Reinforcing the Security of the Sapling MPC

The engineering and cryptography team at Zcash makes very large efforts to minimize risk. This is always a positive thing, […]

Reinforcing the Security of the Sapling MPC

Improved zk-SNARK Multi-party Computation Protocol

zk-SNARKs – the zero-knowledge proofs at the core of Zcash – require a parameter generation ceremony to take place for […]

Improved zk-SNARK Multi-party Computation Protocol

Decentralization is a key characteristic of cryptocurrencies because it removes dependence on trusting third parties in order to transact between […]

Explaining SNARKs Part VII: Pairings of Elliptic Curves

<< Part VI In Part VI, we saw an outline of the Pinocchio zk-SNARK. We were missing two things – […]

Explaining SNARKs Part VII: Pairings of Elliptic Curves

Explaining SNARKs Part VI: The Pinocchio Protocol

<< Part V In part V we saw how a statement Alice would like to prove to Bob can be […]

Explaining SNARKs Part VI: The Pinocchio Protocol

Explaining SNARKs Part V: From Computations to Polynomials

<< Part IV In the three previous parts, we developed a certain machinery for dealing with polynomials. In this part, […]

Explaining SNARKs Part V: From Computations to Polynomials

Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable

<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind […]

Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable

Explaining SNARKs Part III: The Knowledge of Coefficient Test and Assumption

<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:E(P(s)) of her polynomial :math:P […]

Explaining SNARKs Part III: The Knowledge of Coefficient Test and Assumption

Explaining SNARKs Part II: Blind Evaluation of Polynomials

<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” […]

Explaining SNARKs Part II: Blind Evaluation of Polynomials

Explaining SNARKs Part I: Homomorphic Hidings

Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take […]

Explaining SNARKs Part I: Homomorphic Hidings

An Update on Integrating Zcash on Ethereum (ZoE)

Members of the Ethereum R&D team and the Zcash Company are collaborating on a research project addressing the combination of […]

An Update on Integrating Zcash on Ethereum (ZoE)

How Transactions Between Shielded Addresses Work

In ‘Anatomy of A Zcash Transaction’ we gave a general overview of Zcash Transactions. The purpose of this post is […]

How Transactions Between Shielded Addresses Work