The FRI protocol is an interactive proof system designed to prove the low degree (degree constraint) of a polynomial. The Prover commits to a polynomial form, and the Verifier ensures that the polynomial is of low degree by sampling several points from it, performing multiple random linear combinations, and polynomial folding. This interactive proof system is particularly important in zero-knowledge proofs, as it allows the verification of the polynomial’s properties without revealing the polynomial itself.
FRI is based on Reed-Solomon encoding and polynomial evaluation, progressively reducing the degree of the polynomial through sampling and folding until its low-degree property is obvious. The folding operation (Polynomial Folding) in the process helps reduce the communication cost between the Prover and the Verifier, making it especially efficient in large-scale proof systems. Its communication complexity and number of interaction rounds (in interactive proof systems) have a logarithmic relationship with the polynomial’s degree, i.e.,
FRI consists of three algorithmic components: Commit, Folding, and Query, as defined below:
· Commit: Given a polynomial
· 2. Folding: The problem is recursively halved, i.e., a polynomial of degree
· 3. Query: The Verifier initiates several random challenges to check the correctness of the Prover’s folding process (which can be viewed as re-executing the folding process). The Prover must submit the evaluation values corresponding to each random challenge, along with the Merkle paths for the evaluations. The Merkle paths are used to check that the evaluations indeed belong to the Merkle root. The interaction proceeds as follows (we consider only one round of verification here, as each round follows the same process):
It is important to note that calculating
For
Let us illustrate the FRI commit phase with a concrete cubic polynomial. Suppose we have a cubic polynomial:
According to the FRI protocol, two rounds of interaction (since
First, the Prover decomposes the cubic polynomial
Here,
Therefore:
Next, the Verifier sends a random value
The Prover computes
The Prover then decomposes this quadratic polynomial
Thus:
After the Prover has decomposed
The Prover computes
Next, the Prover decomposes this quadratic polynomial
Thus:
The Verifier sends a final random value
At this point, the Prover has obtained a constant polynomial
Although FRI itself is already quite efficient, there is still room for further optimization when dealing with complex constraints or larger-scale proofs. DEEP-FRI optimizes the polynomial folding and random linear combination strategies by introducing deep algebraic structures. This allows for improved proof efficiency without significantly increasing the communication cost.
At the same time, DEEP-FRI supports queries at points outside the domain, significantly enhancing the soundness of the original FRI protocol. The number of queries can also be reduced accordingly, which helps decrease the proof size.
This operation is commonly used in certain proofs or algorithms to adjust the form of a function, eliminate the value at a specific point
Given a point
First, define the polynomial
Next, define a new function
1. Input Parameters:
2. Output: A new function
DEEP-FRI consists of three algorithmic components: Commit, Folding, and Query. Here we consider the interactive proof system. If we need to convert it to a non-interactive system, we replace each challenge value sent by the verifier using the Fiat-Shamir transformation. The interactive proof algorithm for DEEP-FRI is defined as follows:
Suppose we are given a polynomial of degree
The Folding phase recursively folds the query domain of the polynomial
For the
1. Polynomial Query:
2. Random Challenge and Polynomial Degree Reduction
The folding operation is as follows:
We have a function
Here are the details:
At the end of this step, if the folded polynomial is a constant
The Query phase is primarily used to verify whether the final polynomial calculations are correct. The process is as follows:
1 .Repeat the query
The verifier selects a random point
The odd term formula is:
· The prover provides the verifier with the values
· The verifier checks if the corresponding values are in the Merkle tree and verifies the following equation:
2. Final Result Verification: Check if the final polynomial calculation matches the pre-committed value
Subscribe to the ZKM Blog to stay updated with the latest research by ZKM. If you have any questions, you can contact the ZKM team on discord: discord.com/zkm
The FRI protocol is an interactive proof system designed to prove the low degree (degree constraint) of a polynomial. The Prover commits to a polynomial form, and the Verifier ensures that the polynomial is of low degree by sampling several points from it, performing multiple random linear combinations, and polynomial folding. This interactive proof system is particularly important in zero-knowledge proofs, as it allows the verification of the polynomial’s properties without revealing the polynomial itself.
FRI is based on Reed-Solomon encoding and polynomial evaluation, progressively reducing the degree of the polynomial through sampling and folding until its low-degree property is obvious. The folding operation (Polynomial Folding) in the process helps reduce the communication cost between the Prover and the Verifier, making it especially efficient in large-scale proof systems. Its communication complexity and number of interaction rounds (in interactive proof systems) have a logarithmic relationship with the polynomial’s degree, i.e.,
FRI consists of three algorithmic components: Commit, Folding, and Query, as defined below:
· Commit: Given a polynomial
· 2. Folding: The problem is recursively halved, i.e., a polynomial of degree
· 3. Query: The Verifier initiates several random challenges to check the correctness of the Prover’s folding process (which can be viewed as re-executing the folding process). The Prover must submit the evaluation values corresponding to each random challenge, along with the Merkle paths for the evaluations. The Merkle paths are used to check that the evaluations indeed belong to the Merkle root. The interaction proceeds as follows (we consider only one round of verification here, as each round follows the same process):
It is important to note that calculating
For
Let us illustrate the FRI commit phase with a concrete cubic polynomial. Suppose we have a cubic polynomial:
According to the FRI protocol, two rounds of interaction (since
First, the Prover decomposes the cubic polynomial
Here,
Therefore:
Next, the Verifier sends a random value
The Prover computes
The Prover then decomposes this quadratic polynomial
Thus:
After the Prover has decomposed
The Prover computes
Next, the Prover decomposes this quadratic polynomial
Thus:
The Verifier sends a final random value
At this point, the Prover has obtained a constant polynomial
Although FRI itself is already quite efficient, there is still room for further optimization when dealing with complex constraints or larger-scale proofs. DEEP-FRI optimizes the polynomial folding and random linear combination strategies by introducing deep algebraic structures. This allows for improved proof efficiency without significantly increasing the communication cost.
At the same time, DEEP-FRI supports queries at points outside the domain, significantly enhancing the soundness of the original FRI protocol. The number of queries can also be reduced accordingly, which helps decrease the proof size.
This operation is commonly used in certain proofs or algorithms to adjust the form of a function, eliminate the value at a specific point
Given a point
First, define the polynomial
Next, define a new function
1. Input Parameters:
2. Output: A new function
DEEP-FRI consists of three algorithmic components: Commit, Folding, and Query. Here we consider the interactive proof system. If we need to convert it to a non-interactive system, we replace each challenge value sent by the verifier using the Fiat-Shamir transformation. The interactive proof algorithm for DEEP-FRI is defined as follows:
Suppose we are given a polynomial of degree
The Folding phase recursively folds the query domain of the polynomial
For the
1. Polynomial Query:
2. Random Challenge and Polynomial Degree Reduction
The folding operation is as follows:
We have a function
Here are the details:
At the end of this step, if the folded polynomial is a constant
The Query phase is primarily used to verify whether the final polynomial calculations are correct. The process is as follows:
1 .Repeat the query
The verifier selects a random point
The odd term formula is:
· The prover provides the verifier with the values
· The verifier checks if the corresponding values are in the Merkle tree and verifies the following equation:
2. Final Result Verification: Check if the final polynomial calculation matches the pre-committed value
Subscribe to the ZKM Blog to stay updated with the latest research by ZKM. If you have any questions, you can contact the ZKM team on discord: discord.com/zkm