-
I understand that the content is locked until the elapsed time has passed. However, the encrypter may wish to prove that they encrypted the content fairly, or that the content contains certain qualiti…
-
Hey, this is a pretty coll app you've built 😎 I love how clean and well-organized the code and project structure are.
I'm planning to build a PWA app that would be a simple version of [zkBob](https…
-
As the title says. I'm looking for ways of replacing a Merkle-tree with something more efficient. But I'm a software developer, not a cryptographer, so it is kinda hard for me.
If it can do an accu…
-
In lieu of proper multisig and hardware wallets, we can implement 2FA-like authorization for transactions using a second device, e.g. a desktop wallet and a 2FA app on a phone.
Unfortunately, this …
-
# Using API3's First-party Oracles
### Background
[API3](https://api3.org/) is a collaborative project that delivers traditional API services to smart contract platforms in a decentralized and …
-
- [ ] [New MPC from ZCash](https://eprint.iacr.org/2017/1050.pdf)
- [ ] [Subversion zkSNARK](https://eprint.iacr.org/2017/587.pdf)
- [ ] [Hourglass schemes](http://www.arijuels.com/wp-content/upload…
-
**Chapter 1: Discovery of Bitcoin**
In fifth grade, young Anthony found,
A whitepaper that would astound.
Bitcoin's secrets, deep and vast,
A future shaped by cryptographic past.
With…
Tdhun updated
1 month ago
-
### Description
Using the Lit [privacy SDK](https://github.com/Curve-Labs/lit-privacy/tree/main/packages/lit-privacy-sdk) as a starting point, build an SDK that enables users to generate private proof…
-
So the idea here is that Nostr apps could generate a series of keys for each user, all based on an initial seed. And they would show the seed and the first key to the user. The seed must be kept safe …
-
Hi all.
I was reading the Lelantus paper to try to figure out a way to mitigate the sender detection problem with its key image format while retaining the good scaling properties, and ended up read…