-
We have opted to use a battle-tested and widely used signature scheme such as EdDSA with Ed25519 or ECSA with secp256k1. To that end, it is worth exploring Snarks that are efficient (hash-based etc.) …
-
[ZK-STARKs](https://docs.ethhub.io/ethereum-roadmap/layer-2-scaling/zk-starks/)
-
Broadly, the question is how Lurk proofs can be used to support the security of hierarchical consensus in Filecoin. A number of relevant docs are linked below. Discussion can happen in thread. Discret…
-
Understand what attack vectors are possible here, study prior art and write up trade-offs / justification for given choice.
Some raw notes:
- One approach is to use a Friend-to-Friend (F2F) networ…
-
### Description
This bounty covers tasks related to moderation at the contributor level. It requires membership in the moderation team to accomplish and claim.
### Tasks
- [x] Discord 5 for weeks sta…
-
The documentation at https://docs.iden3.io/#/guides/circom-and-snarkjs?id=_23-toy-example includes the factoring decision problem as an example circuit, and says:
> For very large numbers, no effic…
daira updated
5 years ago
-
After the deployment we'll have most of the liquidity resided in the [LibUbiquityPool](https://github.com/ubiquity/ubiquity-dollar/blob/a1b11e1b944227144d7cc19ab320220d9fce8b69/packages/contracts/src/…
-
This is useful in low memory environments, but I'm not sure if its worth the complexity
Some related issues on golang: https://github.com/golang/go/issues/35633
-
Snark work is defined at a completely polymorphic level of type generalization. This was to be able to talk about the type without requiring any functor dependencies. Now that much of the code is bein…
-
Yet another experiment to properly generate efficient modular addition in pure LLVM IR in at least x86 and arm without inline assembly (follow-up of #102062, #102868). This time using the intrinsics l…