0/ What are Non-Interactive Zero-Knowledge Proofs (NIZKPs)? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/10) ๐Ÿงต๐Ÿ‘‡
1/ First of all, what are zero knowledge proofs (ZKPs) in general?

ZKPs are a #cryptographic technique that allow individuals or entities to prove to another that a statement is true, without revealing any information beyond the validity of the statement.
2/ One variant of ZKPs are non-interactive zero-knowledge proofs (NIZKPs), which don't require interaction between the certifier and verifier.
3/ They rely on a common reference string (CRS), which is generated in a trusted setup ceremony that is publicly verifiable.
4/ The CRS serves as the basis for the NIZKPs and allows for the verification of statements without any interaction.
5/ However, the reliance on a CRS for NIZKPs raises concerns about the security of the system, as the CRS must be generated in a trusted setup ceremony to ensure the integrity of the system.
6/ The trusted setup ceremony involves generating a CRS that consists of cryptographic parameters used to generate the NIZKPs used in the system.
7/ One challenge in the design of NIZKPs is finding the balance between security, efficiency, and the size of the CRS.
8/ Ideally, the CRS should be small and secure. Techniques like universal hash functions and the Fiat-Shamir transformation have been proposed to achieve this balance.
9/ Despite the challenges and limitations, NIZKPs remain an active area of research and are expected to play a significant role in the #blockchain ecosystem in the coming years.
10/ Stay tuned for follow-up threads investigating zk-proofs in more depth! ๐Ÿง™โ€โ™‚๏ธโœจ

โ€ข โ€ข โ€ข

Missing some Tweet in this thread? You can try to force a refresh
ใ€€

Keep Current with Zero Knowledge ๐Ÿฆ‡๐Ÿ”Š๐Ÿ“œ

Zero Knowledge ๐Ÿฆ‡๐Ÿ”Š๐Ÿ“œ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @expctchaos

Dec 27
0/ What is Homomorphic Encryption (HE)? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/10) ๐Ÿงต๐Ÿ‘‡
1/ HE is a cryptographic tool that allows you to perform certain types of computations directly on the homomorphically encrypted ciphertext, generating the same results as if you performed the operations on the plaintext.
2/ There are two types of HE: partially homomorphic encryption (PHE) & fully homomorphic encryption (FHE). PHE allows for a limited number of operations on the ciphertext (e.g. addition or multiplication), while FHE allows for any computation to be performed on the ciphertext.
Read 10 tweets
Dec 27
covering a lot of #cryptography and #privacy stuff lately. Time to revisit some of my older privacy-related threads

find below

- the #privacy bull case

- @SecretNetwork and its TEE infrastructure

- @MantaNetwork and zk-tech

- @DuskFoundation and zk-enabled #RegFi

+++

๐Ÿฅท โœจ
1/ the privacy bull case

$SCRT $MANTA $PHA $DUSK $XHV $MINA

2/ TEE infrastructure on $SCRT network

Read 6 tweets
Dec 27
0/ What are Ring Signatures? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/16) ๐Ÿงต๐Ÿ‘‡
1/ Ring signatures are a privacy technology that aims to keep user's identities private when making (signing) transactions in public #blockchain networks
2/ In ring signature schemes, a group of users, called the "ring," can sign a message anonymously using their personal secret keys.
Read 16 tweets
Dec 26
0/ What are Hash Pointers? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/7) ๐Ÿงต๐Ÿ‘‡
1/ Hash pointers are a type of pointer that point to a specific location in a data structure, specifically a block in a blockchain. They are an essential part of the structure and security of blockchains.
2/ To understand hash pointers, it's helpful to know what pointers are more generally. Pointers are variables that store the address of another variable, allowing you to indirectly access and manipulate the value of a variable by referring to its memory location.
Read 9 tweets
Dec 26
0/ What are Hash Functions? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/12) ๐Ÿงต๐Ÿ‘‡
1/ A hash function is a function that converts data into a fixed-size output, also known as a hash.
2/ Cryptographic hash functions are a type of hash function that are designed to be one-way functions, meaning it is computationally infeasible to find the original input from the hash output.
Read 13 tweets
Dec 25
0/ What is the Elliptic Curve Digital Signature Algorithm (ECDSA)? ๐Ÿง™โ€โ™‚๏ธโœจ

(0/21) ๐Ÿงต๐Ÿ‘‡
1/ The Elliptic Curve Digital Signature Algorithm (ECDSA) is a digital signature scheme that is based on the algebraic structure of elliptic curves. It is widely used in many #cryptographic systems, including $ETH, $BTC, and other blockchains.
2/ In the #Ethereum blockchain, ECDSA is used to sign transactions and messages to prove the authenticity of the sender.
Read 22 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(