Distinguished from elliptic curve-based SNARKs, STARKs can be viewed as hash-based SNARKs. One of the main challenges contributing to the current inefficiency of STARKs is that most values in actual programs are relatively small, such as indices in for loops, boolean values, and counters. However, to ensure the security of Merkle tree-based proofs, Reed-Solomon encoding is used to extend data, resulting in many redundant values occupying the entire field, even when the original values themselves are small. Addressing this inefficiency, reducing the field size has become a key strategy.
As shown in Table 1, the first generation of STARKs had a coding width of 252 bits, the second generation 64 bits, and the third generation 32 bits. Despite the reduced coding width in the third generation, there remains significant wasted space. In contrast, binary fields allow for direct bit-level manipulation, enabling compact and efficient encoding with minimal waste. This efficiency is realized in the fourth generation of STARKs.

Table 1: STARKs Derivation Path
In comparison to finite fields such as Goldilocks, BabyBear, and Mersenne31, which have gained attention recently, binary field research dates back to the 1980s. Today, binary fields are widely used in cryptography, with notable examples including:
When smaller fields are used, field extension operations become increasingly important for ensuring security. The binary field used by Binius relies entirely on field extension to guarantee both security and practical usability. Most of the polynomial computations involved in Prover operations do not need to enter the extended field, as they only need to operate in the base field, thereby achieving high efficiency in the small field. However, random point checks and FRI computations must still be performed in a larger extended field to ensure the necessary level of security.
There are two practical challenges when constructing a proof system based on binary fields: First, the field size used for trace representation in STARKs should be larger than the degree of the polynomial. Second, the field size used for the Merkle tree commitment in STARKs must be greater than the size after Reed-Solomon encoding extension.
Binius is an innovative solution to address these two problems by representing the same data in two different ways: First, by using multivariate (specifically multilinear) polynomials instead of univariate polynomials, representing the entire computation trace through their evaluations over โhypercubes.โ Second, since each dimension of the hypercube has a length of 2, it is not possible to perform standard Reed-Solomon extensions like in STARKs, but the hypercube can be treated as a square, and a Reed-Solomon extension can be performed based on this square. This method not only ensures security but also greatly enhances encoding efficiency and computational performance.
The construction of most modern SNARK systems typically consists of the following two components:
By selecting different PIOPs and PCS schemes, and combining them with suitable finite fields or elliptic curves, one can construct proof systems with distinct properties. For example:
When designing these systems, the compatibility between the chosen PIOP, PCS, and finite field or elliptic curve is critical to ensuring correctness, performance, and security. These combinations influence the size of the SNARK proof, the efficiency of verification, and determine whether the system can achieve transparency without a trusted setup, as well as support advanced features like recursive proofs or proof aggregation.
Binius combines HyperPlonk PIOP with Brakedown PCS and operates in a binary field. Specifically, Binius incorporates five key technologies to achieve both efficiency and security:
These innovations enable Binius to offer a compact, high-performance SNARK system, optimized for binary fields while maintaining robust security and scalability.
Towers of binary fields play a critical role in achieving fast, verifiable computations due to two primary factors: efficient computation and efficient arithmetization. Binary fields inherently support highly efficient arithmetic operations, making them ideal for cryptographic applications sensitive to performance. Moreover, their structure enables a simplified arithmetization process, where operations performed in binary fields can be represented in compact and easily verifiable algebraic forms. These characteristics, combined with the hierarchical structure of towers of binary fields, make them particularly suitable for scalable proof systems like Binius.

The term โcanonicalโ refers to the unique and direct representation of elements in a binary field. For example, in the most basic binary field $\mathbb{F}2
,๐๐๐ฆ๐โ๐๐๐ก๐ ๐ก๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐ก๐๐ฆ๐๐๐๐๐๐๐ก๐๐๐โ๐๐๐ก๐๐๐๐๐๐ฆ๐๐๐๐๐๐๐๐๐๐๐๐ก.๐โ๐๐ ๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐ ,๐คโ๐๐โ๐๐๐๐๐ก๐๐๐๐๐๐ ๐ข๐โ๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐ ๐๐๐ก๐๐ก๐๐๐๐ค๐๐กโ๐๐๐๐๐๐ฃ๐๐๐๐ข๐๐๐๐๐๐๐๐๐ก๐ .๐ด๐๐กโ๐๐ข๐โ๐32โ๐๐๐ก๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐ก๐ค๐๐กโ๐๐32๐๐๐ก๐ ,๐๐๐ก๐๐ฃ๐๐๐ฆ32โ๐๐๐ก๐ ๐ก๐๐๐๐๐๐๐๐ข๐๐๐๐ข๐๐๐ฆ๐๐๐๐๐๐ ๐๐๐๐๐ก๐๐๐๐๐๐๐๐๐๐๐๐๐๐ก,๐คโ๐๐๐๐๐ ๐๐๐๐๐๐ฆ๐๐๐๐๐๐ ๐๐๐๐ฃ๐๐๐๐กโ๐๐ ๐๐๐โ๐ก๐โ๐๐๐๐๐๐๐๐๐๐.๐ผ๐๐๐๐๐๐๐๐๐๐๐๐
\mathbb{F}_p$ , common reduction methods include Barrett reduction , Montgomery reduction , as well as specialized reduction methods for certain finite fields like Mersenne-31 or Goldilocks-64 . In binary fields $\mathbb{F}{2^k}$ , common reduction methods include special reduction (as used in AES), Montgomery reduction (as used in POLYVAL), and recursive reduction (as used in Tower fields). The paper Exploring the Design Space of Prime Field vs. Binary Field ECC-Hardware Implementations notes that binary fields do not require carry propagation in addition or multiplication, and squaring in binary fields is highly efficient due to the simplification rule
(๐+๐)2=๐2+๐2
.

Figure 1. Towers of Binary Field
As shown in Figure 1, a 128-bit string can be interpreted in multiple ways within the context of a binary field. It can be viewed as a unique element in the 128-bit binary field, or it can be parsed as two 64-bit tower field elements, four 32-bit tower field elements, sixteen 8-bit tower field elements, or 128 elements of
๐น2
. This flexibility in representation incurs no computational overhead, as it is merely a typecast of the bit string. This is a very interesting and useful property, as smaller field elements can be packed into larger field elements without additional computational cost. The Binius protocol leverages this property to enhance computational efficiency. Furthermore, the paper On Efficient Inversion in Tower Fields of Characteristic Two explores the computational complexity of multiplication, squaring, and inversion in
๐
-bit tower binary fields (decomposable into
๐
-bit subfields).

The PIOP design in the Binius protocol draws inspiration from HyperPlonk and incorporates a series of core checks to verify the correctness of polynomials and multivariate sets. These checks are essential for ensuring the integrity of computations within the proof system, especially when operating over binary fields. The key checks include:
While Binius and HyperPlonk share several similarities in their protocol designs, Binius introduces the following key improvements:
Thus, Binius enhances the flexibility and efficiency of the protocol by improving the existing PIOP SumCheck mechanism, particularly by providing stronger functionality for verifying more complex multivariate polynomials. These improvements not only address the limitations of HyperPlonk but also lay the foundation for future proof systems based on binary fields.
In the Binius protocol, the manipulation and construction of virtual polynomials play a crucial role in enabling efficient polynomial handling. Two main techniques are employed for these operations:
The Lasso protocol in Binius offers a highly efficient method for proving that elements in a vector
๐โ๐น๐
are contained within a predefined table
๐กโ๐น๐
. This lookup argument introduces the concept of โLookup Singularityโ and is well-suited for multilinear polynomial commitment schemes. The efficiency of Lasso is highlighted in two major aspects:
The Lasso protocol consists of three core components:
The Binius protocol adapts Lasso for binary field operations, assuming the current field is a prime field of large characteristic (much larger than the length of the column being looked up). Binius introduces a multiplicative version of the Lasso protocol, requiring the prover and verifier to increment the protocolโs โmemory counterโ operation not simply by adding 1 but by incrementing using a multiplicative generator within the binary field. However, this multiplicative adaptation introduces additional complexity: unlike an additive increment, the multiplicative generator does not increment in all cases, instead having a single orbit at 0, which may present an attack vector. To mitigate this potential attack, the prover must commit to a read counter vector that is non-zero everywhere to ensure protocol security.
The core idea behind constructing the Binius PCS (Polynomial Commitment Scheme) is packing. The Binius paper presents two Brakedown PCS schemes based on binary fields: one instantiated using concatenated codes, and another using block-level encoding, which supports the standalone use of Reed-Solomon codes. The second Brakedown PCS scheme simplifies the proof and verification process, though it produces a slightly larger proof size than the first one; however, this trade-off is worthwhile due to the simplification and implementation benefits it offers.
The Binius polynomial commitment primarily utilizes small-field polynomial commitment with evaluations in an extended field, small-field universal construction, and block-level encoding with Reed-Solomon code techniques.
Small-Field Polynomial Commitment with Extended Field Evaluation In the Binius protocol, polynomial commitments are performed over a small field
๐พ
, with evaluations taking place in an extended field
๐ฟ/๐พ
. This technique ensures that a multilinear polynomial
๐ก(๐0,โฆ,๐โโ1)
belongs to the domain
๐พ[๐0,โฆ,๐โโ1]
, while the evaluation points are in the larger field
๐ฟ
. This commitment structure enables efficient queries within the extended field, balancing security and computational efficiency.
Small-Field Universal Construction This construction defines key parameters like the field
๐พ
, its dimension
โ
, and the associated linear block code
๐ถ
, while ensuring that the extended field
๐ฟ
is large enough for secure evaluations. By leveraging properties of the extended field, Binius achieves robust commitments through linear block codes, maintaining a balance between computational efficiency and security.
Block-Level Encoding with Reed-Solomon Codes For polynomials defined over small fields like $\mathbb{F}2
,๐กโ๐๐ต๐๐๐๐ข๐ ๐๐๐๐ก๐๐๐๐๐๐๐๐๐๐ฆ๐ ๐๐๐๐๐โ๐๐๐ฃ๐๐๐๐๐๐๐๐๐๐๐ข๐ ๐๐๐๐ ๐๐๐โ๐๐๐๐๐๐๐๐๐๐๐๐ .๐โ๐๐ ๐ ๐โ๐๐๐๐๐๐๐๐ค๐ ๐๐๐๐๐๐๐๐๐ก๐๐๐๐๐๐ก๐๐๐๐ก๐๐๐ ๐๐๐๐โ๐๐๐๐๐๐๐๐๐ฆ๐๐๐๐๐๐๐ ๐๐ฆ๐๐๐๐๐๐๐๐๐กโ๐๐๐๐๐คโ๐๐ฆโ๐๐๐ค๐๐๐ก๐๐๐๐๐๐๐๐๐๐๐๐๐ (๐ ๐ข๐โ๐๐
\mathbb{F}{2^{16}}$ ), utilizing the efficiency and maximum distance separable properties of Reed-Solomon codes. After encoding, these rows are committed using a Merkle tree, which simplifies the operational complexity of small-field polynomial commitments. This approach allows for the efficient handling of polynomials in small fields without the computational burden usually associated with larger fields.
To further improve performance, Binius incorporates four major optimizations:
In the original Binius protocol, binary field multiplication is handled through a lookup-based scheme, which ties multiplication to linear addition operations based on the number of limbs in a word. While this method optimizes binary multiplication to an extent, it still introduces auxiliary commitments linearly related to the number of limbs. By adopting a GKR-based approach, the Binius protocol can significantly reduce the number of required commitments, leading to further efficiency in binary field multiplication operations.
The core idea of the GKR (Goldwasser-Kalai-Rothblum) protocol is to achieve agreement between the Prover (P) and Verifier (V) over a layered arithmetic circuit on a finite field
๐น
. Each node in this circuit has two inputs for computing the required function. To reduce the Verifierโs computational complexity, the protocol employs the SumCheck protocol, which progressively reduces claims about the circuitโs output gate values to lower-layer gate values, eventually simplifying the claims to statements about the inputs. This way, the Verifier only needs to verify the correctness of the circuit inputs.
The GKR-based integer multiplication algorithm in Binius transforms the check of whether two 32-bit integers
๐ด
and
๐ต
satisfy
๐ดโ ๐ต=?๐ถ
into verifying whether
(๐๐ด)๐ต=?๐๐ถ
holds in
๐น264โ
. This transformation, combined with the GKR protocol, significantly reduces the overhead associated with polynomial commitments. Compared to the previous Binius lookup-based scheme, the GKR-based multiplication approach requires only one auxiliary commitment and reduces the cost of SumChecks, making the algorithm more efficient, especially in cases where SumChecks are more economical than additional commitments. This method is becoming a promising solution for minimizing binary field polynomial commitment costs as Binius optimizations progress.
The paper Some Improvements for the PIOP for ZeroCheck proposes strategies to balance computational costs between the Prover (P) and Verifier (V), focusing on reducing data transmission and computational complexity. Below are key optimization techniques:
By transferring some of the computational burden to the Verifier, the Proverโs data transmission can be minimized. For instance, in round
๐
, the Prover sends
๐ฃ๐+1(๐)
for
๐=0,โฆ,๐+1
, and the Verifier checks whether
๐ฃ๐=๐ฃ๐+1(0)+๐ฃ๐+1(1)
holds.
Optimization: The Prover can avoid sending
๐ฃ๐+1(1)
, as the Verifier can compute it as
๐ฃ๐+1(1)=๐ฃ๐โ๐ฃ๐+1(0)
.
In the initial round, the Prover sends
๐ฃ1(0)=๐ฃ1(1)=0
, eliminating some evaluation calculations, which reduces both computational and transmission costs to
๐2๐โ1๐ถ๐น+(๐+1)2๐โ1๐ถ๐บ
.
During round
๐
, the Prover must send
๐ฃ๐+1(๐)
, calculated as
๐ฃ๐+1(๐)=โ๐ฅโ๐ป๐โ๐โ1๐ฟ^๐(๐ผ,(๐,๐,๐ฅ))๐ถ(๐,๐,๐ฅ)
.
Optimization: Instead, the Prover can send
๐ฃ๐+1โฒ(๐)=โ๐ฅโ๐ป๐โ๐โ1๐ฟ^๐(๐ผ๐+1,โฆ,๐ผ๐โ1,๐ฅ)๐ถ(๐,๐,๐ฅ),
where $v_i(X) = v_iโ(X) \cdot \hat{\delta}{i+1}((\alpha_0, \dots, \alpha_i), (r, X))
.๐ด๐ ๐กโ๐๐๐๐๐๐๐๐๐โ๐๐ ๐๐๐๐๐ ๐ ๐ก๐
\alpha
๐๐๐
r
,๐กโ๐๐๐๐๐๐๐๐๐
v_iโ(X)
๐๐ ๐๐๐ค๐๐๐กโ๐๐๐กโ๐๐ก๐๐
v_i(X)
,๐๐๐๐ข๐๐๐๐๐กโ๐๐๐๐๐ข๐๐๐๐๐๐ฃ๐๐๐ข๐๐ก๐๐๐๐๐๐๐๐ก๐ .๐โ๐๐๐๐ก๐๐โ๐๐๐ข๐๐๐โ๐๐๐๐๐๐๐กโ๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐๐๐
(1 - \alphai)v{i+1}โ(0) + \alpha_i v{i+1}โ(1) = v_iโ(X),
๐กโ๐๐๐๐๐ฆ๐๐๐ค๐๐๐๐๐๐๐๐ก๐๐ก๐๐๐๐ ๐๐๐ ๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐โ๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐๐ฆ.๐๐๐กโ๐กโ๐๐ ๐๐๐๐๐๐๐ฃ๐๐๐๐๐ก๐ ,๐กโ๐๐๐ฃ๐๐๐๐๐๐๐๐ ๐ก๐๐ ๐๐๐๐๐๐ฅ๐๐๐๐ก๐๐๐ฆ
2^{n-1}(d - 1)C_F + 2^{n-1}dC_G.
๐น๐๐
d = 3$ , these optimizations yield a cost reduction by a factor of 5/3.
For an honest Prover, the polynomial
๐ถ(๐ฅ0,โฆ,๐ฅ๐โ1)
is zero on
๐ป๐
and can be expressed as
๐ถ(๐ฅ0,โฆ,๐ฅ๐โ1)=โ๐=0๐โ1๐ฅ๐(๐ฅ๐โ1)๐๐(๐ฅ0,โฆ,๐ฅ๐โ1)
. Where
๐๐
is computed through ordered polynomial division, starting from
๐ ๐=๐ถ
. Sequential division by
๐ฅ๐(๐ฅ๐โ1)
computes
๐๐
and
๐ ๐
, with
๐ 0
representing the multilinear extension of
๐ถ
on
๐ป๐
, assumed to be zero.
Analyzing the Degrees of
๐๐
. For
๐>๐
,
๐๐
retains the same degree in
๐ฅ๐
as
๐ถ
. For
๐=๐
, the degree is reduced by 2, and for
๐<๐
, the degree is at most 1. Given a vector
๐=(๐0,โฆ,๐๐)
,
๐๐(๐,๐)
is multilinear for all
๐โค๐
. Moreover,
๐๐(๐,๐)=โ๐=0๐๐๐(๐๐โ1)๐๐(๐,๐)
is the unique multilinear polynomial matching
๐ถ(๐,๐)
on
๐ป๐โ๐
. For any
๐
and
๐ฅโ๐ป๐โ๐โ1
, it can be represented as
๐ถ(๐,๐,๐ฅ)โ๐๐(๐,๐,๐ฅ)=๐(๐โ1)๐๐+1(๐,๐,๐ฅ).
Thus, during each round of the protocol, a new
๐
is introduced, and its evaluation can be derived from
๐ถ
and the previous
๐
, allowing for interpolation optimization.
In the STARKs protocol implemented by Binius, the primary bottleneck for the prover is often the sum-check protocol rather than the Polynomial Commitment Scheme (PCS), due to the low commitment cost.

Figure 2. Relationship between Switchover round and Factor improvement
In 2024, Ingonyama proposed improvements for small-field-based Sumcheck protocols, focusing on Algorithms 3 and 4. These improvements were implemented and made publicly available here. Algorithm 4 incorporates the Karatsuba algorithm into Algorithm 3, reducing the number of extension field multiplications in exchange for more base field multiplications. This approach is more efficient when extension field multiplications are more expensive than base field ones.
๐ก
, which marks when the protocol reverts from the optimized version to the naive algorithm. Experiments indicate that the improvement factor peaks at the optimal switchover point and then follows a parabolic trend. When this point is exceeded, efficiency diminishes because the ratio between base field and extension field multiplications is greater in smaller fields, necessitating a timely reversion to the naive algorithm.
For certain applications, like the Cubic Sumcheck (
๐=3
), the small-field Sumcheck protocol delivers an order-of-magnitude improvement over the naive approach. For instance, in the base field
๐บ๐น[2]2. Impact of Base Field Size on Performance Smaller base fields (e.g.,
, Algorithm 4 outperforms the naive algorithm by nearly 30 times.
๐บ๐น[2]
) significantly enhance the efficiency of the optimized algorithm due to the larger disparity between the costs of extension field and base field multiplications. This leads to a more substantial improvement factor for the optimized algorithm.
๐บ๐น[2]
, Algorithm 4 achieves peak improvement factors of 6 for Algorithm 3 and 30 for Algorithm 4, indicating that Algorithm 4 is five times more efficient than Algorithm 3. The Karatsuba algorithm enhances runtime efficiency and optimizes the switchover point for both algorithms, with optimal points at
๐ก=5
for Algorithm 3 and
๐ก=8
for Algorithm 4.
๐(๐โ ๐ก)
memory, while Algorithm 3 needs
๐(2๐โ ๐ก)
memory. For
๐ก=8
, Algorithm 4 uses just 0.26 MB of memory, compared to the 67 MB required by Algorithm 3. This makes Algorithm 4 particularly suitable for memory-constrained environments, such as client-side proving with limited resources.
One of the main challenges of the Binius protocol is its relatively large proof size, which scales with the square root of the witness size at
๐(๐)
. This square-root scaling limits its competitiveness when compared to systems offering more succinct proofs. In contrast, polylogarithmic proof sizes, as achieved by advanced systems like Plonky3 through techniques such as FRI, are essential for ensuring truly โsuccinctโ verifiers. The FRI-Binius optimization aims to reduce Biniusโ proof size and improve its overall performance in comparison to more efficient systems.
The paper Polylogarithmic Proofs for Multilinears over Binary Towers, referred to as FRI-Binius, introduces a novel binary-field-based FRI (Fast Reed-Solomon Interactive Oracle Proof of Proximity) folding mechanism with four key innovations:
Core Process of FRI-Binius Multilinear Polynomial Commitment Scheme (PCS)
The FRI-Binius protocol optimizes binary-field multilinear polynomial commitment schemes (PCS) by transforming the initial multilinear polynomial, defined over the binary field
๐น2
, into a multilinear polynomial over a larger field
๐พ
.
Benefits of FRI-Binius
By applying this method, Binius is able to reduce its proof size by an order of magnitude, bringing it closer to the performance of state-of-the-art cryptographic systems, while remaining compatible with binary fields. The FRI folding method, optimized for binary fields, combined with algebraic packing and SumCheck optimizations, helps Binius generate smaller proofs without compromising verification efficiency.
This transformation marks a significant step toward improving proof size in Binius, ensuring that it becomes more competitive with other cutting-edge systems, particularly those focused on polylogarithmic proof sizes.

Table 2: Binius vs. FRI-Binius Proof Size Comparison

Table 3: Plonky3 FRI vs. FRI-Binius Comparison
The entire value proposition of Binius lies in its ability to use the smallest power-of-two field size for witnesses, selecting the field size as needed. Binius is a co-design scheme for โhardware, software, and FPGA-accelerated Sumcheck protocols,โ enabling fast proofs with very low memory usage.
Proof systems like Halo2 and Plonky3 involve four key computationally intensive steps: generating witness data, committing to the witness data, performing a vanishing argument, and generating the opening proof.
For example, with the Keccak hash function in Plonky3 and the Grรธstl hash function in Binius, the computational distribution for these four key steps is illustrated in Figure 3.

Figure 3. Smaller Commit Cost
This comparison shows that Binius has essentially eliminated the proverโs commitment bottleneck. The new bottleneck is the Sumcheck protocol, where issues such as numerous polynomial evaluations and field multiplications can be efficiently addressed with specialized hardware.
The FRI-Binius scheme, a variant of FRI, offers a highly attractive option by removing embedding overhead from the field proof layer without causing a significant cost increase in the aggregated proof layer.
Currently, the Irreducible team is developing its recursive layer and has announced a partnership with the Polygon team to build a Binius-based zkVM; the Jolt zkVM is transitioning from Lasso to Binius to enhance its recursive performance; and the Ingonyama team is implementing an FPGA version of Binius.





