-
In this paper [Benchmarking ZK-Circuits in Circom](https://eprint.iacr.org/2023/681):
> We integrated the following signature schemes and hash functions into ZK-Harness: Poseidon, Pedersen, MiMC, …
-
# [To document] the way the auth-key is derived from the public key
The way the auth key is derived is not through a canonical hashing via Libra Canonical Serialization (LCS), might want to documen…
-
I've been wondering about a similar approach that might yield predicate proofs for some subset of RDF types... have you though about how this might work for range or membership proofs?
-
Hey, I'm glad to see you interested in MSS (Merkle Signature Schemes) - certainly anything with ambition as large as cyphernet should really utilise PQC (Post Quantum Cryptography) from the start and …
-
This is a sub-issue of #4808 (SPV)
Since verifying PoH is a resource intensive activity, requiring light clients to perform this task should be avoided. As such, they will need an alternate means …
-
### Problem
With git-based registries any one commit from the registry represented an atomic picture of what all packages were up to at that point in time. This had a number of useful properties:
- …
-
**Description**
Now that NIST has [announced](https://www.nist.gov/news-events/news/2022/07/nist-announces-first-four-quantum-resistant-cryptographic-algorithms) the first few quantum-resistant cry…
-
If I understand the current protocol correctly, an advertiser who wants to advertise Foo this week and Bar next week will need to created two Bitcoin transactions with two 1-week CSV timelocks. It'd …
-
While the collection of associated types in the metadata V16 will expose information like "what is the name of the hasher", the metadata is not capable of exposing code functionality yet.
At the mome…
-
# Record Validity Systems
This is a discussion on why IPFS supports pluggable validity schemes. (Warning: _very_ rough draft!)
(Note: the application of these records are things like routing system…