Explaining SNARKs Part II: Blind Evaluation of Polynomials

<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” […]

Explaining SNARKs Part II: Blind Evaluation of Polynomials

BLS12-381: New zk-SNARK Elliptic Curve Construction

Our team is continually working to improve the security, performance and usability of our privacy-preserving shielded transactions. As we mentioned […]

BLS12-381: New zk-SNARK Elliptic Curve Construction

Explaining SNARKs Part I: Homomorphic Hidings

Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take […]

Explaining SNARKs Part I: Homomorphic Hidings

History of Hash Function Attacks

The SHA-1 hash function, which has long been considered insecure, is now officially broken as of yesterday. Given the renewed […]

History of Hash Function Attacks

Zcash Audit Results

As a security-focused team, made up of world-class talent, we prioritize the security of Zcash users. True security comes from […]

Zcash Audit Results

Zcash Parameters And How They Will Be Generated

At its core, Zcash’s privacy technology relies on a novel cryptographic tool called a zkSNARK – a small zero-knowledge proof […]

Zcash Parameters And How They Will Be Generated

Auditing Zcash

Our mission is to make the first open financial technology with zero-knowledge privacy, for every person in the world to […]

Auditing Zcash

Pairing cryptography in Rust

Pairing cryptography is an exciting area of research, and an essential component of Zcash’s zkSNARKs — proofs that transactions are […]

Pairing cryptography in Rust

New Alpha Release: libzcash

Today, we deployed a new alpha release of the Zcash reference implementation, v0.11.2.z3, to the testnet. The new release includes […]

New Alpha Release: libzcash

Fixing Vulnerabilities in the Zcash Protocol

Intro by Zooko I’ve worked in cryptography, information security, and digital money for half of my life (20 years, but […]

Fixing Vulnerabilities in the Zcash Protocol

How To Generate SNARK Parameters Securely

There are a lot of cryptographic challenges to making a fully secure and reliable open financial system. Our current top […]

How To Generate SNARK Parameters Securely