Blockchain technology took place almost in every industry. Wee see using of blockchanin technology in fields such as in finance, health sector, education and military sector because of the security, privacy and speed that technology provides. Data privacy that provides with protocols is the one of biggest reason to choose blockchain technology. zk STARK and zk SNARK are one of the most used protocols. zk SNARK is short version of Zero Knowledge Succinct Non Interactive Argument Knowledge.
Zero Knowledge Proof
In the simplest terms, Zero Knowledge Proof is a method that where you can prove the accuracy of your passwords to someone else who knows the password without sharing the passwords of a safe you own. Purpose of this method is prove other parties the accuracy of your knowledge without sharing your password. Zero Knowledge is often used to verify identities. With Zero Knowledge method, provers can verify their identities without sharing knowlegde about their identities.
zk SNARK
zk STARK means providing without interacting. Even very long datas can verify quickly with proofs that short version of these datas in the zk SNARK method. One of the big diffrence’s of the zk SNARK from Zero Knowledge Proof method is that provers and verifiers are not interact with other. Prover sends a message to verifier, verifier confirms that message is true and approves the transaction. In the zk SNARK, there is no mutual interaction between the prover and the verifier. In the zk SNARK method, the pronoun sends only one piece of information to the validator for verification. Therefore, there is no interaction between the prover and the verifier.
zk STARK
zk STARK solves issue’s proof of knowledge in many ways. However, the biggest problem with this method is that users have to trust the installation phase and the parties that set up the system implicitly. Users of the system never know if they were compromised at some point during installation or later. For this reason, the need for a system arises where users do not need to think about whether the system is installed by trusted parties.
The zk STARK system is a kind of cryptographic proof technology that does not require any reliability in this respect. For this reason, “verifiable randomness” is used in the zk STARK method. The zk STARK systems include greater reliability, given that the trusted installation step from third parties is not required, instead the concept of verifiable randomness is generally used.
Differences Between zk-SNARKs and zk-STARKs
While zk-SNARKs require a reliable setup step, zk-STARKs use publicly verifiable randomness to create reliably verifiable computational systems.
zk-STARKs are more scalable in computational speed and size than zk-SNARKs.
zk-SNARKs are vulnerable to attacks from quantum computers due to the cryptography they use. On the other hand zk-STARKs, are resistant to such attacks.