2024-09-22 zk-insights Weekly
文章标签
Solidity合约
Highlights
Friends don’t let friends reuse nonces
This blog post tells a cautionary tale of what can go wrong when implementing a relatively basic type of cryptography: a bidirectional encrypted channel, such as an encrypted voice call or encrypted chat. We’ll explore how more subtle issues of this type can arise in a network with several encrypted channels, and we’ll describe a bug we discovered in a client’s threshold signature scheme.
- <https://blog.trailofbits.com/2024/09/13/friends-dont-let-friends-reuse-nonces/>
The galois library
A performant NumPy extension for Galois fields and their applications
- <https://github.com/mhostetter/galois>
RISC ZERO: Introducing Boundless: The Verifiable Compute Layer
- <https://x.com/RiscZero/status/1835665979201724639>
- <https://risczero.com/blog/boundless-the-verifiable-compute-layer>
Fermah
The Universal Proof Generation Layer
- <https://www.fermah.xyz/>
Aleo Mainnet is Here
- <https://aleo.org/post/announcing-aleo-mainnet/>
powdr: a toolkit that helps build zkVMs and similar proof frameworks.
It has two main components:
- powdr-asm: an extensible assembly IR language to perform dynamic executions.
- powdr-PIL: a low level constraint language that allows you to define arithmetic constraints, lookups, etc. It includes a functional meta-constraint language to describe how constraints are generated.
- <https://github.com/powdr-labs/powdr>
Updates
ZK Day at Science of Blockchain Conference '24
- <https://www.youtube.com/playlist?list=PLJ_r35m80nKjcv_31RcmQ-2-4g7E1btgf>
Succinct Bootcamp Notes
- <https://github.com/yourbuddyconner/succinct-bootcamp>
Semaphore V4
- <https://x.com/SemaphoreDevs/status/1836427240784920722>
- <https://github.com/semaphore-protocol/semaphore/releases/tag/v4.0.0>
Papers
LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK
- <https://eprint.iacr.org/2024/1427>
Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation
- <https://eprint.iacr.org/2024/1431>
Untangling the Security of Kilian's Protocol: Upper and Lower Bounds
- <https://eprint.iacr.org/2024/1434>
Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos
- <https://eprint.iacr.org/2024/1436>
On the Complexity of Cryptographic Groups and Generic Group Models
- <https://eprint.iacr.org/2024/1452>
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup
- <https://eprint.iacr.org/2024/1441>
版权声明
本文仅代表作者观点,不代表区块链技术网立场。
本文系作者授权本站发表,未经许可,不得转载。
发表评论:
◎欢迎参与讨论,请在这里发表您的看法、交流您的观点。