Appearance
Second Protocol Version (Succinct, Probabilistic Check) β
This improved protocol builds on our earlier version by using:
- Random challenges sampled by the validator
, - Single-point polynomial evaluations to check
.
This lowers the verification cost from a full polynomial multiplication (
Protocol Flow β
Compute Fibonacci & Circuit Polynomials
- (Prover) Generates
by building the full circuit table. - (Prover) Encodes the circuit columns as polynomials
.
- (Prover) Generates
Compute Constraint Polynomials
- (Prover) Defines
and finds such that . - (Prover) Similarly, for the recursive constraints:
with quotient polynomials satisfying and .
- (Prover) Defines
Send Polynomials
- (Prover) Sends
to the validator.
- (Prover) Sends
Verification (Random Challenge & Single-Point Check)
(Validator) Samples random values
. (Valdiator) Computes on its own:
(Validator) Checks:
By the SchwartzβZippel Lemma, if
(etc.) the probability it also coincides at a random is at most .
Accept or Reject
- (Validator) If all checks pass, the proof is accepted; otherwise, it is rejected.
Diagram of Protocol β
Below is a simplified diagram illustrating these steps:
With this approach, the validator does a constant amount of final checks (polynomial evaluations), regardless of the polynomial degree