Sprout-to-Sapling Migration Tool

The Electric Coin Company is pleased to announce the official Sprout-to-Sapling migration tool in the 2.0.5-2 release of zcashd. This […]

Sprout-to-Sapling Migration Tool

Turnstile Enforcement Against Counterfeiting

The Electric Coin Company has developed consensus code that preserves the Zcash monetary base in the event of a counterfeiting […]

Turnstile Enforcement Against Counterfeiting

Reducing Shielded Proving Time in Sapling

Since the successful Sapling network upgrade, we have already seen an increased adoption of shielded addresses in the Zcash ecosystem. […]

Reducing Shielded Proving Time in Sapling

Sapling in HD

Broader ecosystem adoption of shielded addresses through the implementation of faster zk-SNARKs has been a highlight of the Sapling network upgrade. However, there are […]

Sapling in HD

Sapling Transaction Anatomy

With the Sapling activation approaching, we’re continuing our education on what users and third-party services can expect. We recently announced […]

Sapling Transaction Anatomy

Sapling Addresses & Turnstile Migration

The Sapling network upgrade is a major feature enhancement to the Zcash network targeted to activate on October 28th, 2018. […]

Sapling Addresses & Turnstile Migration

Perspectives on Sapling

Last week we introduced a video series called Perspectives. These short interviews were conducted at Zcon0 on various topics relevant […]

Perspectives on Sapling

Selective Disclosure & Shielded Viewing Keys

Encryption is an important tool to control access to personal and business data. In many cases where private data must […]

Selective Disclosure & Shielded Viewing Keys

Explaining SNARKs Part VII: Pairings of Elliptic Curves

<< Part VI In Part VI, we saw an outline of the Pinocchio zk-SNARK. We were missing two things – […]

Explaining SNARKs Part VII: Pairings of Elliptic Curves

Explaining SNARKs Part VI: The Pinocchio Protocol

<< Part V In part V we saw how a statement Alice would like to prove to Bob can be […]

Explaining SNARKs Part VI: The Pinocchio Protocol

Explaining SNARKs Part V: From Computations to Polynomials

<< Part IV In the three previous parts, we developed a certain machinery for dealing with polynomials. In this part, […]

Explaining SNARKs Part V: From Computations to Polynomials

Payment Contexts & Reusing Shielded Addresses

The privacy provided in Zcash allows users to disclose a shielded payment address publicly or to multiple individuals without the […]

Payment Contexts & Reusing Shielded Addresses