Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind
<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:`E(P(s))` of her polynomial :math:`P`
<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation”
In Zcash, users have the option to employ transparent or shielded addresses for sending, receiving and storing their ZEC. While
Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take
Having the two types of addresses within Zcash (transparent and shielded) is an advantage which allows users to have more
In ‘Anatomy of A Zcash Transaction’ we gave a general overview of Zcash Transactions. The purpose of this post is
Since the successful launch of the Zcash network on October 28th, we’ve had an outpouring of interest from miners and
Description |
---|
Google Analytics |
Google Optimize |
Google Tag Manager |
New Relic |
Sendgrid |