Benchmarking zk-SNARK, zk-STARK, and Bulletproof Non-Interactive Zero-Knowledge Proof Protocols in Equivalent Practical Applications

·

Abstract

This research benchmarks the performance of three leading Non-Interactive Zero-Knowledge Proof (NIZKP) protocols—zk-SNARK, zk-STARK, and Bulletproofs—in a unified real-world application. By implementing a dynamic MiMC hash function across four programming libraries and two languages, we compare proof sizes, generation times, and verification speeds. Key findings include:

Results align with general performance trends, though zk-SNARK verification marginally outperforms zk-STARK in our tests. This work aids researchers and practitioners in selecting protocols based on security, efficiency, and application context.

Keywords: NIZKP, zk-SNARK, zk-STARK, Bulletproofs, privacy-preserving authentication, benchmark


1. Introduction

1.1 Background & Context

Zero-Knowledge Proofs (ZKPs) enable provers to validate statements without revealing underlying data. Non-interactive variants (NIZKPs) enhance practicality by eliminating multi-round interactions. Prominent in cryptocurrencies (e.g., ZCash, Ethereum), NIZKPs also apply to privacy-preserving authentication, cloud computation verification, and more.

1.2 Research Questions

  1. What are the performance differences among zk-SNARK, zk-STARK, and Bulletproofs in equivalent applications?
  2. Which use cases best suit each protocol’s features?

1.3 Aims & Objectives


2. Literature Review

2.1 Summary & Findings

2.2 Research Gaps

Lack of standardized performance comparisons across protocols in identical applications.


3. Methodology

3.1 Approach

3.2 Design


4. Mathematical Primitives

4.2 zk-SNARK

4.3 zk-STARK

4.4 Bulletproofs


5. Proposed Solution

5.3 Implementation

5.4 Benchmark Procedure

  1. Setup: Generate CRS (zk-SNARK only).
  2. Proving: Measure proof generation time.
  3. Verification: Validate proof correctness and speed.

6. Results

6.1 Benchmark Metrics

| Protocol | Proof Size (KB) | Generation Time (ms) | Verification Time (ms) |
|---------------|-----------------|----------------------|------------------------|
| zk-SNARK | 2.1 | 120 | 8 |
| zk-STARK | 45.3 | 85 | 12 |
| Bulletproofs | 3.8 | 210 | 25 |

6.2 Analysis


7. Discussion

7.1 Achieved Results

7.5 Potential Applications


8. Conclusion

8.1 Key Findings

8.3 Future Directions

👉 Explore advanced cryptographic applications


FAQ Section

Q: Which protocol is best for resource-constrained environments?
A: zk-SNARK, due to its compact proofs and fast verification.

Q: Are Bulletproofs suitable for high-throughput systems?
A: No—verification delays make them better for low-frequency, high-value transactions.

Q: How does zk-STARK achieve quantum resistance?
A: By relying on hash-based cryptography (e.g., FRI) instead of DLP-based primitives.