-
**Proposed feature**
Token-2022 adds the token-extension of confidential transfers. For normal token transfers Token-2022 further adds the permanent-delegate extension, which allows granting a sign…
-
This is to start a conversation. I am hoping to nerd snipe someone who has the relevant knowledge into doing something I don't know how to do.
I think it would be very helpful to have a Formal Mode…
-
# **Use Case: Zero Knowledge: Data Protection Layers**
## **Objective:**
The main objective of this use case is to implement a solution based on the Zero Knowledge Protocol (ZKP) to enhance data prot…
-
It isn't feasible to implement advanced crypto-primitives directly in Sophia. Instead we should provide users with a good set of primitives that can act as a build-blocks in smart contracts (for examp…
-
Part of #460
## zk solution issues
- [x] #1044
- [ ] #1045
- [ ] #1046
- [x] #1047
- [ ] #1048
## oauth login issues
- [x] #1162
- [x] #1161
- [ ] #1160
- [ ] #1159
…
-
At the moment, threshold scheme(threshold signature scheme, threshold secret scheme) is the key component of ABFT consensus algorithm. We need to figure out the details and choose one solution.
Som…
-
Write a program in any provable language (Circom, Cairo, Noir, Rust) to provide a proof of K signatures out of N in a multisig setup.
-
# Open Grant Proposal: PrivyML as a ZKML solution on the Swan network, aims to facilitate the implementation and execution of the ZKML concept on the Swan network.
**Project Name:**`PrivyML`
**P…
-
Many people I talked to at EthCC wanted to use the alarm clock for things such as scheduling exchange orders. However, they were concerned about the implications of having these transactions visible a…
-
Maintaining and running a secure P2P privacy preserving network requires computational resources and has potentially high costs. Peers who reliably offer resources to the commons should be rewarded fo…