A. StarkNet
Cairo VM execution is compiled to AIR, proven with STARKs, recursively aggregated, and settled on Ethereum.
The definitive educational walkthrough of transparent, post-quantum zk-STARK architecture.
Groth16 and PLONK dominate SNARK deployments. STARKs replace trusted setup with transparency and replace pairing assumptions with hash-based security.
This demo walks from AIR traces to FRI folding, then runs a complete educational STARK protocol in the browser over a small field. Toy parameters are clearly labeled and not production secure.
Transparent setup: Groth16 and PLONK rely on trusted setup artifacts. STARKs replace that with public randomness derived from transcript hashing, with no toxic waste ceremony.
Post-quantum conjectured security: pairing-based SNARK assumptions are vulnerable to Shor-style quantum attacks, while STARK security reduces to collision resistance of hash functions plus FRI soundness assumptions.
Scalability profile: STARK provers target quasi-linear behavior in computation size and polylogarithmic verification.
Cost: proof size is much larger. Typical STARK proofs are roughly 45-200KB, while Groth16 can be 128 bytes.
Stack: AIR constraints + FRI low-degree testing + transcript hash commitments.
AIR models computation as a trace of field elements and transition constraints between adjacent rows.
For Fibonacci, row i is (a, b). Constraints: next_a = b and next_b = a + b mod p, with boundary row(0) = (1, 1).
Approximate formula: queries x path length x 32-byte hashes per round.
Recursive STARK aggregation compresses many proofs into one L1-submitted proof. This is central to StarkNet and other rollup stacks.
Fiat-Shamir converts verifier randomness into transcript-derived hash challenges, making the protocol non-interactive in the random oracle model.
Cairo VM execution is compiled to AIR, proven with STARKs, recursively aggregated, and settled on Ethereum.
Application-specific scaling for exchanges and games, including dYdX v3, ImmutableX, and Sorare deployments.
RISC-V zkVM proving general computation with STARK internals, commonly paired with SNARK wrapping for compact on-chain verification.
STARK-based VM with AIR constraints and recursion pipeline for compressed proofs.