
Briefing
The foundational problem in Zero-Knowledge (ZK) proofs for Random Access Machine (RAM) programs is the inherent processor expressiveness tradeoff, where supporting more instructions drastically increases circuit complexity and diminishes performance. This research introduces ZKBag , a novel cryptographic primitive constructed from linearly homomorphic commitments, which acts as a secure, abstract data structure capturing the properties of a physical bag for memory management. The ZKBag-based protocol, Dora, leverages the disjunctive structure of the processor circuit to make the computational and communication complexity of proving each execution step constant in the number of supported instructions. This breakthrough fundamentally eliminates the expressiveness bottleneck, offering the single most important implication ∞ the realization of concretely efficient, general-purpose ZK-Virtual Machines capable of proving arbitrarily complex software execution at scale.

Context
The established theoretical challenge in verifiable computation, particularly for general-purpose programs, has been the processor expressiveness tradeoff. Previous ZK protocols for RAM programs forced an engineering compromise ∞ a processor design with a small instruction set minimized the size of the verification circuit, but this required programs to be emulated over a larger number of execution steps, thereby increasing the total proving time. Conversely, a highly expressive processor with many instructions required a massive, computationally expensive circuit to verify the execution logic. This fundamental limitation meant that efficient ZK-Rollups and ZK-VMs were perpetually constrained by a suboptimal choice between a highly specialized, limited instruction set and prohibitively high proving costs for general computation.

Analysis
The core mechanism, named Dora, is enabled by the new cryptographic primitive, the ZKBag. Conceptually, the ZKBag functions as a commitment scheme that allows a prover to commit to a set of values (the bag’s contents) and later prove properties about these values without revealing them. It is constructed using linearly homomorphic commitments, allowing for algebraic manipulation and verification of memory operations. The Dora protocol uses the ZKBag to manage the RAM state.
When an instruction executes, the prover uses the ZKBag to commit to the old memory state and the new memory state. The crucial innovation is that the cost of verifying a single execution step is made independent of the total number of instructions supported by the processor. This is achieved by proving that the memory access is consistent with the ZKBag’s contents using a succinct permutation proof, which can be batched and verified efficiently. The new model replaces the complex circuit-based verification of the entire instruction set with a simple, constant-cost check on the ZKBag’s state change, thereby decoupling expressiveness from performance complexity.

Parameters
- Per-Step Complexity ∞ The computational and communication complexity of proving each step is constant in the number of supported instructions. This is the asymptotic measure of efficiency improvement.
- Prover Time ∞ Proving correct execution of a processor with thousands of instructions and thousands of gates takes just a few milliseconds per step on commodity hardware. This is the concrete measure of performance.
- Communication Overhead ∞ The verifier sends only a single field element in each step of the computation, ensuring minimal interaction.

Outlook
The ZKBag primitive and the Dora protocol open a new research avenue for designing verifiable computation systems by focusing on the algebraic structure of memory access rather than the circuit structure of the processor. In the next three to five years, this work is poised to unlock the next generation of ZK-VMs and general-purpose ZK-Rollups, making them practical for complex, real-world software. The ability to support a vast instruction set with constant-time overhead per step eliminates a major barrier to the adoption of fully verifiable, private computation for decentralized applications. Future research will likely focus on further optimizing the underlying homomorphic commitment schemes and integrating the ZKBag into recursive proof composition frameworks for infinite-scale verification.
