Zero-Knowledge · 8 min read

Recursive ZK Proofs:
Proving Proofs for Scalability

Understanding recursive composition of ZK proofs for enhanced scalability.

67ns
Proof Verify
SHA3-256
Hash
PQ
Secure
Zero
Knowledge Leaked

Recursive ZK proofs are proofs that verify other proofs. This seemingly circular concept enables remarkable scalability: compress unlimited computation into a single, constant-size proof.

The Recursion Concept

Consider a chain of proofs:

The final proof verifies the entire chain. A verifier checking Proof₃ confirms C₁, C₂, and C₃—all at once, in constant time.

Power of Recursion

Verify a million computations by checking one proof. Each recursive step adds only constant overhead.

How It Works

The circuit for recursive verification:

template RecursiveStep() {
  // Previous proof (public)
  signal input previousProof;
  signal input previousPublicInputs;

  // New computation (private)
  signal private input newComputation;

  // Output
  signal output newAccumulatedState;

  // 1. Verify previous proof
  component verifier = Verifier();
  verifier.proof <== previousProof;
  verifier.publicInputs <== previousPublicInputs;
  verifier.valid === 1;

  // 2. Execute new computation
  component step = ComputationStep();
  step.previousState <== previousPublicInputs.state;
  step.input <== newComputation;

  // 3. Output new state
  newAccumulatedState <== step.newState;
}

Technical Challenges

Verification Circuit Size

The SNARK verifier itself must be expressed as a circuit. For SNARKs with pairing operations, this is expensive.

Solutions:

Accumulation and Folding

Modern approaches avoid full verification at each step:

Accumulation: Collect verification obligations, check all at end

Folding: Combine multiple instances into one of same size

These dramatically reduce per-step overhead.

Applications

Blockchain Scaling (Rollups)

Incrementally Verifiable Computation (IVC)

Proof Aggregation

Notable Systems

Performance

Recursive proof systems achieve:

Recursive ZK proofs unlock unlimited scalability. Verify a billion operations with the same cost as verifying one.

Ready to Go Quantum-Secure?

Start protecting your users with post-quantum authentication today. 1,000 free auths, no credit card required.

Get Free API Key →

Build With Post-Quantum Security

Enterprise-grade FHE, ZKP, and post-quantum cryptography. One API call. Sub-millisecond latency.

Get Free API Key → Read the Docs
Free tier · 10,000 API calls/month · No credit card required