Home

Understanding Column vs. Row Encoding in Rank-1 Constraint Systems - A Cryptographic Perspective

Understanding Column vs. Row Encoding in Rank-1 Constraint Systems: A Cryptographic Perspective Introduction In the realm of cryptographic protocols, particularly those involving zero-knowledge proofs (ZKP), the efficiency and complexity of computations are of great importance. Rank-1 Constraint Systems (R1CS) play a crucial role in this contex...

Read more

Error Correction in Ethereum's Danksharding - Harnessing the Power of Generalized Reed-Solomon Codes for Ethereum's Scalability

Danksharding is an innovative approach to scale Ethereum’s blockchain, aiming to achieve over 100,000 transactions per second by enabling rollups to add cheaper data to blocks ethereum.org. As Ethereum moves towards Proto-Danksharding and eventually full Danksharding ethereum.org, data extraction and interpolation become crucial aspects of the b...

Read more

The Ultimate Guide to Working with ZKSNARKS and Cryptographic Primitives - From Trusted Setup to Workflow Automation

Overview Trusted Setup Powers of Tau Ceremony Exercises - Trusted Setup Non-Quadratic Constraints Exercises - Non-Quadratic Constraints Groth16 and PLONK Protocols Proof Generation, Computing Witness, Verification and Testing Overview ZKSNARKS are a powerful cryptographic tool that can enabl...

Read more

Paper Review - Zero Knowledge Proofs for Decision Tree Predictions and Accuracy

IN DRAFT MODE Summary Machine learning has become increasingly prominent and is widely used in various applications in practice. Despite its great success, the integrity of machine learning predictions and accuracy is a rising concern. The reproducibility of machine learning models that are claimed to achieve high accuracy remains challenging, ...

Read more

Unlocking the Power of ElGamal Encryption - Implementing and Enhancing Security with SageMath

Introduction ElGamal Encryption Enhancing Security of ElGamal Encryption Finding a Safe Generator Practical Applications of ElGamal Encryption Conclusion Introduction ElGamal encryption is a widely-used public key encryption algorithm that provides confidentiality and security in communication systems. It was proposed by Taher ElGam...

Read more

Rate Limiting Nullifier (RLN) Protocol - Circom Circuits Security Audit

Rate Limiting Nullifier (RLN) Review I recently had the pleasure of conducting my first security audit of a Zero Knowledge Proofs (ZKP) protocol. The protocol in question was the Rate Limiting Nullifier (RLN) Zero Knowledge Proofs Protocol, with its circuits written in Circom. My main focus during this review was on the Circom Circuits of the Z...

Read more