Explaining SNARKs Part II: Blind Evaluation of Polynomials
<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” […]
BLS12-381: New zk-SNARK Elliptic Curve Construction
Our team is continually working to improve the security, performance and usability of our privacy-preserving shielded transactions. As we mentioned […]
Explaining SNARKs Part I: Homomorphic Hidings
Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take […]
History of Hash Function Attacks
The SHA-1 hash function, which has long been considered insecure, is now officially broken as of yesterday. Given the renewed […]
Zcash Audit Results
As a security-focused team, made up of world-class talent, we prioritize the security of Zcash users. True security comes from […]
Zcash Parameters And How They Will Be Generated
At its core, Zcash’s privacy technology relies on a novel cryptographic tool called a zkSNARK – a small zero-knowledge proof […]
Auditing Zcash
Our mission is to make the first open financial technology with zero-knowledge privacy, for every person in the world to […]
Pairing cryptography in Rust
Pairing cryptography is an exciting area of research, and an essential component of Zcash’s zkSNARKs — proofs that transactions are […]
New Alpha Release: libzcash
Today, we deployed a new alpha release of the Zcash reference implementation, v0.11.2.z3, to the testnet. The new release includes […]
Fixing Vulnerabilities in the Zcash Protocol
Intro by Zooko I’ve worked in cryptography, information security, and digital money for half of my life (20 years, but […]
How To Generate SNARK Parameters Securely
There are a lot of cryptographic challenges to making a fully secure and reliable open financial system. Our current top […]