<100 subscribers
Google has open-sourced its Zero-Knowledge Proof (ZKP) libraries to support EU age verification and enhance privacy. This technology allows users to verify their age without disclosing additional information, promoting the development of privacy-focused digital identity solutions.
This article demonstrates the implementation of indistinguishability obfuscation (iO) by constructing a non-interactive conditional signature printer. Starting from public truth tables, fully homomorphic encryption (FHE), and functional encryption (FE), it culminates in an augmented FE approach to achieve iO, enabling non-interactive signatures without revealing the key. iO, viewed as an extension of FE, supports dynamic user inputs, unlocking new possibilities for privacy-preserving applications
In this podcast episode, Anna Rose speaks with Florent Tavernier and Marek Olszewski from Self about bringing identity onchain using zero-knowledge proofs (ZK), Sybil protection, and the origins of OpenPassport. The discussion explores Self’s approach to supporting various forms of ID, the challenges of disparate cryptographic standards, and how government signatures can bootstrap onchain identity systems.
This article introduces SnarkSentinel, an AI-powered ZK auditing tool developed by zkSecurity, exploring AI’s potential in finding vulnerabilities in zero-knowledge circuits and applications. Experiments show AI excels at detecting minor, well-known bugs and comparing specifications with implementations, but struggles with complex cryptographic vulnerabilities and reducing false positives. While AI cannot fully replace human auditors yet, it can enhance audit efficiency and coverage.
Expander-GPU is a CUDA-powered, high-performance backend for zero-knowledge proof generation, leveraging NVIDIA GPU parallelism to achieve 7-10x speed improvements over CPUs. It supports multiple cryptographic fields, significantly enhancing ZK application efficiency in the Ethereum ecosystem, enabling Layer-2 scalability, and empowering complex dApp development, paving the way for the future of Web3.
The article introduces Trusted Execution Environments (TEEs) and their role in confidential computing, focusing on technologies like Intel TDX. It explores TEE properties, real-world challenges, and provides a technical deep dive into Intel TDX’s implementation.
A curated repository of high-impact papers, tutorials, protocols, and implementations around Data Availability Sampling (DAS)—a foundational method that enables blockchains and distributed systems to verify data is available without downloading it fully.