Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
  79. 79. Typical vulnerabilities and bridge security in blockchain technology
Lesson 44 of 79
In Progress

44. What is StarkWare, and recursive validity proofs

The demand for cryptocurrency technologies continues to grow. Not surprisingly, the bar is quite high for most projects, especially those that are new to the market. New projects also have to deal with a number of issues, such as transaction speed, cost, and time to validate transactions.

This poses serious problems for the usability of these projects, but also offers room for improvement when it comes to solving the problems mentioned above. Typically, blockchains and Layer 2 solutions offer such tools. One such project is StarkWare, a Layer 2 solution for the Ethereum network.

StarkWare – what is it?

StarkWare is an Israeli company that builds Layer 2 blockchains on top of Ethereum. To do so, it uses Zk- STARK (Zero-Knowedgle Scable Transparent Arguments from Knowedgle). The main goal of the company and the ZK-STARK technology is to improve the scalability and privacy of blockchains like Ethereum.

ZK- STARK was entirely invented by StarkWare. In terms of how it works, it is very similar to ZK-Sync or optimistic rollups. The difference is that ZK-STARK rolls up transactions in batches to prove the validity of the transactions in question using cryptographic evidence.

ZK- STARK is a highly scalable and transparent cryptographic proof that uses a faster and more scalable proof system. It also uses fewer cryptographic assumptions, which the company describes as more secure.

StarkWare has thus developed a technology that allows one party to prove to another that it has certain information without having to disclose that information. In practise, this means that Party A can prove to Party B that it has a cryptocurrency account at Kanga Exchange with a certain amount of cryptocurrencies without revealing the details of that account.

To achieve its goals, StarkWare has developed and is constantly improving its two main products: StarkNet and StarkEx.

ZK-STARK has evolved!

Previously, scaling with ZK-STARK was done by aggregating tens or even hundreds of thousands of transactions into a single proof. This was then stored on Ethereum. With recursive proofs, the whole process has been improved and accelerated. Such an individual proof can now be wrapped into one. What does this mean for the cryptocurrency industry? A big increase in Layer 2 scaling performance with ZK-STARK. You will multiply the number of transactions that can be written in Ethereum with just one proof.

Recursive proofs are enabled by Cairo computations. They are already used in a number of applications that are precisely based on Cairo. We are talking here about applications that run on StarkEx and StarkNet.

What are recursive identity cards?

In the proofs of STARK the time taken to prove a given proposition was approximately equal to the time taken to establish the proposition. So if it takes T time to prove a theorem, it takes log(T) to verify the proof. So with STARK, we spend less time verifying a theorem than computing it.

Cairo simplifies this process and allows us to formulate general computational theorems that can be proved by STARK and verified by appropriate STARK verifiers. At this stage, the possibility of performing recursion also emerges. Just as we write Cairo proving the correctness of thousands of transactions, we can write it to verify multiple STARK proofs. We can also generate a single proof that verifies the validity of multiple proofs simultaneously. This is what we call recursive identity proofs.

Advantages of recursive ID cards

  1. Lower cost of on-chain verification. And all because we can combine multiple pieces of evidence into one from the beginning. So we have lower on-chain verification costs per transaction. And let us not forget that each assertion can contain many of them.
  2. They remove the barrier of computational resources such as memory. Previously, this limited the size of the proofs. Now, with recursion, the size of resources is unlimited and the cost per transaction is reduced.
  3. Reduces delays in proving large assertion sequences.
  4. Facilitating development for Layer 3. Recursive IDs can be used to build L3 implementations on the public Layer 2 StarkNet.

Cairo and SHARP

Cairo first appeared on the mainnet Ethereum network in 2020. It stands for CPU Algebraic Intermediate Representation (AIR). It opens the door to encoding proofs for more complex logic, arbitrary computational assertions, but also in a faster and more secure way. The Cairo programme can also prove the execution of logic in a single application.

SHARP, on the other hand, takes transactions from several  applications and proves them in a single STARK proof. Applications running on SHARP merge their transaction stacks faster, filling STARK -proof capacity faster.

A few words about StarkNet and StarkEx

StarkNet is a decentralized ZK rollup running as a Layer 2 chain on Ethereum. It is permission-free and fully decentralized. It also uses zero-knowledge technology in its operation. StarkNet ensures that all transactions are rolled up (“rolled in”) on the network. They are then validated by ZK-STARK proofs and later by Ethereum. During this process, gas fees are saved as the transactions are sent and verified outside the Ethereum chain. This solution is better in terms of scalability and speed.

StarkEx is also a Tier 2 solution, except that it has permissions and is therefore tailored to the needs of specific dApps. Most of them are closely related to the world of DeFi. We are talking about dYdY, Immutable X or DeversiFi, for example. StarkEx is often seen as a legitimate and centralized version of StarkNet. Thus, it can be used by different protocols. StarkEx currently supports the Ethereum network as well as the token standards ETH -20, ETH -721 and ETH -1155 and has the ability to support tokens on other blockchains that are compatible with the Ethereum Virtual Machine.

Summary

The recursive ID cards now support multiple protocols. More will be added over time as they enable new improvements, such as lower gas costs or better scalability. They will also unlock access to new capabilities such as L3 and applicative-recursion. The optimization of these proofs is still ongoing, so we can expect even better performance and lower costs in the future.

Complete the lesson!

What is the Ethereum Virtual Machine (EVM)

What is ZK-SNARK and ZK-STARK proof?