-
There are currently seven component zero-knowledge proofs that are used in the protocol. The unit tests currently include "happy" tests -- that is, creating a proof using the generation functions prod…
-
Russ Housley:
> Section 4.4.9: This subsection seems very different than the others. There is not an example AEAD that offers this property. If you really want to keep this subsection, please pro…
-
# Open Grant Proposal: PrivyML as a ZKML solution on the Swan network, aims to facilitate the implementation and execution of the ZKML concept on the Swan network.
**Project Name:**`PrivyML`
**P…
-
It is a great feature for a smart contract to compute without decrypting the inputs and outputs.
This allows verifying private data, and knowledge of these.
For this, we would need to enable runni…
-
Proofs currently generated by the library leak info. This is not an issue when the primary use case for proofs is succinctness (e.g. light client, signature aggregation), but this is not desirable for…
-
### Name of the project
X (formerly Twitter) for Scroll
### Project abstract
Privacy-focused decentralized social network
### Specification
Create a social networking platform on zkEVM Layer 2 li…
-
## 📝 Overview
This issue contains articles / papers related to this project (should be including ideas of potential improvements on the original proposal).
## 🖋 Details
- Preliminari…
-
https://w3c.github.io/vc-data-model/#zero-knowledge-proofs
using Camenisch-Lysyanskaya (CL) Signatures and presumably Hyperledger Ursa library.
Note: If Hyperledger Ursa is not installed on the sy…
-
In a Web3 environment integrating TOTP authentication, we can envision a process involving three main actors: the Google Authenticator app on the user's device, the user's browser acting as the front …
-
A composition of zero-knowledge proofs is still a proof. `AuxInfoProof` uses its own API which is pretty similar to that of `Proof`. For consistency, we should refactor it to implement `Proof` exactly…