Presenting a method for verifying multi-exponentiations and multi-scalar multiplications (MSMs) to facilitate outsourcing these computations, which allows the prover to perform the computation typically done by the verifier.
介绍了一种验证多指数和多标量乘法 (MSM) 的方法,以方便外包这些计算。这允许证明者执行通常由验证者完成的计算。
This article explores lattice-based zero-knowledge proofs and their role in post-quantum cryptography for secure and efficient cryptographic protocols.
本文探讨基于格的零知识证明及其在后量子密码学中构建安全高效密码协议的作用。
This article explores the algebraic foundations of Circle STARKs, introducing the group structure of complex numbers, the unit circle, and its application in the Circle STARKs proof system.
这篇文章探讨了 Circle STARKs 的代数基础,介绍了复数、单位圆的群结构,以及其在 Circle STARKs 证明系统中的应用。
This post introduces the concept of zkVM and reviews the key projects that have shaped the development of modern zkVM.
这篇文章介绍了 zkVM(零知识虚拟机) 的概念,并回顾了塑造现代 zkVM 发展的关键项目。
This project integrates MPC and ZK to train logistic regression models privately and verifiably using Noir and co-noir tools.
本项目结合 MPC 与 ZK,利用 Noir 和 co-noir 实现私密且可验证的逻辑回归模型训练。
The article will explain what elliptic curves are, the basic operations that can be performed on them, and how they are used in a cryptographic context, mostly with examples of known attacks against incorrect implementation or misuse.
本系列文章将介绍椭圆曲线是什么、可以对它们执行的基本操作以及如何在加密上下文中使用它们,大部分内容都是针对不正确实现或错误使用的已知攻击示例。
@cryptodavidw breaks down a recent paper on Fiat-Shamir, GKR, and how to prove false statements
@cryptodavidw 分析了最近关于 Fiat-Shamir、GKR 以及如何证明虚假陈述的论文。
A 2024 review of post-quantum cryptography advancements, including hybrid key exchange, ML-KEM vulnerabilities, NIST updates, and Google's quantum chip Willow.
If you’d like to receive updates via email, subscribe
us!