### Abstract

The area of practical computational integrity proof systems, like SNARKs, STARKs, Bulletproofs, is seeing a very dynamic development with several constructions having appeared recently with improved properties and relaxed setup requirements. Many use cases of such systems involve, often as their most expensive apart, proving the knowledge of a preimage under a certain cryptographic hash function, which is expressed as a circuit over a large prime field. A notable example is a zero-knowledge proof of coin ownership in the Zcash cryptocurrency, where the inadequacy of the SHA-256 hash function for such a circuit caused a huge computational penalty.

In this paper, we present a modular framework and concrete instances of cryptographic hash functions which work natively with GF(p) objects. Our hash function Poseidon uses up to 8x fewer constraints per message bit than Pedersen Hash.

Our construction is not only expressed compactly as a circuit, but can also be tailored for various proof systems using specially crafted polynomials, thus bringing another boost in performance. We demonstrate this by implementing a 1-out-of-a-billion membership proof with Merkle trees in less than a second by using Bulletproofs.

In this paper, we present a modular framework and concrete instances of cryptographic hash functions which work natively with GF(p) objects. Our hash function Poseidon uses up to 8x fewer constraints per message bit than Pedersen Hash.

Our construction is not only expressed compactly as a circuit, but can also be tailored for various proof systems using specially crafted polynomials, thus bringing another boost in performance. We demonstrate this by implementing a 1-out-of-a-billion membership proof with Merkle trees in less than a second by using Bulletproofs.

Original language | English |
---|---|

Title of host publication | Proceedings of the 30th USENIX Security Symposium |

Publisher | USENIX Association |

Publication status | Accepted/In press - 2020 |

### Keywords

- snark
- stark
- bulletproofs
- hash
- zkp

## Fingerprint Dive into the research topics of 'Poseidon: A New Hash Function for Zero-Knowledge Proof Systems'. Together they form a unique fingerprint.

## Cite this

Grassi, L., Khovratovich, D., Roy, A., Rechberger, C., & Schofnegger, M. (Accepted/In press). Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In

*Proceedings of the 30th USENIX Security Symposium*USENIX Association.