-
It should be possible in some situations to use Zero Knowledge Proofs to anonymize the credential subject while still proving some facts about them (e.g. you don’t know their name but you know that th…
-
### Tutorial title
Using zero-knowledge for a secret state
### Tutorial description
Onchain games are limited because they cannot keep any hidden information. After reading this tutorial, a reader …
-
### Project description
Technologies based on zero-knowledge proofs have the potential to allow government digital services to offer privacy safeguards that are unmatched by the private sector, while…
-
* https://github.com/matter-labs/awesome-zero-knowledge-proofs
-
The `MaspTx` section is identified by the TxId digest described https://zips.z.cash/zip-0244#txid-digest . This is problematic because the TxId digest does not cover witness data like zero-knowledge p…
-
-
I didn't want to bring in the `rand` crate and deal with that mess, so the proofs right now are not zero-knowledge as mentioned in this comment: https://github.com/ebfull/sonic/blob/master/src/synthes…
-
**What new topic/thread/tutorial are you proposing? Please describe.**
This is a thread, where we can see how Zero-Knowledge proof can be used with different projects, in different contexts.
Each …
-
We can learn different contribution types to incentivize these cases by the Ubiquity OS
Criteria defined by the ZKsync https://blog.zknation.io/zk-token/
The remaining amount was allocated to …
-
/spec a method to prove you did a bug bounty without revealing the solution using zero-knowledge proofs so that white hat hackers can get paid properly and incentivize cybersecurity in any industry