Close Menu
    Trending
    • XRP Leverage Flush Points To Possible Squeeze
    • Ethereum News: Consensys and Joseph Lubin Add 30,000 ETH to DeFi United
    • Tether Records $1B Net Profit in Q1 Attestation Report
    • April 2026 Work Progress: New Homepage, Quai Pools, and Reward Reductions
    • European Investors Eye Crypto-Driven Bank Migration
    • Bitcoin At Risk As TD Sequential Flashes Key Bearish Signal
    • Bitcoin Price Prediction: Forbes Takes Aim at Eric Trump’s American Bitcoin – Chinese Propaganda
    • Was Bitcoin’s April Surge Speculative or Structural? CryptoQuant Offers Insights
    CryptoGate
    • Home
    • Bitcoin News
    • Cryptocurrency
    • Crypto Market Trends
    • Altcoins
    • Ethereum
    • Blockchain
    • en
      • en
      • fr
      • de
      • it
      • ja
    CryptoGate
    Home»Ethereum»Verkle tree structure | Ethereum Foundation Blog
    Ethereum

    Verkle tree structure | Ethereum Foundation Blog

    CryptoGateBy CryptoGateNovember 3, 2025No Comments7 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A Verkle tree is a dedication scheme that works just like a Merkle tree, however has a lot smaller witnesses. It really works by changing the hashes in a Merkle tree with a vector dedication, which makes wider branching elements extra environment friendly.

    Because of Kevaundray Wedderburn for suggestions on the submit.

    Overview

    For particulars on how verkle bushes work, see:


    The intention of this submit is to elucidate the concrete format of the draft verkle tree EIP. It’s geared toward shopper builders who need to implement verkle bushes and are on the lookout for an introduction earlier than delving deeper into the EIP.

    Verkle bushes introduce plenty of modifications to the tree construction. Probably the most important modifications are:

    • a change from 20 byte keys to 32 byte keys (to not be confused with 32 byte addresses, which is a separate change);
    • the merge of the account and storage tries; and eventually
    • The introduction of the verkle trie itself, which makes use of vector commitments as an alternative of hashes.

    Because the vector dedication scheme for the verkle tree, we use Pedersen commitments. Pedersen commitments are based mostly on elliptic curves. For an introduction to Pedersen commitments and learn how to use them as polynomial or vector commitments utilizing Inside Product Argumentss, see here.

    The curve we’re utilizing is Bandersnatch. This curve was chosen as a result of it’s performant, and likewise as a result of it’ll permit environment friendly SNARKs in BLS12_381 to motive in regards to the verkle tree sooner or later. This may be helpful for rollups in addition to permitting an improve the place all witnesses may be compressed into one SNARK as soon as that turns into sensible, while not having an additional dedication replace.

    The curve order/scalar subject dimension of bandersnatch is p = 13108968793781547619861935127046491459309155893440570251786403306729687672801, which is a 253 bit prime. Because of this, we will solely safely decide to bit strings of at most 252 bits, in any other case the sector overflows. We selected a branching issue (width) of 256 for the verkle tree, which implies every dedication can decide to as much as 256 values of 252 bits every (or to be exact, integers as much as p – 1). We write this as Commit(v₀, v₁, …, v₂₅₅) to decide to the listing v of size 256.

    Structure of the verkle tree

    One of many design targets with the verkle tree EIP is to make accesses to neighbouring positions (e.g. storage with virtually the identical deal with or neighbouring code chunks) low cost to entry. With a view to do that, a key consists of a stem of 31 bytes and a suffix of 1 byte for a complete of 32 bytes. The important thing scheme is designed in order that “shut” storage areas are mapped to the identical stem and a unique suffix. For particulars please take a look at the EIP draft.

    The verkle tree itself is then composed of two varieties of nodes:

    • Extension nodes, that symbolize 256 values with the identical stem however completely different suffixes
    • Inside nodes, which have as much as 256 youngsters, which may be both different internal nodes or extension nodes.

    The dedication to an extension node is a dedication to a 4 factor vector; the remaining positions can be 0. It’s:

    C₁ and C₂ are two additional commitments that decide to all of the values with stem equal to stem. The rationale we want two commitments is that values have 32 bytes, however we will solely retailer 252 bits per subject factor. A single dedication would thus not be sufficient to retailer 256 values. So as an alternative C₁ shops the values for suffix 0 to 127, and C₂ shops 128 to 255, the place the values are break up in two as a way to match into the sector dimension (we’ll come to that later.)

    The extension along with the commitments C₁ and C₂ are known as “extension-and-suffix tree” (EaS for brief).


    Determine 1 Illustration of a stroll by way of a verkle tree for the important thing 0xfe0002abcd..ff04: the trail goes by way of 3 inside nodes with 256 youngsters every (254, 0, 2), one extension node representing abcd..ff and the 2 suffix tree commitments, together with the worth for 04, v₄. Be aware that stem is definitely the primary 31 bytes of the important thing, together with the trail by way of the interior nodes.

    Dedication to the values leaf nodes

    Every extension and suffix tree node accommodates 256 values. As a result of a price is 256 bits broad, and we will solely retailer 252 bits safely in a single subject factor, 4 bits can be misplaced if we merely tried so retailer one worth in a single subject factor.

    To avoid this downside, we selected to partition the group of 256 values into two teams of 128 values every. Every 32-byte worth in a bunch is break up into two 16-byte values. So a price vᵢ∈ 𝔹₃₂ is changed into v⁽ˡᵒʷᵉʳ⁾ᵢ ∈ 𝔹₁₆ and v⁽ᵘᵖᵖᵉʳ⁾ᵢ∈ 𝔹₁₆ such that v⁽ˡᵒʷᵉʳ⁾ᵢ ++ v⁽ᵘᵖᵖᵉʳ⁾ᵢ= vᵢ.

    A “leaf marker” is added to the v⁽ˡᵒʷᵉʳ⁾ᵢ, to distinguish between a leaf that has by no means been accessed and a leaf that has been overwritten with 0s. No worth ever will get deleted from a verkle tree. That is wanted for upcoming state expiry schemes. That marker is ready on the 129th bit, i.e. v⁽ˡᵒʷᵉʳ ᵐᵒᵈⁱᶠⁱᵉᵈ⁾ᵢ = v⁽ˡᵒʷᵉʳ⁾ᵢ + 2¹²⁸ if vᵢ has been accessed earlier than, and v⁽ˡᵒʷᵉʳ ᵐᵒᵈⁱᶠⁱᵉᵈ⁾ᵢ = 0 if vᵢ has by no means been accessed.

    The 2 commitments C₁ and C₂ are then outlined as

    Dedication of extension nodes

    The dedication to an extension node consists of an “extension marker”, which is simply the #1, the 2 subtree commitments C₁ and C₂, and the stem of the important thing resulting in this extension node.

    Not like extension nodes within the Merkle-Patricia tree, which solely include the part of the important thing that bridges the dad or mum inside node to the kid inside node, the stem covers the entire key as much as that time. It is because verkle bushes are designed with stateless proofs in thoughts: if a brand new key’s inserted that “splits” the extension in two, the older sibling needn’t be up to date, which permits for a smaller proof.

    Dedication of Inside nodes

    Inside nodes have the less complicated calculation technique for his or her commitments: the node is seen as a vector of 256 values, which are the (subject illustration of the) root dedication of every of their 256 subtrees. The dedication for an empty subtree is 0. If the subtree just isn’t empty, then the dedication for the interior node is

    the place the Cᵢ are the kids of the interior node, and 0 if a baby is empty.

    Insertion into the tree

    Determine 2 is an illustration of the method of inserting a brand new worth into the tree, which will get fascinating when the stems collide on a number of preliminary bytes.

    Determine 2 Worth v₁₉₂ is inserted at location 0000010000…0000 in a verkle tree containing solely worth v₁₂₇ at location 0000000000…0000. As a result of the stems differ on the third byte, two inside nodes are added till the differing byte. Then one other “extension-and-suffix” tree is inserted, with a full 31-byte stem. The preliminary node is untouched, and C²₀ has the identical worth as C⁰₀ earlier than the insertion.

    Shallower bushes, smaller proofs

    The verkle tree construction makes for shallower bushes, which reduces the quantity of saved knowledge. Its actual energy, nevertheless, comes from the power to supply smaller proofs, i.e. witnesses. This can be defined within the subsequent article.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    CryptoGate
    • Website
    • Pinterest

    Related Posts

    Ethereum Foundation Moves 10K ETH In Latest Bitmine Transfer – Details

    May 3, 2026

    Soldøgn Interop Recap ☀️ | Ethereum Foundation Blog

    May 2, 2026

    Crypto Market Still In Fear After Historical Lows, But Can Bitcoin And Ethereum Recover?

    May 1, 2026

    Are Ethereum Whales Dumping And Crashing The Price? Here’s What We Know

    May 1, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Ethereum’s Holešky testnet to shut down as Hoodi takes over

    September 3, 2025

    Ethereum Price Analysis: Has ETH’s Rally to $5K Hit a Dead End?

    September 15, 2025

    What Is Liquid Proof-of-Stake and How It Works?

    March 2, 2026

    Blue Origin Accepts Bitcoin Ethereum Solana for Spaceflights

    August 12, 2025

    Could XRP Make Trillionaires? Tech Firm Founder Thinks It’s Possible

    December 25, 2025
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto Market Trends
    • Crypto Mining
    • Cryptocurrency
    • Ethereum
    About us

    Welcome to cryptogate.info — your trusted gateway to the latest and most reliable news in the world of cryptocurrency. Whether you’re a seasoned trader, a blockchain enthusiast, or just curious about the future of digital finance, we’re here to keep you informed and ahead of the curve.

    At cryptogate.info, we are passionate about delivering timely, accurate, and insightful updates on everything crypto — from market trends, new coin launches, and regulatory developments to expert analysis and educational content. Our mission is to empower you with knowledge that helps you navigate the fast-paced and ever-evolving crypto landscape with confidence.

    Top Insights

    What Could Send Price Below $2

    January 18, 2026

    Ethereum Open Interest Breaks October 9 Threshold: Traders Return Post-Shakeout

    January 15, 2026

    Jutta’s update on bug bounty program and security audit

    January 31, 2026
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto Market Trends
    • Crypto Mining
    • Cryptocurrency
    • Ethereum
    YouTube
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • Impressum
    • About us
    • Contact us
    Copyright © 2025 CryptoGate All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.