| CPC H04L 9/3236 (2013.01) [H04L 9/50 (2022.05)] | 30 Claims |

|
1. A computer-implemented cryptographic method of performing a maintainable Merkle-based vector commitment, the method comprising:
a) computing a succinct batch proof of a subset of k leaves in a Merkle tree of n leaves using a recursive Succinct Non-Interactive Argument of Knowledge (SNARK), wherein the Merkle tree of n leaves is stored on a memory of size n and the succinct batch proof is for multiple memory slots of batch size k, and wherein computing the succinct batch proof comprises:
i. traversing paths of the Merkle tree belonging to the k leaves in the batch,
ii. verifying that elements of the k leaves belong to the Merkle tree,
iii. computing a batch hash for the elements in the batch using canonical hashing, and
iv. making the batch hash part of a public statement;
b) maintaining a data structure that stores previously computed recursive SNARK proofs; and
c) upon change of a memory slot of the memory of size n corresponding to an element of the Merkle tree, updating the succinct batch proof for the subset of k leaves stored on the multiple memory slots of batch size k, in O (log n) parallel time independent of the batch size k; and
in response to updating the succinct batch proof, issuing a cryptocurrency token via a smart contract.
|