ZK-STARKs Implementation
VeilCore OS utilizes ZK-STARKs (Scalable Transparent Arguments of Knowledge) as its primary cryptographic primitive. We selected STARKs over SNARKs to eliminate the need for a trusted setup and to ensure post-quantum security.
Why STARKs?
The choice of STARKs is driven by the specific requirements of an autonomous AI network:
Transparency: There is no "toxic waste" or trusted setup phase. The parameters are public and random, meaning no single entity holds a master key to the system.
Scalability: Verification time scales poly-logarithmically with the size of the computation. As AI models and tasks grow more complex, the cost to verify them on-chain remains negligible.
Post-Quantum Security: STARKs rely on collision-resistant hash functions rather than elliptic curve cryptography, making them resistant to future threats from quantum computing.
The Implementation
Our implementation constructs an Execution Trace of the agent's computation. This trace is then transformed into a polynomial. We verify that this polynomial holds true at random points to confirm the validity of the computation. This ensures that the agent performed the work correctly without revealing the input data used during the process.
Last updated