-
This BIP proposes the direct implementation of several privacy and anonymity-enhancing features in the Bitcoin Gold protocol, including CoinJoin, zk-SNARKs, ring signatures, and stealth addresses dire…
-
Hello, I would like to implement a zk-SNARKs scenario using `libsnark` but I can't figure out if it is indeed possible and how to approach the implementation in practice.
This library seems too tec…
-
Make an example about zero-knowledge proof by Javascript
-
> Zine: 独立杂志
主要是作为周边和周边文创产品,在 Figma 上编辑一些重要的概念和公式,打印一张全彩的,大的 A16 纸
每个分类可以设计一个模块:
- Folding schemes
- zk-SNARKs
- Proving Systems
- libs
也可以先根据 Frank(@LiuJiazheng) 的 Halo2 as compiler …
-
-
## Background
Currently, Sovereign works only in the model where raw transaction data is posted on some DA layer. This works very well in the context of a fast-finality data-optimized chain like Cele…
-
The documentation at https://docs.iden3.io/#/guides/circom-and-snarkjs?id=_23-toy-example includes the factoring decision problem as an example circuit, and says:
> For very large numbers, no effic…
daira updated
4 years ago
-
We might have use of the [code from Anon-Pass](https://github.com/ut-osa/anon-pass) and adapt it to handle NIZK proofs. This relates to #27 . The paper [P-signatures and Noninteractive Anonymous Crede…
dbosk updated
6 years ago
-
Hi everyone!
I have 1 theorical question and one technical.
## Theorical:
zk-SNARKs can be applied to any QAP (Quadratic Arithmetic Program). Thus, when we want to use our problem with zk-SNAR…
-
In case when venue and operator are both hacked.
1) Trader makes a deposit and issues an order.
2) Venue creates a settlement, operator places into block that steals and withholds the block.
3) T…