Optimizing zkSNARK Proof Generation through Efficient Multi-Scalar Multiplication

Table of Contents
In the world of cryptographic proofs, zero-knowledge proofs (ZKPs) play a crucial role in ensuring security and privacy. Multi-scalar multiplication (MSM) is a core component of many ZKP systems, particularly zero-knowledge succinct non-interactive arguments of knowledge (zkSNARKs). This article explores the motivation behind accelerating MSM, the contributions of recent research, and proposed improvements to existing methods.

I. Overview


The increasing demand for privacy and security in blockchain environments and other applications has spurred interest in ZKP systems. MSM, a primary performance bottleneck in proof generation, requires efficient computation methods to make zkSNARKs more practical and widely adopted.


This article revisits recent advancements in precomputation-based MSM methods, generalizes these approaches, and presents improvements that lead to significant performance gains. Theoretical analyses and experimental results verify these enhancements.

II. Zero-Knowledge Proof Systems and zkSNARKs

Zero-Knowledge Proof Systems

Definition and Properties
Zero-Knowledge Proof Systems (ZKPs) are cryptographic protocols that enable one party, known as the prover, to convince another party, the verifier, that they know a value \( x \) without revealing any information about \( x \) itself. ZKPs are defined by three main properties:
1. Completeness: If the statement is true, an honest prover can convince the verifier of this fact.
2. Soundness: If the statement is false, no deceitful prover can convince the verifier otherwise, except with some negligible probability.
3. Zero-Knowledge: If the statement is true, no information about the value \( x \) is revealed to the verifier beyond the fact that the statement is true.
These properties ensure that ZKPs are both secure and privacy-preserving, making them ideal for various applications where confidentiality is crucial.
ZKPs have a wide range of applications in the digital world. Some notable applications include:
- Blockchain and Cryptocurrencies: ZKPs are used to enhance privacy and security in blockchain technologies. For instance, zkSNARKs are integral to privacy-focused cryptocurrencies like Zcash, allowing users to conduct transactions without revealing transaction details.
- Authentication Systems: ZKPs enable secure authentication processes where a user can prove their identity without revealing their password or other sensitive information.
- Secure Multi-Party Computation: ZKPs facilitate collaborative computations where parties can jointly compute a function over their inputs while keeping those inputs private.
- Confidential Data Sharing: Organizations can use ZKPs to prove the integrity of data shared with third parties without exposing the actual data.
If you want to find why Zero Knowledge are useful. Recently, we have published an article discussed about that topic here: When are Zero-Knowledge Proofs Useful?

Overview of zkSNARKs

Definition and Components
Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge (zkSNARKs) are a subclass of ZKPs that provide concise proofs and efficient verification. zkSNARKs have the following key components:
- Common Reference String (CRS): A setup phase generates a public CRS used by both the prover and verifier. This string is crucial for the security and efficiency of the zkSNARK.
- Prover: Using the CRS and the secret input, the prover generates a succinct proof that attests to the validity of a statement.
- Verifier: The verifier uses the CRS and the proof to confirm the statement's validity, doing so quickly and without needing to see the secret input.
Historical Development
The development of zkSNARKs has been a progressive journey:
- Non-Interactive Zero-Knowledge Proofs (NIZKs): The concept of NIZKs was introduced by Blum, Feldman, and Micali. NIZKs allow for proofs to be verified without interaction between the prover and verifier.
- Succinct Arguments of Knowledge: The idea of succinct proofs, where the size of the proof and the time to verify it are both small, was formalized by Kilian. This work laid the groundwork for zkSNARKs.
- Modern zkSNARKs: Advances in bilinear pairings and elliptic curve cryptography have enabled the development of practical zkSNARK systems. Notable contributions include the Groth-Sahai proofs and the Pinocchio protocol, which significantly improved the efficiency and applicability of zkSNARKs.

Pairing-Based zkSNARKs

Pairing-based zkSNARKs leverage elliptic curve pairings to achieve their succinctness and efficiency. The primary advantages of pairing-based zkSNARKs include:
- Fast Verification: Verification of zkSNARK proofs is computationally efficient, making them suitable for applications where quick verification is essential.
- Small Proof Size: The proofs generated are small, which reduces the storage and communication overhead.
- Non-Interactive: Once the CRS is set up, no further interaction is needed between the prover and verifier, streamlining the proof process.
Computational Challenges
Despite their advantages, pairing-based zkSNARKs face significant computational challenges:
- Multi-Scalar Multiplication (MSM): The proof generation process involves extensive MSM operations within elliptic curve groups. MSM is a computationally intensive task that can become a bottleneck in the zkSNARK generation process.
- Setup Phase: The CRS setup phase is critical and needs to be performed securely. Any compromise in the setup can undermine the security of the entire zkSNARK system.
- Complexity of Proof Generation: Generating proofs involves complex computations that require optimization to be practical for real-world applications.

III. Multi-Scalar Multiplication (MSM) in zkSNARKs

Definition and Importance

Multi-Scalar Multiplication (MSM) is a fundamental operation in elliptic curve cryptography, crucial for the efficiency of zkSNARKs. MSM involves computing the sum of multiple scalar multiplications of fixed points on an elliptic curve.
source: eprint.iacr.org/2024/750.pdf
This operation is computationally intensive and represents a significant bottleneck in zkSNARK proof generation. Efficient MSM computation is therefore vital for enhancing the overall performance of zkSNARK systems.
Existing MSM Computation Methods
Over the years, several methods have been developed to accelerate MSM computation. Here we discuss three prominent techniques: the Straus method, Pippenger’s Bucket Method, and the Luo-Fu-Gong (LFG) MSM Method.
Straus Method
The Straus method, also known as Shamir's trick, aims to optimize MSM by precomputing certain values. The method involves:
1. Precomputation: Precomputing a table of sums of fixed points multiplied by small integers.
2. Segmentation: Dividing each scalar into segments of fixed length.
3. Combination: Using the precomputed table to efficiently combine the segments through a series of additions and doublings.
This approach reduces the number of operations required by leveraging the precomputed values, making it more efficient than straightforward scalar multiplication.
Pippenger’s Bucket Method
Pippenger’s Bucket Method further optimizes MSM by sorting points into buckets based on the scalar values. The method proceeds as follows:
1. Sorting into Buckets: Grouping points into buckets where each bucket corresponds to a specific range of scalar values.
2. Intermediate Sums: Computing intermediate sums for each bucket.
3. Final Combination: Combining the intermediate sums to produce the final result.
This method is particularly effective for large-scale MSM computations, as it reduces the number of additions and the overall computational complexity.
Luo-Fu-Gong (LFG) MSM Method
The LFG MSM Method, introduced by Luo, Fu, and Gong, builds on previous techniques by incorporating radix representation and optimal bucket construction. The method involves:
1. Radix Representation: Expressing scalars in a radix \(q\) form, allowing for a structured decomposition.
2. Bucket Construction: Creating optimal buckets for storing precomputed points.
3. Scalar Decomposition: Decomposing scalars into components that fit within the bucket structure.
The LFG method aims to minimize the number of elliptic curve additions required, thus improving efficiency.

IV. Proposed Improvements and Results

Problems with Existing Methods

Despite the advancements in MSM computation methods, several issues persist, particularly with the LFG MSM method. An in-depth analysis of the LFG method reveals that Property 1, a cornerstone of the method, does not always hold. This inconsistency leads to inefficiencies and potential inaccuracies in the MSM computation.
Analysis of LFG Property 1
Property 1 of the LFG method asserts that for all integers
source: Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs by Xinxin Fan
However, upon closer inspection, we found that this property does not universally apply, resulting in gaps in the scalar range coverage. These gaps necessitate additional computational steps to handle the exceptions, undermining the efficiency gains promised by the LFG method.

Proposed Improvements

To address these issues and enhance the efficiency of MSM computation, we propose several key improvements:
Fixing LFG Property 1
Our first improvement involves a rigorous revision of the set \(B\) to ensure Property 1 holds consistently. This is achieved by:
1. Removing Redundant Elements: Identifying and eliminating elements in \(B\) that do not contribute to a complete and efficient decomposition.
2. Adding Necessary Elements: Incorporating new elements into \(B\) to fill gaps and ensure comprehensive coverage of the scalar range.
By refining the composition of \(B\), we ensure that every integer within the range can be expressed as \(t = mb\) or \(q - t = mb\), thereby eliminating the need for additional corrective computations.
Enhanced Scalar Decomposition
We introduce an enhanced scalar decomposition technique that complements the revised set B. This technique optimizes the representation of scalars, leading to more efficient MSM computation. The key aspects of this technique include:
1. Optimized Radix Representation: Adopting a radix that strikes an optimal balance between the complexity of precomputation and the efficiency of runtime operations. This involves selecting a radix value that minimizes the number of required operations while maintaining manageable precomputation costs.
2. Efficient Bucket Utilization: Structuring the buckets to maximize the reuse of precomputed values, thereby reducing the number of additions and doublings required during MSM computation.
Utilization of Efficient Endomorphisms
Endomorphisms on elliptic curves allow certain operations to be performed more efficiently. We leverage these endomorphisms to further reduce the computational overhead of MSM. This involves:
1. Identification of Suitable Endomorphisms: Selecting endomorphisms that are well-suited to the specific elliptic curve in use (e.g., BLS12-381).
2. Integration into MSM Computation: Incorporating the chosen endomorphisms into the MSM algorithm to streamline the computation process.

Implementation and Experimental Results

To validate our proposed improvements, we implemented the enhanced MSM algorithm and conducted comprehensive experiments to evaluate its performance.
Experimental Setup
Our experimental setup was designed to ensure relevance and comparability with existing methods. Key components of the setup included:
- Hardware Specifications: Standard cryptographic hardware commonly used in zkSNARK implementations.
- Software Environment: An optimized C++ implementation of the enhanced MSM algorithm.
- Elliptic Curve: The BLS12-381 curve, chosen for its widespread adoption and relevance to zkSNARKs.
Performance Evaluation
We conducted extensive performance evaluations to measure the impact of our proposed improvements. The results were compared against the performance of existing MSM computation methods, including the original LFG method.
Key metrics evaluated included:
1. Computation Speed: The time required to complete MSM operations. Our enhanced algorithm demonstrated a significant reduction in computation time compared to existing methods.
2. Efficiency: The number of elliptic curve additions and doublings required. Our approach resulted in fewer operations, contributing to overall efficiency gains.
3. Scalability: The ability to handle large-scale MSM computations. Our improvements showed better scalability, making the algorithm more suitable for practical zkSNARK applications.

V. Future Work

As we look towards the future, several promising directions emerge for further enhancing the efficiency and applicability of multi-scalar multiplication (MSM) in pairing-based zkSNARKs. Our research has laid a solid foundation, but there are numerous opportunities to build upon and extend our work.

Summary of Contributions

First, it's essential to recap the significant contributions of our current research:
1. Refinement of the LFG Method: We identified and rectified the inconsistencies in Property 1 of the LFG method, leading to a more reliable and efficient MSM computation.
2. Enhanced Scalar Decomposition: We developed an optimized scalar decomposition technique that balances precomputation complexity with runtime efficiency.
3. Efficient Endomorphisms Utilization: By integrating suitable endomorphisms into the MSM computation, we achieved significant reductions in computational overhead.
4. Performance Gains: Our experimental results demonstrated substantial improvements in speed, efficiency, and scalability over existing methods.
These contributions provide a robust platform for future research, and several specific areas of exploration hold promise for further advancements.
Exploring Additional Endomorphisms
Endomorphisms are a powerful tool for optimizing elliptic curve operations. While our current work has leveraged specific endomorphisms for the BLS12-381 curve, there is potential to explore additional endomorphisms for various curves. Future research can focus on:
1. Identification of New Endomorphisms: Investigating other elliptic curves and their associated endomorphisms to discover new opportunities for efficiency gains.
2. Generalization: Developing generalized techniques for incorporating endomorphisms into MSM computations across different cryptographic curves.
Parallel computing offers substantial opportunities for enhancing the performance of cryptographic algorithms. Our future work will explore:
1. Parallelized MSM Algorithms: Designing and implementing parallel versions of our enhanced MSM algorithm to exploit multi-core and distributed computing environments.
2. Load Balancing: Addressing the challenges of load balancing to ensure efficient distribution of computation across multiple processors.
3. Scalability Studies: Evaluating the scalability of parallelized MSM algorithms to understand their performance in large-scale cryptographic applications.
Adaptation to Other Curves
While the BLS12-381 curve is widely used, other elliptic curves are also prevalent in cryptographic applications. Future research will focus on:
1. Curve-Specific Optimizations: Adapting our improved MSM techniques to other popular elliptic curves, such as BN curves or Koblitz curves, to broaden the applicability of our methods.
2. Performance Comparisons: Conducting comparative studies to understand the performance trade-offs and advantages of our techniques across different curves.
Hardware Acceleration
Hardware acceleration can significantly boost the performance of cryptographic computations. Our future work will include:
1. FPGA and ASIC Implementations: Developing FPGA (Field-Programmable Gate Array) and ASIC (Application-Specific Integrated Circuit) implementations of our enhanced MSM algorithm to achieve higher speeds and lower power consumption.
2. Integration with Cryptographic Hardware: Exploring the integration of our MSM techniques with existing cryptographic hardware solutions to enhance their overall performance.
Enhanced Security Analysis
Security is paramount in cryptographic applications. Future research will focus on:
1. Robustness Analysis: Conducting thorough security analyses to ensure that our proposed improvements do not introduce vulnerabilities.
2. Adversarial Testing: Implementing adversarial testing scenarios to evaluate the resilience of our MSM algorithm against potential attacks.
Application to Other Cryptographic Protocols
While our research focuses on zkSNARKs, MSM is a fundamental operation in many other cryptographic protocols. Future work will explore:
1. Adaptation to Other Protocols: Adapting our enhanced MSM techniques to improve the efficiency of other protocols, such as digital signatures, key exchange mechanisms, and secure multiparty computation.
2. Cross-Protocol Performance Evaluation: Assessing the performance gains of our MSM improvements across different cryptographic protocols to demonstrate their broader impact.
Educational and Training Materials
To facilitate the adoption and understanding of our enhanced MSM techniques, future efforts will include:
1. Documentation and Tutorials: Creating comprehensive documentation and tutorials to guide developers in implementing and optimizing our MSM algorithms.
2. Workshops and Courses: Organizing workshops and online courses to educate the cryptographic community about our advancements and their practical applications.
Our current research has significantly advanced the state-of-the-art in MSM for pairing-based zkSNARKs. However, the field of cryptography is dynamic, and continuous innovation is essential. By exploring these future work directions, we aim to further enhance the efficiency, applicability, and security of MSM computations, contributing to the broader advancement of cryptographic technologies.


Accelerating MSM in pairing-based zkSNARKs is vital for the practical deployment of ZKP systems. This article presents significant advancements in MSM computation, validated by both theoretical and experimental results.

About Orochi Network

Orochi Network is a cutting-edge zkOS (An operating system based on zero-knowledge proof) designed to tackle the challenges of computation limitation, data correctness, and data availability in the Web3 industry. With the well-rounded solutions for Web3 Applications, Orochi Network omits the current performance-related barriers and makes ways for more comprehensive dApps hence, becoming the backbone of Web3's infrastructure landscape.
Event Recap
Monthly Report
Verifiable Random Function
Zero-Knowledge Proofs
Top Posts
Partnership Announcement
Layer 2
Event Recap
Immutable Ledger
Verifiable Random Function
Zero-Knowledge Proofs
Multisignature Wallet

Orosign Wallet

Manage all digital assets safely and securely from your mobile devices

zkDatabaseDownload Orosign Wallet
Coming soon

zkOS for Web3

© 2021 Orochi