Warning
This research implementation of a STARK proving system is not yet secure and under heavy development.
Do not use this in production or your will CERTAINLY get compromized.
No audits, no guarantees provided, use at own risk.
Welcome to Toyni! This is an implementation of a STARK (Scalable Transparent Argument of Knowledge) proving system in Rust. While it's not yet a full zero-knowledge STARK, it provides a solid foundation for understanding how STARKs work.
- For each randomly sampled point
x
:- Verifier checks:
Q(x) * Z(x) == C(x)
- Ensures that the execution trace satisfies all constraints
- This check is done once per point
- Not done across layers
- Merkle proof is optional (depends on how C(x) and Q(x) are committed)
- Verifier checks:
-
Purpose: Prove that
Q(x)
is a low-degree polynomial -
Process:
- Start with evaluations of
Q(x)
over the domain (Layer 0) - Recursively apply
fri_fold()
to reduce degree at each layer - At each layer:
- Verifier checks Merkle proofs for sampled values
- Verifies that folding is consistent with previous layer
- Final layer should be constant or degree-1, checked directly
- Start with evaluations of
-
β Merkle proofs are checked at each FRI layer
-
β Folding correctness is verified at each layer
βββββββββββββββββββββββββββββββββββββββββββββββββ
β Constraint Check β
βββββββββββββββββββββββββββββββββββββββββββββββββ
Sample random xβ, xβ, ..., xβ β Domain
β
βΌ
ββββββββββββββββββββββββββββββ
β Compute Q(xα΅’), C(xα΅’), Z(xα΅’) β
ββββββββββββββββββββββββββββββ
β
βΌ
Check: Q(xα΅’) * Z(xα΅’) == C(xα΅’)
β
βΌ
If false β β Reject If true β Continue
βΌ
βββββββββββββββββββββββββββββββββββββββββββββββββ
β FRI Protocol β
βββββββββββββββββββββββββββββββββββββββββββββββββ
ββββββββββββββββββββββββββββββββββββββ
β FRI Layer 0: Q(x) evaluations ββββ Merkle proof check
ββββββββββββββββββββββββββββββββββββββ
β
fri_fold(betaβ)
βΌ
ββββββββββββββββββββββββββββββββββββββ
β FRI Layer 1: folded values ββββ Merkle proof check
ββββββββββββββββββββββββββββββββββββββ
β
fri_fold(betaβ)
βΌ
...
βΌ
ββββββββββββββββββββββββββββββββββββββ
β Final Layer: degree β€ 1 polynomialββββ Direct value check
ββββββββββββββββββββββββββββββββββββββ
βΌ
β
Accept proof
To achieve 128-bit soundness in STARK proofs, the total probability that a cheating prover is accepted must be less than 2β»ΒΉΒ²βΈ
.
This involves carefully choosing parameters for:
- Constraint checks (
Q(x)
evaluations) - FRI protocol (number of layers and queries per layer)
Example:
- If
L = 20
layers βlogβ(20) β 4.3
- Then:
m β 133
queries per layer
Example:
- If
d / N = 1/4
, thenlogβ(N/d) = 2
- So:
n = 128 / 2 = 64
spot checks
- If
d / N = 1/8
, thenlogβ(N/d) = 3
- So:
n = 128 / 3 β 43
, but round up to be safe
Use n = 64β80
spot checks for strong 128-bit soundness across typical domain/degree ratios.
Component | Suggested Value |
---|---|
Constraint checks n |
64β80 |
FRI layers L |
logβ(N / degree of final poly) |
FRI queries m |
β₯ logβ(L) + 128 (e.g., 133) |
Total soundness error | Ξ΅_total = Ξ΅_constraints + Ξ΅_fri β€ 2β»ΒΉΒ²βΈ |
Check Type | Equation Checked | Merkle Proofs | Multiple Layers? |
---|---|---|---|
Constraint Check | Q(x) * Z(x) == C(x) |
Optional | β No |
FRI Layer Check | Folding consistency, low-degree | β Yes | β Yes |
Meet the amazing artist behind this creation, Kristiana Skrastina
STARKs are a powerful cryptographic tool that enables proving the correct execution of a computation without revealing the underlying data. Think of it as a way to convince someone that you know the solution to a puzzle without actually showing them the solution. This property, known as zero-knowledge, is crucial for privacy-preserving applications in areas like financial transactions, voting systems, and private identity verification.
Scalability | Transparency | Zero-Knowledge |
---|---|---|
β’ O(logΒ² n) proof size | β’ No trusted setup | β’ Privacy |
β’ Fast verify | β’ Public parameters | β’ Confidentiality |
β’ Efficient | β’ Data protection | |
β’ Secure sharing |
Financial | Identity | Computing |
---|---|---|
β’ Private payments | β’ Age verification | β’ Confidential computing |
β’ Asset ownership | β’ Credential validation | β’ Private ML |
β’ Secure MPC |
At its heart, Toyni consists of three main components working together:
Virtual Machine | Constraint System | STARK Prover |
---|---|---|
β’ Executes programs | β’ Defines rules | β’ Generates proofs |
β’ Creates traces | β’ Validates states | β’ Uses FRI protocol |
Program Execution | Execution Trace | Verification |
---|---|---|
β’ Run program | β’ Record states | β’ Sample positions |
β’ Track state | β’ Build constraints | β’ Check constraints |
β’ Generate trace |
Here's a simple example that demonstrates how Toyni works. We'll create a program that proves a sequence of numbers increments by 1 each time:
fn test_valid_proof() {
let mut trace = ExecutionTrace::new(4, 1);
for i in 0..4 {
let mut row = HashMap::new();
row.insert("x".to_string(), i);
trace.insert_column(row);
}
let mut constraints = ConstraintSystem::new();
constraints.add_transition_constraint(
"increment".to_string(),
vec!["x".to_string()],
Box::new(|current, next| {
let x_n = Fr::from(*current.get("x").unwrap() as u64);
let x_next = Fr::from(*next.get("x").unwrap() as u64);
x_next - x_n - Fr::ONE
}),
);
constraints.add_boundary_constraint(
"starts_at_0".to_string(),
0,
vec!["x".to_string()],
Box::new(|row| Fr::from(*row.get("x").unwrap() as u64)),
);
let prover = StarkProver::new(&trace, &constraints);
let proof = prover.generate_proof();
let verifier = StarkVerifier::new(&constraints, trace.height as usize);
assert!(verifier.verify(&proof));
}
This example demonstrates how Toyni can prove that a sequence of numbers follows a specific pattern (incrementing by 1) without revealing the actual numbers. The proof can be verified by anyone, but the actual values remain private.
STARKs achieve their security through a combination of domain extension and low-degree testing. Here's how it works:
Domain Extension | Low-Degree Testing | Soundness Guarantees |
---|---|---|
β’ Extend domain | β’ FRI protocol | β’ Soundness error: (1/b)^q |
β’ Blowup factor | β’ Polynomial degree | β’ Query complexity |
The security of a STARK proof relies on two key mechanisms:
-
Domain Extension (Blowup): The composition polynomial is evaluated over a domain that's
b
times larger than the original trace length, whereb
is the blowup factor. -
Low-Degree Testing: The FRI protocol ensures that the polynomial being tested is close to a valid low-degree polynomial.
The soundness error (probability of accepting an invalid proof) is bounded by:
Pr[undetected cheat] = (1/b)^q
where:
b
is the blowup factor (e.g., 8 in our example)q
is the number of queries made by the verifier
This means that if a prover tries to cheat by modifying a fraction 1/b of the domain, the verifier will detect this with probability at least 1 - (1/b)^q. For example, with a blowup factor of 8 and 10 queries, the soundness error is at most (1/8)^10 β 0.0000001.
The codebase is organized into logical components:
Math | VM | Library |
---|---|---|
β’ Polynomial | β’ Constraints | β’ Entry point |
β’ Domain | β’ Trace | β’ Public API |
β’ FRI | β’ Execution | β’ Documentation |
β’ STARK |
Constraint System | FRI Protocol | Mathematical Operations |
---|---|---|
β’ Transition constraints | β’ Low-degree testing | β’ Polynomial arithmetic |
β’ Boundary constraints | β’ Interactive verification | β’ Field operations |
β’ Quotient verification | β’ FRI folding layers | β’ Domain operations |
Zero-Knowledge | Merkle Commitments | Fiat-Shamir Transform |
---|---|---|
β’ Trace privacy | β’ Tree structure | β’ Deterministic hashing |
β’ State protection | β’ Proof generation | β’ Non-interactive |
While we have a working STARK implementation with quotient polynomial verification, it's not yet a full zero-knowledge system. The main limitations are:
- We're using random number generation instead of the Fiat-Shamir transform, making the protocol interactive.
- The proof system lacks Merkle commitments for the FRI layers, which are essential for zero-knowledge properties. - instead all evaluations are passed to the verifier. This will be addressed soon.
To achieve full zero-knowledge capabilities, we need to:
- Implement Merkle tree commitments for the FRI layers
- Replace random number generation with deterministic hashing (Fiat-Shamir transform)
- Add trace blinding and random masks to the composition polynomial
- Optimize the proof generation and verification process
-
Merkle Commitments
- Implement Merkle tree structure for FRI layers
- Add commitment verification in the FRI protocol
- Optimize commitment size and verification time
-
Fiat-Shamir Transform
- Replace random number generation with deterministic hashing
- Implement transcript-based challenge generation
- Ensure security properties of the transform
-
Constraint System Improvements
- Add higher-level abstractions for constraint definition
- Implement more complex constraint types
- Optimize constraint evaluation
-
Zero-Knowledge Properties
- Add trace blinding
- Implement random masks for the composition polynomial
- Ensure privacy of witness data
-
Random Linear Combinations
- Add random linear combinations to the constraint polynomial
We welcome contributions to Toyni! Our current focus is on implementing zero-knowledge properties and improving the overall system. We're particularly interested in:
- Implementing Merkle tree commitments and the Fiat-Shamir transform
- Adding comprehensive test coverage and security audits
- Improving documentation and adding more examples
- Optimizing performance and reducing proof sizes