Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use STARK friendly hash functions for proof commitments #11

Closed
andrewmilson opened this issue Nov 14, 2022 · 2 comments
Closed

Use STARK friendly hash functions for proof commitments #11

andrewmilson opened this issue Nov 14, 2022 · 2 comments
Labels
enhancement New feature or request help wanted Extra attention is needed

Comments

@andrewmilson
Copy link
Owner

andrewmilson commented Nov 14, 2022

Supporting STARK friendly hash functions for proof commitments will be a great step forward to supporting recursive STARKs. miniSTARK uses RustCrypto's Digest trait as an interface for hash functions.

@andrewmilson andrewmilson added enhancement New feature or request help wanted Extra attention is needed labels Nov 14, 2022
@andrewmilson andrewmilson changed the title Use ZK friendly hash functions for proof commitments Use STARK friendly hash functions for proof commitments Nov 14, 2022
@andrewmilson
Copy link
Owner Author

Hash interfaces are generic now. See this Sandstorm example of a merkle tree that has some Pedersen layers and some blake2s layers

@pad01g
Copy link

pad01g commented Nov 7, 2023

@andrewmilson
In above example, it seems like blake2s and keccak256 are both masked so that they only have 80 bits of (collision-resistance) security. Is it speed-up technique for recursive STARK computation, or do you have any other intention there?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants