-
# **Use Case: Zero Knowledge: Data Protection Layers**
## **Objective:**
The main objective of this use case is to implement a solution based on the Zero Knowledge Protocol (ZKP) to enhance data prot…
-
*Proposal*: A scholarship to support my PhD research on Zero-Knowledge Proofs and other cryptographic systems motivated by cryptocurrencies.
*Motivation*: Zero-Knowledge proofs are at the core of p…
-
**Proposed feature**
Token-2022 adds the token-extension of confidential transfers. For normal token transfers Token-2022 further adds the permanent-delegate extension, which allows granting a sign…
-
> In cloud computing, the term zero-knowledge (or occasionally no-knowledge or zero access) refers to an online service that stores, transfers or manipulates data in a way that maintains a high level …
-
For Docs : https://wormhole.com/
-
## Describe the solution you'd like
Exploring Prompting Strategies to Enhance Deduction and Accuracy in Knowledge Databases: Knowledge databases primarily function by extracting relevant informatio…
-
### Pitch
The UI now warns us that:
> Posts on Mastodon are not end-to-end encrypted. Do not share any sensitive information over Mastodon.
Would it be possible to use zero-knowledge encryption…
-
Hi,
I've been trying to implement [this](https://eprint.iacr.org/2001/113.pdf) zero knowledge proof of membership technique. I was wondering if you had any advice on the following regarding design:…
-
can any one point to the files implemented the zero knowledge proof?
If can explain how it is used? it will be great! thanks.
-