Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind evaluation of polynomials, which we will define shortly. In Part
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind evaluation of polynomials, which we will define shortly. In Part
<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:`E(P(s))` of her polynomial :math:`P` of degree :math:`d`, at a point :math:`s` belonging to Bob.
<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” of a polynomial, and how it is implemented using Homomorphic
In Zcash, users have the option to employ transparent or shielded addresses for sending, receiving and storing their ZEC. While this decision might initially seem like a choice that only
Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take a while. If I had to choose one ingredient whose
Having the two types of addresses within Zcash (transparent and shielded) is an advantage which allows users to have more flexibility with how they store and transact ZEC. The dynamic
In ‘Anatomy of A Zcash Transaction’ we gave a general overview of Zcash Transactions. The purpose of this post is to provide a simplified explanation of how privacy-preserving transactions work
Since the successful launch of the Zcash network on October 28th, we’ve had an outpouring of interest from miners and users who want to take advantage of the confidentiality and
| Description |
|---|
| Google Analytics |
| Google Optimize |
| Google Tag Manager |
| New Relic |
| Sendgrid |