You are not logged in. Your edit will be placed in a queue until it is peer reviewed.
We welcome edits that make the post easier to understand and more valuable for readers. Because community members review edits, please try to make the post substantially better than how you found it, for example, by fixing grammar or adding additional resources and hyperlinks.
Required fields*
- 2$\begingroup$ Does just the proof need to be lightweight, or the hash as well? $\endgroup$poncho– poncho ♦2025-11-17 17:02:00 +00:00Commented Nov 17 at 17:02
- 2$\begingroup$ Also, does the approximate preimage length need to be confidential (or can we assume a reasonable upper bound)? If that length is confidential, with no upper bound, that would appear to be difficult with many reasonable hash functions (which may rely on iterated hash compression or permutation operations) $\endgroup$poncho– poncho ♦2025-11-17 18:12:51 +00:00Commented Nov 17 at 18:12
- 2$\begingroup$ Will try a proper answer later. But for the time being: in terms of state-of-the art ZK friendly hashes, there's work on reusing existing designs over prime fields. For example, the sponge function could be defined using a permutation over a prime field (See poseidon hash function). Efficiency gains come from using “native” arithmetic rather than embedding binary arithmetic in finite field. This website (linked in comments on another question) has a good list of other such primitives. stap-zoo.com $\endgroup$Marc Ilunga– Marc Ilunga2025-11-17 23:22:42 +00:00Commented Nov 17 at 23:22
- 2$\begingroup$ In SHA256, the current state of general-purpose provers allows for significant efficiency trade-offs. For instance, Google's Longfellow system (ia.cr/2024/2010) achieves a ~16ms proving time per SHA256 compression round. Regarding proof size, a common technique is to wrap the initial proof in a "verification proof," which can be substantially smaller (with some increase in proving time). $\endgroup$Marc Ilunga– Marc Ilunga2025-11-17 23:36:11 +00:00Commented Nov 17 at 23:36
- 1$\begingroup$ perhaps $g^x h^r$ style pedersen commitments, or their elliptic curve counterparts? don't they have pretty straightforward proofs in zero-knowledge? $\endgroup$aiootp– aiootp2025-11-18 01:58:37 +00:00Commented Nov 18 at 1:58
| Show 1 more comment
How to Edit
- Correct minor typos or mistakes
- Clarify meaning without changing it
- Add related resources or links
- Always respect the author’s intent
- Don’t use edits to reply to the author
How to Format
- create code fences with backticks ` or tildes ~ ```
like so
``` - add language identifier to highlight code ```python
def function(foo):
print(foo)
``` - put returns between paragraphs
- for linebreak add 2 spaces at end
- _italic_ or **bold**
- quote by placing > at start of line
- to make links (use https whenever possible) <https://example.com>[example](https://example.com)<a href="https://example.com">example</a>
- MathJax equations
$\sin^2 \theta$
How to Tag
A tag is a keyword or label that categorizes your question with other, similar questions. Choose one or more (up to 5) tags that will help answerers to find and interpret your question.
- complete the sentence: my question is about...
- use tags that describe things or concepts that are essential, not incidental to your question
- favor using existing popular tags
- read the descriptions that appear below the tag
If your question is primarily about a topic for which you can't find a tag:
- combine multiple words into single-words with hyphens (e.g. public-key), up to a maximum of 35 characters
- creating new tags is a privilege; if you can't yet create a tag you need, then post this question without it, then ask the community to create it for you