BenchmarksVerificationPricingDemo
Log InGet API Key

STARK Proof Performance

Version: 1.0.0
Status: Production
Last Updated: 2026-05-23
Hardware: AWS c8g.metal-48xl (Graviton4, 192 vCPU)
Hash Function: SHA3-256 (post-quantum secure)
Trusted Setup: None required
Canonical URL: https://h33.ai/benchmarks/stark/

1. Scope

This document presents production benchmarks for the H33 STARK proof systems: Lookup STARK (used in the production ZKP pipeline) and AIR STARK (used in H33-74-AIR for secp256k1 signature circuit proving). All numbers are from Graviton4 bare metal. STARKs require no trusted setup and derive their security from the collision resistance of SHA3-256, providing post-quantum security.

2. Definitions

STARK (Scalable Transparent ARgument of Knowledge)
A proof system in which a prover demonstrates knowledge of a computation's execution trace without revealing the trace itself. STARKs are transparent (no trusted setup), scalable (logarithmic verification time), and post-quantum secure (based on hash function collision resistance).
Lookup STARK
A STARK variant optimized for proving membership of a value in a pre-committed table. Used in the H33 pipeline to prove that a ZKP lookup result was correctly computed from the committed table without revealing the lookup key.
AIR (Algebraic Intermediate Representation)
The constraint system format used by STARKs. An AIR defines polynomial constraints over an execution trace. The prover demonstrates that a trace satisfies all constraints; the verifier checks a succinct proof without seeing the trace.
H33-74-AIR
The H33 STARK circuit for proving secp256k1 ECDSA signature validity. Used in the Proof of Life system. The circuit encodes the full secp256k1 scalar multiplication and signature verification algorithm as AIR constraints.
Cold / Cached
Cold proving includes one-time setup costs (trace generation, FFT twiddle factor computation, constraint compilation). Cached proving reuses precomputed structures from a previous cold invocation.

3. Lookup STARK Performance

The Lookup STARK is used in Stage 3 (ZKP) of the H33 production pipeline. It proves that a cached value was correctly looked up from a committed table.

MetricColdCached (CacheeEngine)
Prove latency4.2 us0.062 us
Verify latency1.8 us0.358 us
Proof size1,024 bytes1,024 bytes
Table size (entries)up to 2^20up to 2^20
Speedup (cold vs cached)--67.7x prove, 5.0x verify

The 0.062 us cached prove latency (62 nanoseconds) is achieved by precomputing the polynomial commitment and reusing it across lookups into the same table. The CacheeEngine stores precomputed commitments in its LFU cache layer.

In the production pipeline, the ZKP stage (Lookup STARK) accounts for less than 1% of total per-authentication latency (0.358 us of 42 us total). The dominant stages are FHE (70%) and batch attestation (29%).

4. AIR STARK Performance

4.1. Generic AIR Circuits

CircuitTrace RowsConstraintsProve (cold)Prove (cached)VerifyProof Size
Fibonacci (2^10)1,024212 ms0.8 ms0.3 ms4.2 KiB
SHA3-256 (single)32,76848180 ms14 ms2.1 ms18 KiB
Merkle tree (depth 8)65,53696420 ms34 ms3.8 ms28 KiB
secp256k1 ECDSA131,072256495 ms1.75 ms0.071 ms42 KiB

4.2. H33-74-AIR: secp256k1 Circuit

The H33-74-AIR circuit is the STARK proof component of the Proof of Life system. It proves that a secp256k1 ECDSA signature is valid without revealing the private key or the full signature.

MetricValue
Cold prove495 ms
Cached prove1.75 ms
Verify71 us (0.071 ms)
Cache speedup282x
Proof size42 KiB
Trace rows131,072
Constraint count256
FieldGoldilocks (p = 2^64 - 2^32 + 1)
HashSHA3-256
Security level128-bit (conjectured post-quantum)
Test coverage22 tests, 1,100 keys validated

The 282x cache speedup (495 ms to 1.75 ms) is achieved by precomputing the constraint evaluation domain, twiddle factors, and the low-degree extension of the execution trace. On subsequent proofs with the same circuit structure (different witnesses), only the witness-dependent portions of the computation are re-executed.

5. No Trusted Setup

STARKs are transparent proof systems. Unlike SNARKs (which require a trusted setup ceremony to generate a structured reference string), STARKs derive their soundness from the collision resistance of the hash function. This provides two properties:

  1. No toxic waste. There are no secret parameters generated during setup that, if compromised, would allow proof forgery.
  2. Post-quantum security. The security of the proof system is bounded by the collision resistance of SHA3-256 (128-bit post-quantum security per NIST SP 800-185). No lattice or number-theoretic assumptions are required.
PropertySTARK (H33)Groth16 SNARKPLONK SNARK
Trusted setupNonePer-circuitUniversal
Post-quantum secureYesNoNo
Proof size10-50 KiB192 bytes384 bytes
Verify time0.07-4 ms1.5 ms3 ms
Prover time1-500 ms2-10 s5-30 s

STARKs trade larger proof sizes (10-50 KiB vs 192-384 bytes for SNARKs) for elimination of trusted setup, post-quantum security, and significantly faster proving times. For the H33 use case (server-side proving, not on-chain verification), the proof size tradeoff is acceptable.

6. SHA3-256 Post-Quantum Security

All H33 STARK implementations use SHA3-256 (NIST FIPS 202) as the hash function for Merkle tree commitments, Fiat-Shamir transcript generation, and FRI (Fast Reed-Solomon Interactive Oracle Proof of Proximity) commitments. SHA3-256 provides:

7. Scaling Characteristics

Trace RowsProve (cold)VerifyProof Size
2^10 (1K)12 ms0.3 ms4.2 KiB
2^14 (16K)85 ms1.2 ms12 KiB
2^17 (128K)495 ms2.8 ms42 KiB
2^20 (1M)3,200 ms4.1 ms68 KiB

Prove time scales as O(n log n) where n is the number of trace rows. Verify time scales as O(log^2 n), remaining sub-5ms even for million-row traces. Proof size scales as O(log^2 n).

8. Reproducibility

# Build STARK benchmarks $ cargo build --release --features stark_bench # Run Lookup STARK benchmarks $ ./target/release/examples/stark_bench --mode lookup --iterations 1000000 # Run AIR STARK benchmarks (secp256k1) $ ./target/release/examples/stark_bench --mode air --circuit secp256k1 --iterations 1000 # Run scaling test $ ./target/release/examples/stark_bench --mode air --circuit fibonacci --rows 1024,16384,131072,1048576

9. Integration in H33 Pipeline

STARKs are used in two distinct locations within the H33 system:

  1. Production pipeline (Stage 3): Lookup STARK via CacheeEngine. 0.358 us verify latency per authentication. Less than 1% of pipeline time.
  2. H33-74-AIR (Proof of Life): secp256k1 STARK circuit for proving ECDSA signature validity. Used for on-demand attestation of key possession, not in the hot authentication path.

See Agent Infrastructure Benchmarks for the pipeline context of Lookup STARK performance.