Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Robinhood crypto volume jumps to $25b as equities, options and events fade

    March 15, 2026

    Crypto hackers target Hinge and Match Group in data leak

    March 15, 2026

    Southeast Asia welcomes Devcon 7!

    March 15, 2026
    Facebook X (Twitter) Instagram
    Cryptify Now
    • Home
    • Features
      • Typography
      • Contact
      • View All On Demos
    • Typography
    • Buy Now
    X (Twitter) Instagram YouTube LinkedIn
    Cryptify Now
    You are at:Home » Shipping an L1 zkEVM #2: The Security Foundations
    Ethereum

    Shipping an L1 zkEVM #2: The Security Foundations

    Olivia MartinezBy Olivia MartinezFebruary 23, 2026No Comments4 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Thanks to Arantxa Zapico, Benedikt Wagner, and Dmitry Khovratovich from the EF cryptography team for their contributions, and to Ladislaus, Kev, Alex, and Marius for the careful review and feedback.


    The zkEVM ecosystem has been sprinting for a year. And it worked! We crossed the finish line for real-time proving!

    Now comes the next phase: building something mainnet-grade.

    From speed to security

    In July, we published a north-star definition for realtime proving. Nine months later, the ecosystem crushed it: proving latency dropped from 16 minutes to 16 seconds, costs collapsed 45×, and zkVMs now prove 99% of all Ethereum blocks in under 10 seconds on target hardware.

    While the major performance bottlenecks have been cleared by the zkEVM teams, security still remains the elephant in the room.

    The case for 128-bit provable security

    Many STARK-based zkEVMs today rely on unproven mathematical conjectures to hit their security targets. Over the past months, STARK security has been going through a lot, with foundational conjectures getting mathematically disproven by researchers. Each conjecture that falls takes bits of security with it: what was advertised as 100 bits might actually be 80.

    The only reasonable path forward is provable security, and 128 bits remains the target. It’s the security level recommended by standardization bodies and validated by real-world computational milestones.

    For zkEVMs, this isn’t academic. A soundness issue is not like other security issues. If an attacker can forge a proof, they can forge anything: mint tokens from nothing, rewrite state, steal funds. For an L1 zkEVM securing hundreds of billions of dollars, the security margin is not negotiable.

    Three Milestones

    For us, security and proof size are both critical—but they’re also in tension. More security typically means larger proofs, and proofs must stay small enough to propagate across Ethereum’s P2P network reliably and in time.

    We are setting three milestones:

    Milestone 1: soundcalc integration Deadline: End of February 2026

    To measure security consistently, we created soundcalc: a tool that estimates zkVM security based on the latest cryptographic security bounds and proof system parameters. It’s a living tool and we plan to keep integrating the latest research and known attacks.

    By this deadline, participating zkEVM teams should have their proof system components and all of their circuits integrated with soundcalc. This gives us a common ground for the security assessments that follow. (For reference, see examples of previous integrations: #1, #2)

    Milestone 2: Glamsterdam Deadline: End of May 2026

    • 100-bit provable security (as estimated by soundcalc)
    • Final proof size ≤ 600 KiB
    • Compact description of recursion architecture and sketch of its soundness

    Milestone 3: H-star Deadline: End of 2026

    • 128-bit provable security (as estimated by soundcalc)
    • Final proof size ≤ 300 KiB
    • Formal security argument for the soundness of the recursion architecture

    Recent cryptographic and engineering advances make hitting the above milestones tractable: compact polynomial commitment schemes like WHIR, techniques like JaggedPCS, a bit of grinding, and a well-structured recursion topology can all contribute to a viable path forward.

    Recursion is particularly worth highlighting. Modern zkEVMs involve many circuits composed with recursion in custom ways, with lots of glue in between. Each team does it differently. Documenting this architecture and its soundness is essential for the security of the entire system.

    The path forward

    There’s a strategic reason to lock in on zkEVM security now.

    Securing a moving target is hard. Once teams have hit these targets and zkVM architectures stabilize, the formal verification work we’ve been investing in can reach its full potential. By H-star, we hope the proof system layer will have mostly settled. Not frozen forever, but stable enough to formally verify critical components, finalize security proofs, and write specifications that match deployed code.

    This is the foundation that is required to get to secure L1 zkEVMs.

    Building foundations

    A year ago, the question was whether zkEVMs could prove fast enough. That question is answered. The new question is whether they can prove soundly enough. We are confident they can.

    On our end:

    • In January, we’ll publish a post clarifying and formalizing the milestones above.
    • We will follow up with a technical post outlining proof system techniques for reaching the security and proof size targets.
    • At the same time, we will be updating Ethproofs to reflect this shift: highlighting security alongside performance.
    • We are here to help throughout this process. Reach out to the EF cryptography team.

    The performance sprint is over. Now let’s strengthen the foundations.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleWhy Samia calls for justice, implementation in climate action: Africa must rise with one voice
    Next Article Beeple turns ETHDenver into a post-apocalyptic wasteland
    Olivia Martinez

    Related Posts

    Southeast Asia welcomes Devcon 7!

    March 15, 2026

    Goerli Dencun Announcement | Ethereum Foundation Blog

    March 15, 2026

    Wrapping up the KZG Ceremony

    March 15, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Litecoin price outlook: is $80 next as BTC reclaims $92k?

    January 16, 2026

    Bitwise Dogecoin ETF filing starts 20-day SEC countdown for approval

    January 17, 2026

    XRP charts signal bullish divergence can; Ripple aims to reignite market confidence and lead a new altcoin cycle

    January 17, 2026

    DeadLock ransomware abuses Polygon blockchain to rotate proxy servers quietly

    January 18, 2026
    Don't Miss

    Robinhood crypto volume jumps to $25b as equities, options and events fade

    By James WilsonMarch 15, 2026

    Robinhood’s February data show crypto notional volumes up 9% to $25b while equity, options and…

    Crypto hackers target Hinge and Match Group in data leak

    March 15, 2026

    Southeast Asia welcomes Devcon 7!

    March 15, 2026

    On Polymarket and Kalshi, five‑minute crypto bets now dominate prediction flows

    March 15, 2026
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    About Us
    About Us

    CryptifyNow: Your daily source for the latest insights, news, and analysis in the ever-evolving world of cryptocurrency.

    X (Twitter) Instagram YouTube LinkedIn
    Our Picks

    Robinhood crypto volume jumps to $25b as equities, options and events fade

    March 15, 2026

    Crypto hackers target Hinge and Match Group in data leak

    March 15, 2026

    Southeast Asia welcomes Devcon 7!

    March 15, 2026
    Lithosphere News Releases

    KaJ Labs Strengthens Long-Term Vision for Interoperable AI and Blockchain Development

    January 18, 2026

    FurGPT Strengthens Global Presence Following Multi-Exchange Listings

    January 19, 2026

    FurGPT Taps into Kadena’s Scalable PoW Network to Expand Emotional-AI Reach and Global Token Utility

    January 21, 2026
    Copyright © 2026

    Type above and press Enter to search. Press Esc to cancel.