
Briefing
The critical problem addressed is the prohibitive inefficiency of post-quantum zero-knowledge proofs (ZKPs) when deployed on resource-constrained mobile devices, a bottleneck that severely limits the practical deployment of secure, transparent decentralized identity (zkID). This research provides a foundational breakthrough by rigorously benchmarking seven ZKP schemes against strict mobile CPU, RAM, and bandwidth budgets, conclusively identifying Binius and Ligero as the top performers for the common SHA-256 circuit. This empirical validation establishes a practical, future-proof path for developers to implement quantum-resistant, client-side verifiable computation, fundamentally enabling a new generation of private and scalable decentralized applications by shifting the proving burden entirely to the user’s device.

Context
The established theoretical challenge in decentralized identity is the necessity of a ZKP system that satisfies three simultaneous constraints ∞ post-quantum security, transparency (no trusted setup), and efficiency on mobile hardware. Traditional SNARKs often rely on trusted setups or large setup keys unacceptable for mobile data plans, while post-quantum schemes frequently rely on primitives like SHA-256 hashing, which are notoriously inefficient for ZKP implementations. This convergence of requirements created a critical, unsolved performance bottleneck for any system aiming to offer a truly secure and private user experience without relying on centralized provers.

Analysis
The paper’s core mechanism is a systematic, empirical benchmarking of existing transparent, post-quantum ZKP schemes against a standardized SHA-256 circuit, a necessary component for many zkID systems. The methodology moves beyond theoretical security analysis to establish real-world viability by measuring prover time, RAM usage, and proof size on representative mobile hardware. The Binius scheme, which leverages a linear-time polynomial commitment, demonstrates a superior overall trade-off, achieving the fastest proving time and smallest proof size.
The Ligero scheme is identified as a strong runner-up, achieving its performance by utilizing modern WebGPU capabilities. The research conceptually differs from prior work by establishing a practical performance frontier for client-side proving, providing the first clear, data-driven selection criteria for foundational cryptographic primitives in a resource-constrained environment.

Parameters
- Binius Proving Time ∞ ≈5 s (The approximate time required to generate a proof for the SHA-256 circuit on mobile hardware.)
- Binius RAM Usage ∞ sub-50 MB (The memory footprint required by the Binius prover, a key metric for mobile feasibility.)
- Circuit Input Size ∞ 2 kB (The size of the input data for the standardized SHA-256 circuit used in the benchmarks.)
- Schemes Compared ∞ Seven (The total number of transparent, post-quantum ZKP schemes evaluated in the study.)

Outlook
This research provides an essential strategic roadmap for developers of decentralized applications and ZK library maintainers, immediately unlocking the ability to implement quantum-resistant zkID systems where users can privately verify claims from their mobile device. The next step involves building upon these benchmarks to further optimize ZKP primitives and hardware co-design, potentially leading to fully private, quantum-resistant layer-2 rollups. In the 3-5 year horizon, this work enables a shift toward a truly stateless blockchain architecture where most verifiable computation is performed client-side, dramatically enhancing decentralization and reducing the computational burden on network validators.

Verdict
This research delivers the essential performance metrics for selecting the foundational cryptographic primitives that will secure and enable the post-quantum, client-side decentralized web.
