Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1269

zk-SNARK

What is zk-SNARK?

zk-SNARKA Zero-Knowledge Succinct Non-Interactive Argument of Knowledge: a small, fast-to-verify proof that a computation was performed correctly, without revealing its inputs.


A zk-SNARK (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) is a non-interactive proof system that produces proofs only a few hundred bytes long and verifiable in milliseconds, regardless of the underlying computation size. Constructions such as Groth16, PLONK, and Halo2 rely on elliptic-curve pairings or polynomial commitments and usually require a trusted setup, typically generated through a multi-party ceremony to avoid a single point of trust. zk-SNARKs power privacy coins (Zcash), Ethereum zk-rollups (zkSync, Polygon zkEVM, Scroll), and confidential identity systems. Their main trade-offs are heavier prover cost and reliance on cryptographic assumptions that may be vulnerable to quantum attacks unless lattice-based variants are used.

Examples

  1. 01

    Zcash uses zk-SNARKs to hide transaction sender, receiver, and amount on a public blockchain.

  2. 02

    zkSync Era and Polygon zkEVM compress thousands of Ethereum transactions into one on-chain SNARK proof.

Frequently asked questions

What is zk-SNARK?

A Zero-Knowledge Succinct Non-Interactive Argument of Knowledge: a small, fast-to-verify proof that a computation was performed correctly, without revealing its inputs. It belongs to the Cryptography category of cybersecurity.

What does zk-SNARK mean?

A Zero-Knowledge Succinct Non-Interactive Argument of Knowledge: a small, fast-to-verify proof that a computation was performed correctly, without revealing its inputs.

How does zk-SNARK work?

A zk-SNARK (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) is a non-interactive proof system that produces proofs only a few hundred bytes long and verifiable in milliseconds, regardless of the underlying computation size. Constructions such as Groth16, PLONK, and Halo2 rely on elliptic-curve pairings or polynomial commitments and usually require a trusted setup, typically generated through a multi-party ceremony to avoid a single point of trust. zk-SNARKs power privacy coins (Zcash), Ethereum zk-rollups (zkSync, Polygon zkEVM, Scroll), and confidential identity systems. Their main trade-offs are heavier prover cost and reliance on cryptographic assumptions that may be vulnerable to quantum attacks unless lattice-based variants are used.

How do you defend against zk-SNARK?

Defences for zk-SNARK typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for zk-SNARK?

Common alternative names include: SNARK, Succinct Non-Interactive Argument of Knowledge.

Related terms