### Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable

<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind […]

Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable

### Explaining SNARKs Part III: The Knowledge of Coefficient Test and Assumption

<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:E(P(s)) of her polynomial :math:P […]

Explaining SNARKs Part III: The Knowledge of Coefficient Test and Assumption

### Explaining SNARKs Part II: Blind Evaluation of Polynomials

<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” […]

Explaining SNARKs Part II: Blind Evaluation of Polynomials

### A Shielded Ecosystem

In Zcash, users have the option to employ transparent or shielded addresses for sending, receiving and storing their ZEC. While […]

A Shielded Ecosystem

### Explaining SNARKs Part I: Homomorphic Hidings

Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take […]

Explaining SNARKs Part I: Homomorphic Hidings

Having the two types of addresses within Zcash (transparent and shielded) is an advantage which allows users to have more […]