Succinct Network explained in 3 Difficulty Levels

Samarth SaxenaSamarth Saxena
6 min read

Introduction

Succinct Labs has emerged as a significant player in the zero-knowledge proof space, yet for many developers, the technology remains difficult to understand. It addresses a fundamental problem: writing circuits for zero-knowledge proofs is basically torture for devs, requiring specialized knowledge that makes building ZK applications nearly impossible for most people.

This blog post breaks down Succinct Network in 3 difficulty levels, from beginner to advanced developer. We'll explore how Succinct allows developers to prove program execution using normal programming languages like Rust and C++, and how their "marketplace of proofs" works.

If you prefer learning from a video instead, go ahead and watch this intentionally overedited and chaotic explainer:

Succinct Network explained for Noobs

The Core Concept: Zero-Knowledge Proofs Made Simple

At its most basic level, Succinct Network is a marketplace where you can generate zero-knowledge proofs for any piece of software without the traditional complexity. But first, you need to understand what zero-knowledge proofs actually are.

Imagine you want to prove to your friend that you have a Succinct testnet code, without actually showing the code to them. How do you do that? Simple. Just visit testnet.succinct.xyz, and show them that you can access the games there and earn stars. This is kind of how zk-proofs work too; you're proving you know something without revealing the actual information.

In Succinct's case, the proof needed is that a program was run correctly. Traditionally, generating such proofs requires writing complex circuits, which is extremely difficult and time-consuming. Succinct shines because it allows developers to write code in normal languages like Rust and C++, then use their SP1 system to prove the program's execution without touching any circuit code.

SP1 and Succinct Network

Succinct Labs creates two main products that work together:

SP1: This is the proving engine that takes your normal code (written in Rust or C++) and generates zero-knowledge proofs that the code ran correctly. Think of it as a translator that converts regular programming into cryptographic proofs.

Succinct Network: This is the marketplace where proof generation happens. You can generate zero-knowledge proofs for any piece of software, whether it's a blockchain, bridge, oracle, AI agent, video game, or anything in between. The network aims to give you the cheapest yet most efficient proofs.

The Key Players

The system involves three main participants:

Requesters: These are developers or applications that need proofs generated for their programs. They submit their code and pay fees to get proofs.

Provers: These are the parties who actually generate the proofs using their computing hardware. They compete to provide proof generation services and earn fees in return.

The Network: This coordinates between requesters and provers, ensuring proofs are generated efficiently and fairly distributed among available provers.

The beauty of this system is that it makes zero-knowledge proofs accessible to any developer, regardless of their cryptographic expertise. Instead of spending months learning circuit design, you can focus on building your application and let Succinct Network handle the complex proof generation.

Succinct Network explained for Pros

How the Marketplace Actually Works

The Succinct Network operates as a competitive marketplace where provers bid to generate proofs for incoming requests. When a requester submits a program and sets a fee (let's say $100), multiple provers compete by submitting bids indicating how much they're willing to pay for the right to generate that proof.

Here's where it gets interesting: it's not necessary that the prover with the highest bid will always win. The process of selecting the winner is stochastic, not deterministic, and this is done to prevent centralization. Without this mechanism, the highest bidders - those with extremely good hardware and high profit margins - would win every single request, creating a monopoly of ultra-rich provers hogging all the proof requests.

The Bidding System in Action

Let's walk through a practical example. A requester wants a proof for their program and sets the fee to $100. Prover A bids $40, Prover B bids $45, Prover C bids $46, and then Prover D comes in with their juiced up RTX6969 and bids $75. While Prover D will have a higher chance of winning the bid due to their higher bid, it's not guaranteed they'll win.

This approach by Succinct lets smaller provers occasionally win, earn fees, and gradually upgrade their hardware. It creates a more sustainable ecosystem where participants with modest hardware can still participate meaningfully rather than being completely priced out by well-funded competitors.

Proving Pools and Collaboration

If you're devoid of beefy hardware, that's fine too. You can join proving pools to both contribute to and benefit from the network. Think mining pools, but instead of mining crypto, you're generating zk-proofs. This democratizes access to the proving process and allows smaller participants to pool their resources together.

Succinct Network Explained for Trenchwarriors

The Mathematical Foundation of Stochastic Selection

To explain how exactly the winner is decided in Succinct's bidding system, we need to dive into the math. The probability of winning is given by:

where k goes from 1 to m (total number of provers).

Stay with me now - this looks complicated, but it really isn't. bi represents the bid of prover i (as in prover 1, prover 2, etc.).

The denominator is the sum of all bids raised to the power of alpha, where each bk represents individual prover bids from k=1 to m.

The Alpha Parameter: Controlling Centralization

Alpha is basically a measure of how much priority the highest bidding prover should be given. This parameter is crucial for the network's decentralization:

  • If alpha = 1: The highest bidder has a significantly higher chance of winning, because the probability of winning is directly proportional to the bid amount. This approaches a purely economic auction.

  • As alpha approaches 0: The chances of all bidders winning become more equal, regardless of bid amounts. This maximizes fairness but reduces economic efficiency.

The alpha value can be decided by the protocol and represents a fundamental trade-off between economic efficiency and decentralization. Too high, and you get centralization; too low, and you lose the economic incentives that drive quality service provision.

Economic Mechanisms and Rebates

The bids of losing bidders can either be returned to them or given to the requester as a rebate. This creates interesting economic dynamics where requesters might receive partial refunds when there's high competition among provers, effectively making proof generation cheaper during peak competition periods.

Cryptographic Integrity Through Embedding

The system's security relies on two key embedding mechanisms:

Request-time Nonce Embedding: Each proof request generates a unique nonce that gets cryptographically embedded into the proof itself. This means proofs are intrinsically tied to their specific requests, preventing any reuse across different jobs even if the computational parameters are identical.

Prover Address Embedding: During proof construction, the prover's address becomes part of the cryptographic proof itself. This creates an unforgeable link between the prover and their work, making proof theft impossible. Any attempt to copy would require regenerating the entire proof, which defeats the purpose of copying in the first place.

These mechanisms ensure that the competitive marketplace maintains its integrity while preventing various attack vectors that could undermine the economic model or proof authenticity.

Conclusion

In this article, we've seen how Succinct Network revolutionizes zero-knowledge proof generation by creating a marketplace that makes ZK technology accessible to any developer. Through SP1's circuit-free approach, stochastic bidding mechanisms, and embedded security features, it eliminates the traditional barriers that made ZK proofs practically impossible for most applications.

Thank you so much for reading to the end! I hope you enjoyed this article and learnt something new. Until the next one 🫡

0
Subscribe to my newsletter

Read articles from Samarth Saxena directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Samarth Saxena
Samarth Saxena

I am a Web3 Developer and Technical Writer from India. I love to write about the things I learn and understand. I believe that being serious is not required as long as one is sincere. I thus tend to have fun in everything that I do.