-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Why does your Starky SHA256 benchmark run so much faster than Plonky2? #3
Comments
I haven't looked into this that deeply, so I can't say I know for sure exactly why, but I can list a bunch of things that come to mind:
It's also worth metioning there's inherent tradeoffs here. For instance, the starky proof is quite large (~2MB), and starky doesn't support zk, so to use it in pracitce you might need to add a few steps of recursion on top of the initial proof. Also, Jump recently published some plonky2 gadgets worth checking out, they might be better optimized. https://github.com/JumpCrypto/plonky2-crypto |
Awesome work on implementing the SHA256 algo in Starky. I found another guy's impl of SHA in Plonky2. The proof gen time differs very wildly. Your 15 SHA proof runs in the milliseconds while their Plonky2 benchmark takes 16s for a single SHA.
I ran both your benchmark and their's (tweaked to 15 SHAs) with the same rate_bits = 3 and the results still differs by 4 orders of magnitude.
Have you checked out their implementation of SHA256 in Plonky2? If so, maybe you could sprinkle some insight or thoughts?
The text was updated successfully, but these errors were encountered: