
Sin7Y Tech Review (28): Specification for Marlin
Details of this review can be found in Sin7Y’s HackMD channel. About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, autonomous payment solutions, etc. And you can find us here: GitHub | Twitter | Telegram | Medium | Mirror | HackMD | HackerNoon
Sin7Y Tech Review (24): The Stark Proof System of Miden V1
Miden is a stark technology-based ZKVM implementation solution. In its basic layer, the stark proof is generated based on the ZKP library and the proof will be verified.* Details of this review can be found in Sin7Y’s HackMD channel.* About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, a...
Sin7Y Tech Review (20): Halo2 Circuit Development
In the previous article, we discussed using halo2 for circuit development. This article will illustrate what we need to pay attention to when developing circuits. When writing this article, we referred to the halo2 code, version f9b3ff2aef09a5a3cb5489d0e7e747e9523d2e6e. Before we begin, let’s review the most critical content, namely the circuit definition. The halo2 circuit development consists of two critical functions: configure and synthesize. The former establishes the gate and defines th...
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry.

Sin7Y Tech Review (28): Specification for Marlin
Details of this review can be found in Sin7Y’s HackMD channel. About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, autonomous payment solutions, etc. And you can find us here: GitHub | Twitter | Telegram | Medium | Mirror | HackMD | HackerNoon
Sin7Y Tech Review (24): The Stark Proof System of Miden V1
Miden is a stark technology-based ZKVM implementation solution. In its basic layer, the stark proof is generated based on the ZKP library and the proof will be verified.* Details of this review can be found in Sin7Y’s HackMD channel.* About us Founded in 2021 and powered by top-notch blockchain developers, Sin7Y is a project incubator and blockchain technology research team that explores the most important and cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, a...
Sin7Y Tech Review (20): Halo2 Circuit Development
In the previous article, we discussed using halo2 for circuit development. This article will illustrate what we need to pay attention to when developing circuits. When writing this article, we referred to the halo2 code, version f9b3ff2aef09a5a3cb5489d0e7e747e9523d2e6e. Before we begin, let’s review the most critical content, namely the circuit definition. The halo2 circuit development consists of two critical functions: configure and synthesize. The former establishes the gate and defines th...
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry.

Subscribe to Sin7Y

Subscribe to Sin7Y
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers

Summary:
For the FRI protocol, the complexity of the verification satisfies the logarithmic relationship. The algorithm ensures that the round consistency verifications can be passed if and only if the initial polynomial satisfies . The actual implementation may vary slightly. For more information, please refer to the DEEP-FRI paper. In comparison to FRI, DEEP-FRI increases the system’s reliability while maintaining an optimal level of proof and verification complexity.
The ZK-STARK algorithm can be summarized as follows:
1. The algorithm is divided into two parts: Arithmeticalization and LDT.
2. Arithmeticalization converts the issue to polynomial equality and polynomial LDT issue.
3. The FRI protocol is used in the LDT stage to ensure the complexity of linear proof and the complexity of logarithmic verification
4. The zero-knowledge attribute ensures that the verifier cannot access the points in the trajectory polynomial and that the trajectory polynomial contains privacy values.
5. Simultaneously, to ensure the zero-knowledge attribute, random values for rows must be added to the trajectory polynomial, which is determined by the verifier and prover after negotiation.
6. CRS is not required as a third party throughout the process.
7. The entire process does not depend on any mathematical problems.
Details of this article can be found in Sin7Y’s HackMD channel.
About Sin7Y
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry. Powered by top-notch blockchain developers, Sin7Y analyzes the most cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, and autonomous payment solutions, etc.
Follow Us
Twitter: https://twitter.com/Sin7Y_Labs
Medium: http://medium.com/@sin7y

Summary:
For the FRI protocol, the complexity of the verification satisfies the logarithmic relationship. The algorithm ensures that the round consistency verifications can be passed if and only if the initial polynomial satisfies . The actual implementation may vary slightly. For more information, please refer to the DEEP-FRI paper. In comparison to FRI, DEEP-FRI increases the system’s reliability while maintaining an optimal level of proof and verification complexity.
The ZK-STARK algorithm can be summarized as follows:
1. The algorithm is divided into two parts: Arithmeticalization and LDT.
2. Arithmeticalization converts the issue to polynomial equality and polynomial LDT issue.
3. The FRI protocol is used in the LDT stage to ensure the complexity of linear proof and the complexity of logarithmic verification
4. The zero-knowledge attribute ensures that the verifier cannot access the points in the trajectory polynomial and that the trajectory polynomial contains privacy values.
5. Simultaneously, to ensure the zero-knowledge attribute, random values for rows must be added to the trajectory polynomial, which is determined by the verifier and prover after negotiation.
6. CRS is not required as a third party throughout the process.
7. The entire process does not depend on any mathematical problems.
Details of this article can be found in Sin7Y’s HackMD channel.
About Sin7Y
Sin7Y is a research community dedicated to delivering insightful research reports and technical reviews of the crypto industry. Powered by top-notch blockchain developers, Sin7Y analyzes the most cutting-edge technologies, including EVM, Layer2, cross-chain, privacy computing, and autonomous payment solutions, etc.
Follow Us
Twitter: https://twitter.com/Sin7Y_Labs
Medium: http://medium.com/@sin7y
No activity yet