InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSESo What Is a Non-interactive Zero Knowledge Proof?We give away too much data which should be kept private. Why should we have to give a system our password when all we should do is prove…Dec 8, 20242Dec 8, 20242
0xbarchitectKZG polynomial commitments and their applications in blockchain (EIP-4844).In cryptography, polynomials are powerful tools for representing knowledge about various entities. For example, a set of numbers can be…Oct 25, 2024Oct 25, 2024
Linfeng ZhouComparison of Different zk-SNARKsZero-knowledge proof technique has been proven as a strong tool in protecting privacy in many different kinds of blockchain networks (e.g…Aug 3, 2020Aug 3, 2020
InASecuritySite: When Bob Met AlicebyProf Bill Buchanan OBE FRSECryptographic Range Proofs: From Damgård to BulletproofsA range proof is one of the methods that can be used to create a Zero-Knowledge Proof (ZKP), and creates a proof that a value of between…Jun 20, 2024Jun 20, 2024
InCasper Association R & DbyJonas PauliOptimizing ZKP SizesThis article presents an official optimization method for a Zero Knowledge Proof (ZKP) system known as Risc0. The method reduces the ZKP…Apr 15, 20242Apr 15, 20242
InVeridisebyVeridiseLessons from the Auditing Trenches: “What do ZK Developers get Wrong?”Zero-knowledge security is not easy. Our recent findings of our last 100 security audits show that our ZK audits have a 2x higher chance of…Aug 6, 2024Aug 6, 2024
Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 4— Polynomial CommitmentsIn part 2 of this series, we went over some basic mathematical background needed for cryptography, namely finite fields, cyclic groups, and…Jul 14, 2024Jul 14, 2024
Lagrange Labs Inc.Announcing Rollup Coprocessing on AltLayer with Lagrange’s Parallel ProverWe are excited to announce the plan to integrate Lagrange’s parallel prover with AltLayer as a coprocessor. We are also excited to announce…Mar 21, 2024Mar 21, 2024
zCloak NetworkA Chain Abstraction Based ZK Coprocessor by zCloak NetworkIn this article, we will introduce the latest work from zCloak Network — a chain abstraction based ZK coprocessor. This document assumes…Mar 7, 2024Mar 7, 2024
InWeb3 InsightsbyFishy On-ChainWhat is Privacy in Web3?An Exploration of the Different Conceptions and Approaches to Privacy in Web3Feb 26, 20237Feb 26, 20237
Trapdoor-TechZero Knowledge Proof — Introduction to SP1 zkVM Source CodeI have always been interested in zkVM. zkVM has brought the application of zero-knowledge proof technology into a new era. A few years ago…Jun 19, 2024Jun 19, 2024
Prof Bill Buchanan OBE FRSEZero Knowledge Proofs with Elliptic Curves and SchnorrWith Zero Knowledge Proofs (ZKPs), Peggy can have a signature and then use this to prove that she still knows her secret. The method we…May 21, 2024May 21, 2024
InVeridisebyVeridiseZK Fundamentals: Zero-Knowledge ProofsThis is the third article from our series exploring ZK fundamentals, zero knowledge proofs and related notions.Dec 1, 2023Dec 1, 2023
InVeridisebyVeridiseZK Fundamentals: The Fiat-Shamir TransformToday we explore interactive ZK proofs without interactionDec 22, 2023Dec 22, 2023
OlaSin7y Tech Review (34): Is SuperNova’s Folding Scheme the Endgame for ZK?SuperNova is a new recursive proof system for incrementally producing succinct proofs of correct execution of programs on a stateful…May 23, 2023May 23, 2023
zkTubeAn Exploration of ZK-Rollups on Bitcoin: Feasibility and Implications for Layer 2 Scaling SolutionsAbstract: ZK-Rollups (ZKR) have emerged as a promising Layer 2 scaling solution, particularly within the Ethereum ecosystem. This essay…Jul 11, 2023Jul 11, 2023
ToposwareBeyond Limits: Pushing the Boundaries of ZK-EVMIn the dynamic landscape of Web3, ZK-EVMs emerge as a sophisticated tool designed to implement the Ethereum Virtual Machine specification…Feb 8, 2024Feb 8, 2024
IngonyamaProduct Announcement: ZK-ContainersJoint work with RockawayX infrastructure teamNov 10, 2023Nov 10, 2023