-
I've been wondering about a similar approach that might yield predicate proofs for some subset of RDF types... have you though about how this might work for range or membership proofs?
-
Follow-up on the action points coming out of the Semaphore >< Noir meeting (@zac-williamson , @Savio-Sou , @signorecello , Vivian, Andy, Cedoor, Giacomo).
We want to add circuits to zk-kit. Most of…
-
# Overview
rln-relay consists of the following steps:
1- A membership smart contract must be deployed on the blockchain, the contract holds the list of current registered members (as well as deleted…
-
When exploring the concept of trust registries, it becomes evident that the **data models** for each registry vary significantly. For instance, the data model used by the DIACC PCTF is markedly differ…
-
Roadmap:
1. reproduce zkmessage.xyz
2. check membership using Merkle tree
3. update mimc to ECDSA signature verification
4. Proofs of Property of Identity via a onchain DAO contract deployed on Az…
-
- [ ] ECDSA
- [ ] Compile, prove, verify.
- [ ] SHA-256
- [ ] Fibonacci (1, 10, 100, 1_000, 10_000, 100_000)
- [ ] Merkle Trees
- [ ] Merkle membership proof
- [ ] Poseidon hashing?
- [ ] Infra (d…
-
In the ATX builder PoET errors require special handling. There are three possible PoET errors:
1. No response to registration requests - if the node is aware of another PoET _(no implemented)_ it s…
-
I'm trying to play a sneaky game:
* define a list of available commands (strings)
* let users refer to command names, not the proof they belong to the list of commands
* make sure we can build th…
-
we are not using the advantage of recproofs for these trees which is batch membership proof openning and updating.
for the state tree the Old root and New root is over the entire leaves
for eve…
-
In the context of Store incentivization (https://github.com/waku-org/nwaku/issues/1961), a question arises on how do discourage servers from creating fake messages.
The client pays the server for h…