Bhaskar KrishnamachariUnderstanding Zero-Knowledge Proofs: Part 6-Quadratic Arithmetic ProgramsIn the previous article (part 5) in this series on zk-SNARKs, we looked at how computations that need verification can be first encoded in…Jul 14Jul 14
Prof Bill Buchanan OBE FRSEZero Knowledge Proofs with Elliptic Curves and SchnorrWith Zero Knowledge Proofs (ZKPs), Peggy can have a signature and then use this to prove that she still knows her secret. The method we…May 21May 21
Yu Jiang ThamLet’s dissect a zkSNARK! (part 2)We take a look at going from a computer program to decomposing it into the elements required for a zkSNARK proof.Feb 15, 20231Feb 15, 20231
Yu Jiang ThamBuilding a Zero Knowledge web app with Halo 2 and Wasm (part 2)Continuing from the previous article where we built a Zero Knowledge circuit in Halo 2, we now move on to compiling it to WebAssembly and…Apr 28, 20232Apr 28, 20232
VeridiseinVeridiseZK Fundamentals: What is a proof?This is the first article from our series exploring ZK fundamentals, zero knowledge proofs and related notions.Oct 27, 20231Oct 27, 20231
Prof Bill Buchanan OBE FRSEinASecuritySite: When Bob Met AliceProving Your Age, Without Giving Away Your AgeIf we were to start our computing and data architectures again, we certainly wouldn’t build them as we have. Overall, we have a legacy data…Dec 29, 2023Dec 29, 2023
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part 5Previous articles in the PLONK series served as preparations before we got our hands dirty and started implementing the protocol. Diving…Nov 19, 2023Nov 19, 2023
Deep RnDEnhancing User Interaction in Zero-Knowledge Proofs with Rust and BellmanWelcome back to our ongoing exploration of zero-knowledge proofs using the Rust programming language and the Bellman library. In our…Dec 27, 2023Dec 27, 2023
Deep RnDZero-Knowledge Proofs in Rust and BellmanIn an era where data privacy is paramount, Zero-Knowledge Proofs (ZKPs) stand out as a beacon of hope. They are cryptographic protocols…Nov 9, 2023Nov 9, 2023
Crypto FairyExploring Vulnerabilities: The zkSNARK Malleability Attack on the Groth16 ProtocolThe recent recognition of zero-knowledge proofs (ZKPs) has garnered attention from a broader audience, including many non-technical…Dec 5, 2023Dec 5, 2023
Yu Jiang ThamBuilding a Zero Knowledge web app with Halo 2 and Wasm (part 1)In this two-part series, we’ll explore building a Zero Knowledge circuit using the Halo 2 zkSNARK proving system and subsequently how we…Apr 26, 2023Apr 26, 2023
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part 6Final article in PLONK series. Here we will implement Prover and the Verifier. In the previous article we coded trusted setup, gate and…Nov 22, 20231Nov 22, 20231
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part4This article will discuss the permutation check in PLONK, which I believe is the second most challenging aspect of the protocol. The most…Nov 14, 20232Nov 14, 20232
Hira SiddiquiinCoinmonksFrom Zero to Hero in Zero Knowledge Proofs [Part 1]This is the first part of the series that takes you from absolute ground zero in ZKPs to a fairly advanced level. We will start from the…Nov 13, 2023Nov 13, 2023
Crypto FairyUnder the hood of zkSNARKs — PLONK protocol: part3Many materials available online explain the basics of the PLONK protocol, often referencing Vitalik’s example P(x)=x3+x+5=35 from his…Nov 11, 20232Nov 11, 20232
Crypto FairyinCoinmonksUnder the hood of zkSNARKs — PLONK protocol: Part 2In the previous article of the PLONK series, we covered the core of the protocol, the KZG commitment scheme, and how polynomial linear…Nov 7, 2023Nov 7, 2023
VeridiseinVeridiseRecursive SNARKs and Incrementally Verifiable Computation (IVC)PART I: Recursive SNARKs and Incrementally Verifiable ComputationJul 27, 2023Jul 27, 2023
VeridiseinVeridiseIntro to Nova & ZK Folding Schemes: Halo and AccumulationThis is a blog series in which we explore ZK folding schemes and NOVA. Part II: Halo and accumulation.Aug 10, 20231Aug 10, 20231
Crypto FairyinCoinmonksUnder the hood of zkSNARKs — PLONK protocol: Part 1PLONK is one of the zero-knowledge proving systems that belong to the SNARK group. Compared to Groth16, which is an older system, PLONK…Nov 2, 20231Nov 2, 20231
StarkWareinStarkWareHerodotus: Proving Ethereum’s State Using Storage Proofs on StarknetProving Ethereum’s state using storage proofs on Starknet is now possible, thanks to StarkWare and Herodotus’ partnership.Nov 2, 2023Nov 2, 2023