Cointime

Download App
iOS & Android

A Preliminary Note on Vitalik's Proposal for Arithmetic Hash-Based Proto-Danksharding

Cointime Official

by Kurt Pan

Vitalik recently wrote a great post on the trade-offs about replacing the KZG commitment to an arithmetic hash-based one in EIP-4844. The article is very instructive and forward-looking, but unless you are tech-savvy and keep an eye on the state-of-art progress, there will be a lot of prerequisites to be met to understand the article.

In this short article, I will present to you some of the necessities and learning materials for understanding Vitalik’s post. The purpose is not to be mathematically or cryptographically rigorous or complete, it is mainly to serve as a preview of the landscape.

I hope this article will make the learning process a little bit easier for you.

Mathematics

Mathematics (for most people) is hard, especially the ones involved in blockchain frontier technologies, which to many seem like moon math. But at the same time, math is necessary for the clarification of concepts, formal description and analysis, security proofs, and many other necessary steps of research.

I will briefly describe some of the mathematical concepts below in informal language, for details please refer to:

Finite fields

field is a set on which addition, subtraction, multiplication, and division are defined and behave as the corresponding operations on rational and real numbers do.

finite field (or Galois field) is a field that contains a finite number of elements. The most common examples of finite fields are given by the integers mod pp when pp is a prime number.

Elliptic curves

Elliptic curves are geometric objects in projective planes over a given field, made up of points that satisfy certain equations.One of their key features from the point of view of cryptography is that, if the underlying field is of positive characteristic, elliptic curves are finite, cyclic groups.Further, it is believed that, in this case, the Discrete Logarithm Problem on many elliptic curve groups is hard, given that the underlying characteristic is large enough.

Although a bit old, this is still a good introductory article on elliptic curves:

If you are a visual learner, also check out these tools for visualizing elliptic curves to help you understand:

Pairings

An elliptic curve pairing is a function that takes a pair of points on an elliptic curve and maps them to an element of some other group, called the target group.This mapping has a nice property called bilinearity that can be very useful in cryptography, which is similar to the multiplication of points in the group of elliptic curves.

A pairing-friendly curve is a special class of elliptic curves, which have a pairing map attached to them.

Pairings have a wide range of applications in cryptography and blockchain technology: both in zk-SNARKs proof systems and KZG polynomial commitment schemes.

Here are some excellent learning materials on pairings:

Lagrange Polynomial Interpolation

We all learned in high school that a line can be uniquely determined past two points. Similarly, nn points can uniquely determine a polynomial of order n−1n−1. Lagrange interpolation is the method used to find the expression of such polynomial.

It is widely used in tons of techniques such as Reed-Soloman error-correcting code, polynomial commitment schemes, zk-SNARKs, data availability sampling, even in secret sharingthreshold signature schemes, and many others.

Polynomial Commitment Schemes

In a commitment scheme, the committer commits to an arbitrary message by outputting some commitment. The committer can then later reveal the message, and a verifier can validate that indeed the commitment corresponds to the message.

Polynomial commitment schemes(PCS) are commitment schemes to a polynomial. PCS can achieve some nice additional properties: the committer should be able to “open” certain evaluations of the committed polynomial without revealing the entire polynomial.

KZG

KZG (which stands for Kate, Zaverucha and Goldberg) is a polynomial commitment scheme introduced in this paper in 2010. It has the advantage that both polynomial commitment size and opening proof size are constant (very small), which makes it very useful on blockchains where storage is quite expensive. However, at the same time, it has disadvantages such as requiring elliptic curve support for pairing, requiring a trusted setup, and not being resistant to quantum attacks.

For details on how KZG works, we recommend reading these materials:

Trusted Setup

A trusted setup ceremony is a procedure that is done once to generate a piece of data that must then be used every time some cryptographic protocol is run. Generating this data requires some secret information; the “trust” comes from the fact that some person or some group of people has to generate these secrets, use them to generate the data, and then publish the data and forget the secrets. But once the data is generated, and the secrets are forgotten, no further participation from the creators of the ceremony is required.-How do trusted setups work? by Vitalik Buterin

Requiring a (one-time) trusted setup ceremony is a drawback of using KZG, as it introduces another layer of trust distribution, which adds complexity to design and implementation.

Some other PCSs (such as IPA and Merkle Tree described below) and some newer zk-SNARKs proof systems (e.g., STARKs) do not require such trusted setup ceremonies (called transparency), but they all have some other trade-offs in terms of size or efficiency.

Some other related articles:

Inner Product Argument

There are two alternatives to KZG commitments:

  • Discrete-log-based Inner Product Argument (IPA) commitments
  • Merkle roots based on arithmetic-friendly hash functions. Vitalik’s post focuses on this one.

You can learn IPA by searching for keywords Bulletproofs , Halo etc. You can also check these:

Merkle Tree and Verkle Tree

Merkle tree is a hash tree in which every “leaf” (node) is labelled with the cryptographic hash of a data block, and every node that is not a leaf (called a branch, inner node, or inode) is labelled with the cryptographic hash of the labels of its child nodes.A Merkle tree allows efficient and secure verification of the contents of a large data structure. (called a Merkle proof)

Merkle trees are such a fundamental concept and are the basis for further understanding of many more advanced concepts such as vector commitments, accumulatorsauthenticated data structures, membership proofs, etc.

You can check out these excellent links to learn more.

These will be useful if you want to learn more about an improved variant called Verkle Tree:

zk-SNARKs

Welcome to the wild frontier of cryptography and blockchain technology! zk-SNARKs is much more than a buzzword that will quickly fade with the wind; instead, you can learn (almost) the entirety of cryptography by diving down this rabbit hole of zk-SNARKs.

There is a wealth of learning material available online, just to name a few.

Or you can just refer to Kurt Pan’s Awesome Zero-Knowledge Proofs (2022) and I will keep updating this list.

Arithmetic Hash Functions

Arithmetization is the process of turning a generic statement or question into a set of equations to be verified or solved, which is a necessary sub-process (usually the first step) in most zk-SNARKs proof systems.

Arithmetic (or ZK-friendly/ SNARK-friendly) hash functions are those hash functions that are designed to have a “simple” representation after arithmetization process. They can be verified with a simple verifier with a very low number of constraints.

The Ethereum Foundation is holding a ZK Hash Function Cryptanalysis Bounty in 2021 to design and analyze new ZK-friendly hash functions, one of which is Poseidon.

In addition to Poseidon, there are many other designs, like:

I have to give a caveat that all of the above hash functions are still very young, compared to more mature ones like SHA256 and Keccak, and need to be tested and analyzed more before being used in production.

Danksharding

Recently, Vitalik released an updated Ethernet roadmap, and we can clearly see that EIP-4844 and Danksharding are the next big steps for Ethereum after The Merge.

Danksharding combines multiple avenues of cutting edge research to provide the scalable base layer required for Ethereum’s rollup-centric roadmap.

We can roughly say that Full Danksharding = Proto-danksharding + Data Availability Sampling + PBS + 2D KZG scheme + Proof-of-custody + more.

Here are the best materials for learning about Danksharding:

Proto-danksharding (EIP-4844)

On the road to full Danksharding, some of the goodies are introduced by EIP-4844 :

  • Data blob-carrying transaction format
  • KZG commitments to the blobs
  • etc.

You can find almost everything about EIP-4844 on this website:

Data Availability Sampling (DAS)

Data Availability Sampling (DAS) enables each node only ends up downloading a small portion of the total data. Each node (including client nodes that are not participating in staking) checks every blob, but instead of downloading the whole blob, they privately select N random indices in the blob, and attempt to download the data at just those positions.

Finally, the reference list of DAS:

Conclusion

When you keep learning and finally get the feeling that everything is connected, you’re not far from the cutting edge of innovation.

Comments

All Comments

Recommended for you

  • BTC Falls Below $69,000

    Market data shows that BTC has fallen below $69,000, currently priced at $68,957.23, with a 24-hour decline of 2.68%. The market is experiencing significant volatility, so please ensure proper risk management.

  • President Trump: We Are Destroying Iran

    President Trump: We are destroying Iran. It is Iran that is begging for a deal, not me. Everyone knows that Iran is negotiating with us. (Jinshi)

  • Iran Delivers Response to US 15-Point Proposal Via Intermediary

    On March 26th, according to Iranian media reports, Iran's response to the United States' 15-point proposal was officially delivered last night through an intermediary. (Jins10)

  • Turkey's Weekly Gold Sales Hit Highest Since 2018

    March 26th news: Data shows that as of the week ending March 20th, Turkey's central bank gold reserves fell from 820.8 tons to 771.8 tons. Banking sources stated that this marks the largest weekly decline in the Turkish central bank's gold reserves since August 2018, with approximately 22 tons of gold sold last week. In addition to selling gold, the Turkish central bank also conducted gold swap transactions totaling about 31 tons last week. (Jingshi)

  • Bitcoin Miner MARA Sells 15,133 BTC

    On March 26th, Bitcoin mining company MARA announced the repurchase of $1 billion in convertible senior notes. The repurchases of the 2030 and 2031 notes are expected to be completed on March 30, 2026, and March 31, 2026, respectively, subject to the satisfaction of customary closing conditions. The note repurchase transactions are anticipated to generate approximately $88.1 million in value for the company through cash savings. The company also announced today that it sold 15,133 bitcoins between March 4, 2026, and March 25, 2026, for a total transaction price of approximately $1.1 billion. The proceeds from the bitcoin sales are expected to be used for the note repurchase transactions, with the remaining funds allocated for general corporate purposes.

  • Fannie Mae to Accept Cryptocurrency-Backed Mortgages

    On March 26, according to The Wall Street Journal, Fannie Mae, a "super giant" in the U.S. housing mortgage market, will for the first time accept home loans backed by cryptocurrency assets.

  • BlackRock Transfers 15,405 ETH and 1,133 BTC to Coinbase Prime Address

    According to data monitored by Arkham, approximately 50 minutes ago, BlackRock transferred a total of 15,405 ETH, valued at approximately $32.02 million, to a Coinbase Prime address through its Ethereum exchange-traded fund (ETF) ETHA. Additionally, BlackRock transferred a total of 1,133.658 BTC, valued at approximately $78.83 million, to a Coinbase Prime address through its Bitcoin ETF IBIT.

  • Trump Urges Iran to 'Get Serious' Before It's 'Too Late'

    March 26th News: U.S. President Trump stated that Iran should "get serious" as soon as possible, before it is "too late." (Jinshe)

  • Sailor Injured Aboard USS Lincoln During Operations in Arabian Sea

    March 26th news: The U.S. Navy's Fifth Fleet announced today that a U.S. Navy sailor was injured on March 25th while the aircraft carrier USS Lincoln was conducting flight operations in the Arabian Sea. The injury is non-combat related and not life-threatening. The sailor has been transferred ashore for further medical care and is in stable condition. The specific circumstances of the incident are under investigation. The USS Lincoln Carrier Strike Group continues to conduct strike missions in support of Operation Epic Fury. (Jins10)

  • European Parliament Approves EU-US Trade Deal

    On March 26, the European Parliament held a plenary vote on the EU-US trade agreement, which was ultimately passed. On March 19, the European Parliament's Committee on International Trade voted 29 in favor to resume the legislative approval process for the EU-US trade agreement. The EU and the US reached a trade agreement in July 2025. In exchange for the US imposing a 15% tariff on most EU goods exported to the US, the EU needs to abolish tariffs on industrial products from the US and provide preferential market access for American seafood and agricultural products. (CCTV News)