Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
  80. 80. JumpNet - Ethereum's new sidechain
Lesson 5 of 80
In Progress

5. What is Zk-SNARK and Zk-STARK? 

Zk-SNARK (Zero-Knowedgle Succinct Non-Interactive Argument of Knowledge) 

This is a new type of privacy proof. Cryptography is constantly evolving, and with it consensus algorithms that can be used to provide data privacy. Each of these algorithms has its own advantages and disadvantages, as well as how to use them. In today’s lesson, we will look at these two proofs of concept. 

Despite appearances, the proof is not as complicated as it sounds. Literally, it is a ‘proof with zero knowledge‘ protocol. Zero-knowledge proofs are very fascinating. Using it, we have to prove that we have some information without revealing the information itself. So, we have two participants in the protocol: the prover (proover) and the verifier (verifier). The prover has to prove to the verifier in a certain way that it has information y, without sharing this information. 

The ZK-SNARK protocol does not require continuous communication or conversation between the prover and verifier. It works based on complex mathematical operations. Are you familiar with the high school proofs we used to prove in maths class? Recall them, as they will be essential here. Proofs with zero knowledge use: 

Homomorphic functions

Blind evaluation

The Knoweldge of Coefficient Test (KC) and the Knowledge of Coefficient Assumption (KCA). 

Verifiable blind evaluation protocol

Quadratic Arithmetic Program

Pinocchio’s protocol

Furthermore, zk-SNARK requires elliptic curve cryptography. ECC is a cryptography method that relies on the properties of elliptic curves to create fully secure cryptographic keys. These keys are used to encrypt and decrypt data, which increases security. Definitely, the use of ECC is more secure than RSA, if only because of its resistance to brute-force attacks. The term zk-SNARK was first used in 2012 by Professor Alessandro Chiesa

How does zk-SNARK work? 

The protocol is based on a trusted configuration using the above mathematical assumptions.  Zk-SNARK allows users to send transactions on the blockchain in a completely encrypted way. This means that transactions have taken place completely legitimately, but no one can read them. The most popular platform using this algorithm is ZCash. Therefore, today we will use its example. As we have already discussed, zero-knowledge algorithms allow you to prove that statement X is true, without revealing information about the statement. This is accurately what happens when two people transact using this network. With zk-SNARK, we can see that the sender has the funds, but we cannot see how much or where he wants to send it. Nor do we know his address. Furthermore, such a transaction cannot be modified by a third party. For such transactions to work, they must meet certain conditions. E.g. ZCash engages users through ‘meet’ and ‘cancelant’. In effect, the person who would like to send funds via ZCash says “Look how many funds I have!”, without revealing his balance, and the verifier confirms “This was the amount promised to the recipient”. 

Zk-STARK (Zero-Knowledge Scalable Transparent ARguments of Knowedgle) 

This is also cryptographic proof. Its definition is – zk-STARK provides the ability to share verified data or perform calculations with a third party, without revealing the data to that party. At the same time, it is publicly verifiable. What does this mean in practice? ZK-STARK allows you to verify the banking information of your future business counterparty, without having to disclose your confidential information.

Zk-STARK – how does it work? 

The protocol moves computation and storage off the blockchain. Therefore, it improves its scalability and privacy. Services performed outside the blockchain can generate STARK proofs, which simultaneously certify the integrity of off-chain computations. The proofs thus made are then placed back on the blockchain so that any interested party can validate the computation made (proof). As we have already mentioned, zk-STARK is publicly verifiable.  This type of zero proof focuses first on scalability and only later on privacy. The pioneer among the work on this technology is StarkWare Industries

Zk-SNARK vs Zk-STARK 

Zk-SNARK requires trusted keys, while zk-STARK is publicly verifiable.

Zk-SNARK are not fast and scalable in terms of computation size. 

∙ Zk-SNARK are very vulnerable to attacks from quantum computers due to the use of cryptography in their operation. 

∙ Zk-SNARK is more popular, especially in the current era. 

∙ Zk-STARK is based on hash functions, which are more difficult to break. They also do not require a trusted configuration. 

∙ In the zk-STARK protocol, proof verification takes longer due to its larger size.

∙ Zk-SNARK is easier to implement. 

Summary 

Both zero-knowledge proofs are powerful tools. They can improve the scalability of blockchain networks, as we have already mentioned, but they also have their drawbacks.  Such encrypted transactions taking place in the ZCash ecosystem, for example, can contribute to money laundering or terrorist financing. There are always two sides to every modern solution. 

Purchase your favorite tokens on Kanga Exchange