All
FAQ
Announcements
Product documents
Zero-Knowledge Proofs: what are zk-STARKs and how do they work? (zk-Stark V2)
Most ZKPs fall under two categories: zk-SNARK zk-STARK We use zk-STARK because it's more secure and has a minimum security assumption. In this article, we'll explain how we use zk-STARK to protect user privacy while proving our solvency.Before we continue, it's helpful to understand some basic ZKP terms, like Circuit, Merkle Tree, and Commitments. For beginners, there are many resources available to help you get started.Published on 21 Oct 2024Updated on 11 Feb 202689Zero-Knowledge Proofs: what are zk-STARKs and how do they work? (zk-STARK V1)
*Execution trace table and Merkle tree constructed for zk-STARK PoR* 1.Published on 10 May 2023Updated on 8 Sept 2025178
Showing 1-2 of 2 articles