Explaining SNARKs Part VI: The Pinocchio Protocol
<< Part V In part V we saw how a statement Alice would like to prove to Bob can be converted into an equivalent form in the “language of polynomials”
<< Part V In part V we saw how a statement Alice would like to prove to Bob can be converted into an equivalent form in the “language of polynomials”
Edit 2018-05-31: Auto-senescence terminology changed to “end-of-support halt”. Starting in May the Zcash development effort will institute a new release policy. There are a few immediate take-aways for users: We’ll
Six months ago today we launched an ambitious attempt to create Internet Money. We dream of giving every human on earth free and equal access to a global, programmable financial
<< Part IV In the three previous parts, we developed a certain machinery for dealing with polynomials. In this part, we show how to translate statements we would like to
The privacy provided in Zcash allows users to disclose a shielded payment address publicly or to multiple individuals without the worry of transactions sent to that address becoming linked in
Today, we are telling the story of a company in Brazil who started a venture mining Bitcoin. With this revenue the company, coinBR, grew their business to build a money
We have decided to postpone the Zcash Sprout 1.0.9 release from today’s planned release date to mid-May. We have been planning a transition in May of our release process and
An exciting update for the Zcash ecosystem comes from the Jaxx team. Jaxx were one of the very first wallets to support Zcash, implementing it into their Android and desktop
Today we’re announcing the release of Zcash 1.0.8-1. This release fixes a security vulnerability detected in versions starting with 1.0.4 up to and including 1.0.8. More information on this vulnerability
Synopsis: A bug related to transaction priority handling may allow an attacker to crash Zcash nodes (DoS) via a specially crafted transaction. A fix is implemented in zcashd release 1.0.8-1.
Full announcement Please see the disclosure announcement. Update announcement We have deployed detectors to learn more about the issue and still have no evidence of malicious exploitation. We are working
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind evaluation of polynomials, which we will define shortly. In Part
| Description |
|---|
| Google Analytics |
| Google Optimize |
| Google Tag Manager |
| New Relic |
| Sendgrid |