-
# Description
### What is this panel discussion about? Please give us as many details as possible.
This panel is about verifiable computation on Bitcoin, i.e. conducting computation offchain and ve…
-
## Background
**Definition**
- **Verifiable outsourced computation**: designing protocols where it is impossible for a provider to cheat.
- **Incentive-based verifiable computation**: cheating is…
-
## Background
- **random oracle**: black-box that to every query gives a random response (uniform from its domain), same query == same response. (Note: church-turing thesis said computable functions …
-
**Describe the issue**:
When running `map_blocks()` with `new_axis` specified, the output shape of the dask array is not set correctly. In the below example I would expect it to be the same as th…
-
## 📝 Overview
This issue contains articles / papers related to this project (should be including ideas of potential improvements on the original proposal).
## 🖋 Details
- Preliminari…
-
> **Note:** this is a bit messy, will be cleaned some time soon
## Background
- **Privacy-preserving computation**: either X of F are hidden to who computes F(X)
- **Verifiable computation**: A…
-
### **Description:**
I'm experiencing unexpected behavior when using `dask.delayed` to process a chunked dataset loaded with `xarray`. The goal is to retrieve a specific subset of data based on latit…
-
### Name of the project
Project Phoenix on Scroll 📜
### Project abstract
**Project Phoenix** aims to develop a novel privacy-preserving cryptocurrency protocol that leverages zero-knowledge proofs …
akuon updated
6 months ago
-
Long bigint literals written in hexadecimal format (such as `0x123456789ABDEFn`) should be kept as is. Currently GCC expands them to decimal bigint literals, which increases the compiled size signific…
-
There is a [new paper](https://eprint.iacr.org/2024/666) (to appear at IEEE S&P 2024) that shows how to lift an [FLP](https://datatracker.ietf.org/doc/html/draft-irtf-cfrg-vdaf-09#section-7.1) into a …