Justin Thaler Profile
Justin Thaler

@SuccinctJT

Followers
7K
Following
461
Media
4
Statuses
289

Research Partner @ a16z crypto Associate Professor of CS at Georgetown.

Joined January 2022
Don't wanna be here? Send us removal request.
@SuccinctJT
Justin Thaler
5 months
6/ So yes, zkVMs and SNARKs hold enormous potential, but we flirt with disaster if we pretend they’re ready for prime time. I’ll be using these stages to track zkVM progress in the coming years—and hope others will too. Check out my post here:
Tweet card summary image
a16zcrypto.com
The stages for zkVM development, the completion of which will take several years. Don’t let anyone tell you differently. 
3
4
50
@SuccinctJT
Justin Thaler
5 months
5/ Crucially, we must isolate a proof system’s fundamental efficiency. Right now, many benchmarks bundle everything—proof system, engineering, hardware boosts, and hand-tuned precompiles—into a single top-line number, obscuring where we really stand.
4
1
26
@SuccinctJT
Justin Thaler
5 months
4/ On performance, overheads versus native execution still exceed 100,000×—a non-starter for most use cases. My post proposes five “performance stages” to slash that overhead by orders of magnitude and eventually enable on-device proofs.
1
0
22
@SuccinctJT
Justin Thaler
5 months
3/ On security, I identify three stages for formal verification: . • Verified protocols • Verified verifiers • Verified provers. Until we reach Stage 2, we can’t really call a zkVM “secure”—and getting there is still likely several years off.
2
0
26
@SuccinctJT
Justin Thaler
5 months
2/ I’ve just published a post outlining a structured roadmap for zkVM development. It separates “security stages” from “speed stages,” giving us a transparent way to track progress. Read it here:
Tweet card summary image
a16zcrypto.com
The stages for zkVM development, the completion of which will take several years. Don’t let anyone tell you differently. 
1
11
73
@SuccinctJT
Justin Thaler
5 months
1/ Beware the hype: while SNARKs and zkVMs show immense promise, they’re not ready for complex, high-stakes deployments. Bugs are everywhere, formal verification is nascent, and proofs can be hundreds of thousands of times slower than native execution.
24
61
361
@SuccinctJT
Justin Thaler
5 months
RT @recmo: @Ingo_zk @yuval_domb It's no exaggeration that this will make most cryptography 10-20% faster.
0
4
0
@SuccinctJT
Justin Thaler
6 months
RT @zkv_xyz: Memory checking is a major bottleneck in zkVMs. This new paper by @SuccinctJT and @srinathtv improves it by 10×, making zkVM….
0
9
0
@SuccinctJT
Justin Thaler
7 months
8/ Bottom line: Twist & Shout validate our big design bets in Jolt and, as a bonus, give much faster SNARKs outside of the zkVM context too. See the post and paper for details, and stay tuned for more updates as the Jolt implementation matures.
Tweet card summary image
a16zcrypto.com
Twist and Shout -- state-of-the-art memory-checking arguments that ensure a prover correctly handles every read and write to the VM’s memory
3
0
18
@SuccinctJT
Justin Thaler
7 months
7/ If you prefer non-uniform circuits to zkVMs, Shout implies a Spartan variant, which we call SpeedySpartan, that is an order of magnitude faster than Spartan itself. The SpeedySpartan prover simply commits to witness. The rest is field ops!.
1
0
15
@SuccinctJT
Justin Thaler
7 months
6/ On “SNARK-friendly VMs”: Twist & Shout bring the cost profile of SNARKs even closer to that of real CPUs. Proposals for “SNARK-friendly” VMs at best cater to today’s SNARK limits, and prevent reuse of mature tooling.
1
0
12
@SuccinctJT
Justin Thaler
7 months
5/ The key performance dichotomy in SNARK design isn’t “big fields vs. small fields” or “hashing vs. curves”. It’s the sum-check protocol and multilinear polynomials vs. univariate polynomials.
1
4
30
@SuccinctJT
Justin Thaler
7 months
4/ One takeaway: 256-bit or binary fields are better than 31-bit or 64-bit fields for SNARK performance. One reason among many: committing to 0s is basically free with elliptic curves and 30x faster in binary fields than in 31-bit fields.
1
0
14
@SuccinctJT
Justin Thaler
7 months
3/ Key insight of Twist+Shout: The prover can quickly commit to huge, sparse vectors, making memory-checking boil down to massive but straightforward constraint systems. Crucially, these constraints are sparse, and the sum-check prover only pays for non-zero elements.
1
0
14
@SuccinctJT
Justin Thaler
7 months
2/ Jolt’s design turns every VM action into lookups (reads into read-only memory) or reads/writes (for registers + RAM). Today we use Spice for reads/writes and Lasso for lookups. Soon, we'll switch Spice to Twist and Lasso to Shout.
1
0
12
@SuccinctJT
Justin Thaler
7 months
1/ We just unveiled Twist and Shout, two new memory-checking arguments designed to supercharge the Jolt zkVM. Expect ~3x end-to-end prover speedups (on top of 2x improvements that are already in progress), plus shorter proofs. Full post:
Tweet card summary image
a16zcrypto.com
Twist and Shout -- state-of-the-art memory-checking arguments that ensure a prover correctly handles every read and write to the VM’s memory
13
30
183
@SuccinctJT
Justin Thaler
9 months
6/ Read more about our journey toward a verified zkVM here, and stay tuned for more updates:
Tweet card summary image
a16zcrypto.com
How to get the bugs out of SNARKs so they can fulfill their promise of unparalleled scalability and enhanced privacy
4
7
53
@SuccinctJT
Justin Thaler
9 months
5/ zkVMs today are massive, with codebases reaching hundreds of thousands of lines, and almost certainly contain critical flaws. The rush to deploy them worries me. This informs Jolt’s focus on simplicity in addition to performance.
1
1
31
@SuccinctJT
Justin Thaler
9 months
4/ But the biggest challenge lies beyond soundness. Ensuring Jolt’s Rust implementation matches its specification is where the real work begins—and we likely won’t even start that in earnest for another year or more.
1
1
20
@SuccinctJT
Justin Thaler
9 months
3/ We’ve already verified Jolt’s table decompositions, the backbone of its lookup-centric architecture. Next, we’ll tackle formal verification of the polynomial IOPs powering Jolt (Spartan, Lasso, Spice).
1
1
21