-
# New Work Item Proposal
This specification defines the associated linked data proof suites that can be used to construct digital signatures and proofs using BBS+ with BLS12-381 key pairs. The nota…
-
Nim currently has 3 types that are second-class citizens due to memory safety reasons: ``var T``, ``lent T``, ``openArray[T]``. These can only be used in parameter lists as the underlying implementati…
-
We've decided to use the bit vector revocation approach for MVP. [Past design discussions are here](https://github.com/digitalcredentials/docs/blob/main/credential/revoke_credential.md#past-design-dis…
-
**Describe the problem**
computing seal proof failed(2): the element is not part of an r-order subgroup
```
Hardware:
CPU: AMD Ryzen Threadripper 3970X 32-Core Processor
MEM: 256G 2666MHZ
…
-
Found another interesting paper: https://eprint.iacr.org/2019/373.pdf
> We achieve transaction anonymity with a Zerocoin setup which is implemented through 1-out-of-many proofs **over generalized P…
-
I had a brain fart and for some reason I put down algebraic MACs in #13 as relying on bilinear groups, and consequentially we did not look at them in much detail. This is **not** the case. Again I hav…
-
Zero-knowledge proofs have an important role to play in the future of verified machine learning prediction. However, no deep learning framework has the ability to perform verified computation of neura…
-
In Rust land, it is a common practice to implement features in stages, with the initial steps designed to be forwards compatible with possible future evolutions that have yet to be settled. It works f…
-
Test & fix Zudo-Ku game as done with the other plug-ins in #287
@tassadarius I think that you wanted this issue
-
(original content moved to a child comment)