"twitter","title":"Twitter","position":2,"status":true,"sizesAllowed":[{"size":"xxs","label":"Extra small devices","breakpoint":"< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”telegram”:{“url”:”https://t.me/share/url?url=%URL%&text=%TEXT%”,”icon”:”telegram”,”title”:”Telegram”,”position”:3,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”linkedin”:{“url”:”https://www.linkedin.com/shareArticle?mini=true&url=%URL%&title=%TITLE%”,”icon”:”linked-in”,”title”:”LinkedIn”,”position”:5,”status”:true,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}]},”copy”:{“url”:”%URL%”,”icon”:”copy”,”position”:7,”title”:”Copy Link”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”status”:true},”whatsapp”:{“url”:”https://wa.me/?text=%TITLE% %URL%”,”icon”:”whats-app”,”title”:”Whatsapp”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:6,”status”:true},”reddit”:{“url”:”https://www.reddit.com/submit?url=%URL%&title=%TITLE%”,”icon”:”reddit”,”title”:”Reddit”,”sizesAllowed”:[{“size”:”xxs”,”label”:”Extra small devices”,”breakpoint”:”< 480px"},{"size":"xs","label":"Smartphones","breakpoint":"> 480px”},{“size”:”sm”,”label”:”Small tablets”,”breakpoint”:”> 768px”},{“size”:”md”,”label”:”Medium devices”,”breakpoint”:”> 992px”},{“size”:”lg”,”label”:”Large devices”,”breakpoint”:”> 1200px”}],”position”:4,”status”:true}}” is=”ExplainedPostPage”>

ZKPs are cryptographic protocols that, as their name implies, prevent eavesdroppers from accessing data or violating privacy throughout the process.

A zero-knowledge proof (ZKP) is a cryptographic approach that allows one person (the prover) to verify a claim made by another without the prover disclosing any supporting information. You might wonder who invented ZKPs? In the 1980s, Shafi Goldwasser, Silvio Micali and Charles Rackoff of MIT proposed the idea of “zero knowledge technologies.”

A demonstration of zero knowledge must meet the following three requirements:

  • Completeness/Irrefutability: If the claim is genuine, an honest prover will be persuaded of its integrity by an equally honest verifier (i.e., one correctly following the protocol).
  • Soundness: If the claim is untrue, there is only a slim chance that the dishonest prover can persuade the honest verifier that it is. 
  • Zero-Knowledge: If the claim is accurate, the only thing the verifier knows is that the claim is valid.

Before we look at how zero-knowledge proofs work, let’s understand the two types. First are the interactive zero-knowledge proofs, which include repeated interactions between the prover and the verifier. The prover is “challenged” by the verifier to repeatedly demonstrate their knowledge of a fact. The process is repeated until the verifier is confident that the prover is truthful. On the other hand, non-interactive proofs are the antithesis of this process. They demand that the two parties exchange a single transaction that verifies the prover’s veracity just once.

The real-world implementations of ZKPs make use of several cryptographic techniques like Schnorr Non-Interactive Zero Knowledge (NIZK) proof to make it possible to verify a computational statement. The Schnorr NIZK proof enables one to demonstrate familiarity with a discrete logarithm without disclosing its value. Many cryptographic protocols can benefit from using it as a valuable building component to ensure that participants honestly adhere to the protocol’s specifications.

For instance, a payment recipient can use ZKP techniques to confirm that the payer has a sufficient balance in their bank account without learning anything further about the payer’s balance. Therefore, by using ZKPs, the privacy and security of users’ information can be ensured.

Are you curious about whether Bitcoin uses zero-knowledge proofs? The simple answer is that the underlying cryptographic algorithm used by Bitcoin (BTC) is called an Elliptic Curve Digital Signature Algorithm (ECDSA) and does not rely on zero-knowledge methods to ensure increased levels of privacy and security. Digital signatures are most frequently used to sign transactions and send BTC, and ECDSA enables the use of a private key to sign any communication.

The necessity of a trusted setup is one of the zk-SNARKs’ key characteristics. It also requires the creation of cryptographic keys, which serve as the evidence necessary for verification and carrying out confidential transactions.

But what does zk-SNARK stand for? The term “Zero-Knowledge Succinct Non-Interactive Argument of Knowledge,” or “zk-SNARK,” refers to a proof architecture where one can demonstrate ownership of specific knowledge, such as a secret key, without disclosing that knowledge and without interacting with either the prover or the verifier. 

Most cryptocurrencies use a network check to ensure that specific requirements have been met before validating a transaction. The requirements are to verify that the sender has the funds available and that they have supplied the correct private key to prove that the money is theirs.

The transaction’s sender can demonstrate all this using zk-SNARKs without disclosing any addresses or transaction amounts. For example, the blockchain network uses zk-SNARKs to encode a part of its consensus rules to offer this functionality. 

The information that needs to be proven is transformed into equations by zk-SNARKs during the transaction procedure. Without revealing the actual data, these equations can be assessed and solved. So, which coins use zk-SNARKs?

Zcash was applied zk-SNARKs for the first time to demonstrate that a transaction’s requirements can be met without disclosing any significant details about the addresses or values involved. Even though zk-SNARKs don’t have any apparent flaws, someone with the private key needed to set up the protocol could fabricate evidence and create fake money. Therefore, Zk-SNARK-based privacy coins must ensure that no single party has access to the private key.

zk-STARKs are one of the two transparent and scalable privacy-enhancing methods. The public availability of the randomness utilized by the verifier negates the need for a trusted setup.

But, what does zk-STARK stand for? zk-STARK stands for Zero-Knowledge Scalable Transparent Argument of Knowledge, which is a type of cryptographic proof technology. zk-STARKs, also known as zero-knowledge proofs, allow users to communicate validated data or execute computations with a third party without the data or analysis being revealed to the other party.

zk-SNARKs, which were used to build zk-proof systems before the development of zk-STARKs, solved the vulnerability of those trusted parties jeopardizing the system’s privacy because they had to set up the zk-proof system initially. zk-STARKs advance this technology by distancing away from the requirement for a reliable setup.

Moreover, the scalability and privacy issues with permissionless blockchains are improved with STARKs. The present zk-STARK research being conducted by STARK technology pioneer StarkWare Industries is primarily concerned with scalability, with privacy coming later.

By enabling developers to relocate computations and storage off-chain, STARKs increase scalability. STARK proofs that verify the accuracy of off-chain computations can be produced by off-chain services. After that, these proofs are re-posted on the chain so that anyone with interest can verify the computation.

In addition, STARKs enable existing blockchain infrastructure to scale exponentially without compromising computational integrity by off-chaining the majority of computing effort. So, which coins use zk-STARKs?

Layer-2 solutions compute thousands of transactions in a single batch using STARKs, and then use a single STARK proof to confirm their validity on-chain. All of the transactions in the batch share the cost of the on-chain operation, offering a low gas cost for each transaction. Starkware is implementing Zero-Knowledge Scalable Transparent Argument of Knowledge in many blockchains, including the Ethereum blockchain.

Both zk-STARKS and zk-SNARKs are types of non-interactive ZKPs. However, they are different from various perspectives, as discussed in the table below:

Based on the above discussion, are STARKs better than SNARKs? zk-STARKs are clearly portrayed favorably in the comparison with zk-SNARKs. Compared to zk-SNARKs, they provide more scalability, transparency and security for the blockchains. However, it is crucial to remember that ZK-STARKs have a larger proof size and take longer to verify.

As a result, zk-SNARKs would have much more support than zk-STARKs if a developer started employing zero-knowledge technologies. Additionally, zk-SNARKs are anticipated to use only 24% of the gas, suggesting that employing zk-SNARKs for transactions would be substantially less expensive for the end user. Also, zk-STARKs are still in the initial phase and have a long time to prove their efficiency to developers and other stakeholders in the blockchain ecosystem.

 

Loading data ...
Comparison
View chart compare
View table compare
Back To Top