-
I have I have started a new notebook with a working python version of Plonk in the plonk_tutorial folder. Would be great to get some feedback about the general direction. The code correctly verifies …
-
participants: @qpzm, @rkdud007
## Context
We managed to generate fake inclusion proof of a non-existing user, the user id is out of the bounds of the original CSV file. As all the balance cells’…
-
Problem: Chunking is implemented in Kimchi and Pickles. However, some specific circuit configuration seem to cause a bug in Pickles. A prior RFC talks about these specific issues, which seem to be par…
-
## Summary
Using the PCS in a wider context will require absorbing the commitment for Fiat Shamir.
The current challenge is that `Absorb` is not implemented for `AffineRepr`, and the current…
-
ECCVM prover/verifier uses a workaround for points at infinity that will not work in the recursive setting. Change composer to never produce points at infinity
-
## Overview:
VADCOP is a mechanism where you add challenges (in the sense of "a challenge from the verifier to the prover") and turn lookups into regular polynomial equality constraints. This allow…
-
We're currently doing polynomial multiplication and interpolation the [naive way](https://github.com/poanetwork/threshold_crypto/blob/master/src/poly.rs#L210) (also [interpolation](https://github.com/…
-
This is a lazy question, as I don't want to dive into the paper ;) Feel free of course to tell me to RTFP...
Is it possible to sign without knowing who of the nodes will be in the threshold of the …
-
We can easily switch this unless and until we have external validators/need state to be part of consensus.
Main tradeoff here is hashing/proof length vs. I/O.
Ethereum is moving away from the Hexary…
-
Hi all.
I was reading the Lelantus paper to try to figure out a way to mitigate the sender detection problem with its key image format while retaining the good scaling properties, and ended up read…