Halo: Recursive Proof Composition without a Trusted Setup
Sean Bowe, an engineer and cryptographer at Electric Coin Company (ECC), has discovered a technique for creating practical, scalable and
Sean Bowe, an engineer and cryptographer at Electric Coin Company (ECC), has discovered a technique for creating practical, scalable and
Since the successful Sapling network upgrade, we have already seen an increased adoption of shielded addresses in the Zcash ecosystem.
As we approach Zcash’s second birthday, it’s fitting to look back at the origins of this little experiment. And who
zk-SNARKs – the zero-knowledge proofs at the core of Zcash – require a parameter generation ceremony to take place for
As a science-focused team, ensuring the security of the Zcash protocol and the users of the network is a natural
Last year, I created a project called pay-to-sudoku which was the world’s first implementation of a zero-knowledge contingent payment (ZKCP).
<< Part VI In Part VI, we saw an outline of the Pinocchio zk-SNARK. We were missing two things –
<< Part V In part V we saw how a statement Alice would like to prove to Bob can be
<< Part IV In the three previous parts, we developed a certain machinery for dealing with polynomials. In this part,
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind
Bellman is a Rust-language library for building zk-SNARKs — small, cheap-to-verify zero-knowledge proofs of arbitrary computations. The goal of bellman
<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:`E(P(s))` of her polynomial :math:`P`
Description |
---|
Google Analytics |
Google Optimize |
Google Tag Manager |
New Relic |
Sendgrid |