decentralized-cryptography-.../proofs
writer 88a381fd34 🛹👾
2024-10-08 18:39:55 +09:00
..
bulletproofs.md 🛹👾 2024-10-08 18:39:55 +09:00
halo2.md 🛹👾 2024-10-08 18:39:55 +09:00
kate.md 🛹👾 2024-10-08 18:39:55 +09:00
nova.md 🛹👾 2024-10-08 18:39:55 +09:00
plonk.md 🛹👾 2024-10-08 18:39:55 +09:00
README.md 🛹👾 2024-10-08 18:39:55 +09:00
semaphore.md 🛹👾 2024-10-08 18:39:55 +09:00
zkSNARKS.md 🛹👾 2024-10-08 18:39:55 +09:00
zkSTARKS.md 🛹👾 2024-10-08 18:39:55 +09:00

zero-knowledge proofs


tl; dr


  • suppose that you have a (public) function f, a (private) input x, and a (public) output y.
  • you want to prove that you know an x such that f(x) = y, without revealing what x is.
  • for the proof to be succinct, you want it to be verifiable much more quickly than computing itself.


comparison of proof systems




common reference strings, structured reference strings, trusted setup, multi-party computation ceremony



  • a trusted setup ceremony is a procedure that is done to generate a piece of data that must be used every time some cryptographic protocol is run.
  • for some proofs to work, such as zk-snarks, it's necessary to create a common reference string (CRS), which provides public parameters for proving and verifying validity proofs.
  • the security of the proving system depends on the csr setup and some zk-rollups attempt to solve this problem by using a multi-party computation ceremony (mpc) with trusted individuals.
  • modern protocols use the power-of-tau setup, which has 1-of-N trust model, with N around hundreds.


in this dir




resources