Tiered sparce Merkle tree (TSMT)

A sparse Merkle tree (SMT) is a cryptographic data structure that allows authenticated manipulations of a key-value store, i.e. a dictionary. It is a Merkle tree because it is a binary tree in which each leaf node represents a key-value pair, and each non-leaf node represents the hash of the concatenation of its two child nodes.

The index of the leaf node in the tree corresponds to the key and the data stored in this node corresponds to the value. This implies that the depth of such a tree is logarithmic in the size of the key space, which implies that, for most key spaces used in practice, such a tree is impractical if done naively. However, the tree is sparse, i.e. it is going to be made up of mostly empty leaves, which in turn implies that most sub-trees are empty with roots that can be pre-computed.

A major issue with SMTs is the fact that operations scale with the size of the key space, meaning, for example, that if our key space has size \(~ 2^{256}\), then performing any operation on the key-value store, for example, an update, will require performing \(256\) hashing operations. This is undesirable both inside as well as outside the STARK.

A common solution to this issue is to keep only non-empty leaves in the tree, which in practice means that sub-trees with only one non-empty child are replaced with the sub-tree rooted at that non-empty child. Here’s an example of this:

tsmt compaction example

Compaction implies then that the tree depth is logarithmic in the size of the dictionary entries as opposed to the size of the key space. This, in turn, means that the number of hashing required for executing operations on the key-value map scales logarithmically in the size of the map.

The first documented implementation of a compact SMT was described here. This implementation relies on augmenting nodes with a field called prefix which is the longest common prefix of all childs of a given node. This means that internal nodes are hashes of a left and right child together with prefix, i.e. (LEFT || RIGHT || PREFIX). Leaf nodes are hashes of just the key-value pair. In addition, domain separation is used to distinguish between an internal and a leaf node by appending a 0 or 1 before hashing.

A disadvantage of this implementation, as well as all known implementations of compact SMTs, is the reliance of their operations on bit-wise manipulations. This makes them very expensive to implement inside Miden VM.

Tiered sparse Merkle trees (TSMT) are a result of the idea that one can trade hashing for more efficient bit-wise operations. More precisely, in TSMT, compaction happens only at certain pre-specified tiers and this leads to simpler bit-wise manipulations. In the case of Miden VM, compaction happens at depths 16, 32, 48 and 64. To illustrate this, consider the following example where the keys have length 4, i.e. the SMT has depth 4.

tsmt non compact

If we choose the tiers to be at depths 2 and 4 then the compact version of the above tree will look like

tsmt compact 2

If, however, we choose compaction at all possible depths we get a compact SMT that is similar to the Jellyfish SMT

tsmt compact 2

We can see that a TSMT is a parametrized SMT, where the parameter is the number of tiers, that interpolates between a plain SMT with no compaction and a (fully) compact SMT with compaction allowed at evey depth.

The Miden VM TSMT is a map from a key-space of size approximately 256-bit to a value-space of the same size and are represented by four \(64\)-bit field elements in the Miden VM native field, i.e. a Word. Athough keys are 256-bit long the maximal tree depth that is allowed is 64. This has several consequences:

  1. Limiting the tree depth to 64 means that we can use one of the four field elements making up the (full) key as the (compact) key in the TSMT. We choose the 4th field element to act as the (compact) key since when loading the (full) key on the operand stack, the 4th field element will be at the tip of the operand stack and thus will be easier to access. Using a single field element to act as the (compact) key implies that we can levarage the native instructions of the Miden VM to manipulate it during the course of operations on the TSMT inside the VM.
  2. In order to deal with keys sharing a common prefix of length greater than 64, we introduce a special type of leaf nodes at depth 64. These leaf nodes are a sorted list of (key, value) pairs where sorting is done using key. Notice that all pairs in the sorted list have the same first part of the key, namely they share a common 64-bit prefix , and that all pairs with the same first part of the key belong in the same sorted list. The decision to go with a sorted list of pairs instead of a standard sub-tree node with multiple childs at depth 80 sharing the same 64-bit prefix is partially motivated by the fact that, for most scenarios related to Miden VM, the probability that two distinct keys will end up sharing a common prefix of length greater than or equal to 64 is very low, and even feasible grinding attacks can only make the sorted list on slightly longer than a dozen of elements and with very little clear benefits. Thus putting all pairs with the same first part of the key in a sorted list is a good tradeoff for dealing with prefixes of length greater than 64.

The Miden VM TSMT has three types of nodes:

  1. Internal nodes with a left and right child, and value computed as: Hash(left || right).
  2. Leaf nodes at depths 16, 32 and 48 with value computed as: Hash(rem_key || value; domain=depth) where:
  3. depth is the depth of the node, i.e. either 16, 32 or 48.
  4. rem_key is the the remaining key after either the 16, 32 or 48-bit prefix is removed depending on the depth of the node.
  5. domain is a domain separation tag used to distinguish between internal and leaf nodes.
  6. Leaf nodes at depth 64 with values computed as: Hash((rem_key_1, value_1) || ... || (rem_key_n, value_n); domain=64) where:
  7. rem_key_i is the remaining key after the 64-bit prefix is removed.
  8. value_i is the value associated with the key key_i.
  9. rem_key_i are sorted in increasing order.

Last update: January 17, 2024
Authors: avenbreaks