Highlights
Crypto's New Whitespace: WTF is MPC, FHE, and TEE?
作者将分解每一种增强隐私的技术、它们的影响以及使它们成为现实的项目。
The author will break down each privacy-enhancing technology, their impact, and the projects bringing them to life.
Incomplete Musings on Applied Cryptography in 2025
这篇文章讨论了2025年密码学的几个研究领域,包括零知识证明(zk-SNARKs/STARKs)、后量子密码学(PQC)、多方计算(MPC)、全同态加密(FHE)以及模糊加密(iO/FE)。文章特别关注其应用前景与当前挑战,如硬件性能限制、量子计算威胁以及专利问题。
This article explores key cryptography topics in 2025, including zk-SNARKs/STARKs, post-quantum cryptography (PQC), multi-party computation (MPC), fully homomorphic encryption (FHE), and obfuscation (iO/FE). It highlights application potential, challenges like hardware limits, quantum threats, and patent concerns.
Write your Own Virtual Machine
这篇教程教你用 C语言实现一个虚拟机,用于模拟 LC-3 计算机架构,运行汇编程序。它涵盖了虚拟机的内存、寄存器、指令集以及陷阱例程的实现。
This tutorial explains how to build a virtual machine in C to simulate the LC-3 architecture, covering memory, registers, instruction sets, and trap routines for running assembly programs.
MPC game: guess word
是一个基于加密或编码主题的文字解谜游戏,融入了加密或编码的元素。
It is a word puzzle game based on the theme of encryption or coding, incorporating elements of encryption or coding.
Updates
STWO web STARK
Why Computer Scientists Consult Oracles
丁肇中 伟大的是物理
Papers
Post-Quantum Privacy for Traceable Receipt-Free Encryption
Computing the Hermite Normal Form: A Survey
PQConnect: Automated Post-Quantum End-to-End Tunnels
MicroNova: Folding-based arguments with efficient (on-chain) verification
Attribute Based Encryption for Turing Machines from Lattices
A Survey to Zero-Knowledge Interactive Verifiable Computing: Utilizing Randomness in Low-Degree Polynomials
**If you’d like to receive updates via email, subscribe us!
Highlights
The Era of Provable Software
The article explores the rise of provable software, enabled by zero-knowledge proofs (ZK), highlighting the transition from application-specific implementations to general-purpose standards and driving new infrastructure development.
文章探讨了可证明软件的兴起,其通过零知识证明(ZK)技术实现计算验证,从应用专用到通用标准的转变推动了新基础设施的构建。
Irreducible launches alpha-ready Binius library and its first application, an Ethereum state proving service.
Pick, Prove, Profit: The NIVC Singularity.
To understand what it is and why its useful.
了解 NIVC 是什么以及为什么有用。
- https://x.com/wyatt_benno/status/1876699233786396995
- https://blog.icme.io/pick-prove-profit-the-nivc-singularity-2/
Part 6: CKKS Scheme | Building Blocks of FHE
The article explains the CKKS encryption scheme, focusing on encoding, decoding, key generation, and homomorphic operations, ideal for approximate arithmetic in privacy-preserving applications.
文章介绍了 CKKS 加密方案的编码、解码、密钥生成及同态运算,适用于近似数值运算的隐私保护应用。
- https://x.com/FHEOnchain/status/1876561314308313464
- https://www.fheonchain.org/blog-post/part-6-ckks-scheme
An interactive visualization website of Dan Boneh’s cryptography course
Forking the RANDAO: Manipulating Ethereum’s Distributed Randomness Beacon
This proposal analyzes Ethereum's RANDAO manipulability, introducing forking with selfish mixing attacks and exploring short- and long-term countermeasures.
提案分析 RANDAO 的分叉操控性,提出结合自私混合与分叉的策略,并探讨短期与长期防御对策及研究方向。
- https://ethresear.ch/t/forking-the-randao-manipulating-ethereums-distributed-randomness-beacon/21414
Updates
A hash collision bug in identhree's implementation of Poseidon
Rational or Not? This Basic Math Question Took Decades to Answer.
Papers
New Quantum Cryptanalysis of Binary Elliptic Curves (Extended Version)
Leveled Functional Bootstrapping via External Product Tree
Extending Groth16 for Disjunctive Statements
A New Paradigm for Server-Aided MPC
ZODA: Zero-Overhead Data Availability
Forking the RANDAO: Manipulating Ethereum's Distributed Randomness Beacon
Learnings
零知识入门课程
主要面向非专业数学人士的开发者打造,希望使用简单易懂的文字和例子带人快速的了解ZK是如何实现的。
**If you’d like to receive updates via email, subscribe us!
2024
- 241229
- 241222
- 241215
- 241208
- 241201
- 241124
- 241117
- 241110
- 241103
- 241027
- 241020
- 241013
- 241006
- 240929
- 240922
- 240915
- 240908
- 240901
- 240825
- 240818
- 240811
- 240804
- 240728
- 240721
- 240714
- 240707
- 240630
- 240623
- 240616
- 240609
- 240602
- 240526
- 240519
- 240512
- 240505
- 240428
- 240421
- 240413
- 240331
- 240322
- 240315
- 240308
- 240301
Highlights
Understanding Binius
Terence Tao: Machine-Assisted Proof
Nethermind: Introducing LatticeFold Rust implementation
MyZKP: Building Zero Knowledge Proof from Scratch in Rust
MyZKP is a Rust implementation of zero-knowledge protocols built entirely from scratch! This project serves as an educational resource for understanding and working with zero-knowledge proofs.
Episode 346: ZK in Review: Decoding 2024 & Predicting 2025
Hackathon: MHEGA - Make Homomorphic Encryption Great Again
Explored using HE for coSNARKs by adapting HElib. Despite getting optimizations to work, FFTs in HE are still 10,000 times slower than plain or MPC and need huge memory.
Papers
(Deep) Learning about Elliptic Curve Cryptography
Bypassing the characteristic bound in logUp
Zero Knowledge Memory-Checking Techniques for Stacks and Queues
How To Think About End-To-End Encryption and AI: Training, Processing, Disclosure, and Consent
**If you’d like to receive updates via email, subscribe us!
Highlights
Introducing OpenVM
At Axiom we're excited to announce OpenVM, a performant and modular zkVM framework built for customization and extensibility. Designed in collaboration between Axiom, Scroll and individual contributors including Max Gillett, the v0.1 release of OpenVM includes proofs of unbounded length Rust programs, onchain verification, and VM extensions including ECDSA, optimal Ate pairing, and int256 and modular arithmetic.
To learn more, check out:
- Blog: https://blog.openvm.dev/announce
- Github: https://github.com/openvm-org/openvm
- OpenVM release tweet: https://x.com/openvm_org/status/1868702764022526282
- Axiom release tweet: https://x.com/axiom_xyz/status/1868702665330638931
Arithmetic circuits in Rust
The following links are the summary of article and the specific article respectively.
- https://x.com/m2magician/status/1868591692963848335
- https://np.engineering/posts/arithmetic-circuits/
2024 in Review : The Year in Math
The article reviews 2024's major math breakthroughs, including the geometric Langlands conjecture proof, sphere-packing advances, AI's growing role in math, and progress in number theory like the Riemann hypothesis and abc conjecture.
2024 in Review : The Year in Computer Science
The article reviews 2024’s advances in computer science, including breakthroughs in AI understanding, quantum error correction, the fifth busy beaver problem, and quantum algorithms, while highlighting challenges in cryptography, efficiency, and AI’s slowing progress.
What Is Entropy? A Measure of Just How Little We Really Know.
The article explores entropy as a measure of disorder and ignorance, tracing its evolution from thermodynamics to information theory. It highlights entropy’s subjectivity, its ties to knowledge and uncertainty, and its profound implications for physics, decision-making, and human understanding.
- https://www.quantamagazine.org/what-is-entropy-a-measure-of-just-how-little-we-really-know-20241213/
Formally Verified Cryptographic Proof Systems
This library aims to provide a modular and composable framework for formally verifying cryptographic proof systems (e.g. SNARKs) based on Interactive (Oracle) Proofs. This is done as part of the Verified zkEVM project.
ZKryptium
This library enables the creation of zero-knowledge proofs, exposing cryptographic primitives facilitating the development of a Verifiable Credentials (VCs) system capable of handling both Anonymous Credentials and Selective Disclosure Credentials.
Updates
Using ZKPs on Solana with the SP1 Solana Verifier
So you wanna Post-Quantum Ethereum transaction signature
Tidbits of post-quantum ETH
World-leaders in Cryptography: Ivan Damgård
World-leaders in Cryptography: Chris Peikert
Papers
Mira: Efficient Folding for Pairing-based Arguments
Orbweaver: Succinct Linear Functional Commitments from Lattices
Adaptive Special Soundness: Improved Knowledge Extraction by Adaptive Useful Challenge Sampling
Verified Foundations for Differential Privacy
Cryptographic Commitments on Anonymizable Data
How to Compress Garbled Circuit Input Labels, Efficiently
Improved Rejection Sampling for Compact Lattice Signatures
Learning with Errors from Nonassociative Algebras
**If you’d like to receive updates via email, subscribe us!
Highlights
Google Quantum AI: Meet Willow, our state-of-the-art quantum chip
New chip demonstrates error correction and performance that paves the way to a useful, large-scale quantum computer
Your definitive guide to zkVMs
The goal of this article is to not only provide objective performance metrics but also talk about the subjective experience while we were building using this toolkit.
Introducing the fhEVM Coprocessor: Run FHE smart contracts on Ethereum, Base, and other EVM chains
Zama’s fhEVM Coprocessor enables confidential smart contracts on EVM chains using FHE, ensuring data privacy, scalability, and composability, supporting applications like private stablecoins, governance, and tokenization, all programmable via Solidity.
Brave: Commitments and zero-knowledge attestations over TLS 1.3: DiStefano protocol
Brave’s DiStefano protocol enables zero-knowledge proofs over TLS 1.3, ensuring secure data commitments, privacy-preserving attestations, and efficient integration for applications like age verification and anti-fraud checks.
Scribe: Low-memory SNARKs via Read-Write Streaming
Scribe!Scribe is a new low-memory SNARK that is able to prove arbitrarily-large circuits while using minimal memory.
zk, verifiability, and privacy projects on Solana
A Technical Dive into Jolt: The RISC-V zkVM
The article provides a detailed explanation of how Jolt zkVM works, covering instruction lookup, offline memory checking, and R1CS constraints to verify RISC-V program correctness using zero-knowledge proofs.
Improving the Security of the Jolt zkVM
The article uncovers critical security flaws in Jolt zkVM, including execution trace validation, output checking, and memory layout issues, detailing their fixes.
Mathematicians Uncover a New Way to Count Prime Numbers
The article details how mathematicians used rough primes and Gowers norms to prove the infinitude of specific prime forms, marking a breakthrough in number theory.
2024 ZK Market Map
Made by Electric Capital, there are five major directions, including: applications, protocols, developer tools and services, interoperability and middleware, and core infrastructure, with the technical difficulty increasing in sequence.
Updates
Keccak256 hash trace proving & verifying with Binius
- https://x.com/bartolomeo_diaz/status/1866025026778198050
- https://keccak.binius.iosis.tech/
- https://github.com/Okm165/binius-web-snark
Papers
【论文速递】Asiacrypt'24(零知识协议、可验证计算、折叠方案、简洁论证)
【论文速递】TCC'2024 (证明、单向函数、格、同态、混淆)
On the Security of LWE-based KEMs under Various Distributions: A Case Study of Kyber
Low Communication Threshold Fully Homomorphic Encryption
Garbled Circuits with 1 Bit per Gate
BOIL: Proof-Carrying Data from Accumulation of Correlated Holographic IOPs
Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption
BitVM: Quasi-Turing Complete Computation on Bitcoin
Evasive LWE Assumptions: Definitions, Classes, and Counterexamples
Xiezhi: Toward Succinct Proofs of Solvency
Regev's attack on hyperelliptic cryptosystems
The Mis/Dis-information Problem is Hard to Solve
Anonymous credentials from ECDSA
Honest-Majority Threshold ECDSA with Batch Generation of Key-Independent Presignatures
Crescent: Stronger Privacy for Existing Credentials
Universal SNARGs for NP from Proofs of Correctness
The Existence of Quantum One-Way Functions
On the BUFF Security of ECDSA with Key Recovery
The Revisited Hidden Weight Bit Function
Learnings
0xPARC book: Programmable Cryptography
awesome-miden
Lattice Based Cryptography for Beginners
Introduction to Blockchain Mechanism Math, Terminology, and Hieroglyphics
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
Optimizing Montgomery Multiplication in WebAssembly
这篇文章探讨了如何在 WebAssembly 中优化 Montgomery 乘法以加速密码学操作,比较了 Mitscha-Baude 方法和 Emmart 方法等最新技术,展示了性能基准并提出了未来在零知识证明加速方面的研究方向。
The article explores optimizing Montgomery multiplication in WebAssembly for faster cryptographic operations, comparing state-of-the-art methods, including Mitscha-Baude's and Emmart's, highlighting performance benchmarks and future directions for zero-knowledge proof acceleration.
Chosen-Instance Attack
文章解释了「chosen-instance attacks」(选择实例攻击),即攻击者通过利用缺乏零知识属性的证明系统,通过多次证明插值见证多项式来提取私有输入。
This article explains "chosen-instance attacks", where adversaries exploit proof systems lacking zero-knowledge to extract private inputs by interpolating witness polynomials across multiple proofs.
ZODA: An Explainer
ZODA(零开销数据可用性)通过利用随机化和纠错码高效验证正确性,以最低开销提升区块链的可扩展性。
ZODA (Zero-Overhead Data Availability) enhances blockchain scalability by ensuring data availability with minimal overhead, using randomization and error-correcting codes to verify correctness efficiently.
zeam - Zig Beam Client
Zeam 是一个基于 Zig 的客户端,用于支持以太坊最新提出的 Beam Chain,这是一种 ZK 以太坊共识协议,旨在扩展和使以太坊去中心化。它支持开放开发、ZK-VM 集成。
Zeam is a Zig-based client for Beam Chain, a future ZK-powered Ethereum consensus protocol aiming to scale and decentralize Ethereum. It supports open development, ZK-VM integration.
World-leaders in Cryptography: Vadim Lyubashevsky
Vadim Lyubashevsky 是苏黎世 IBM 欧洲研究中心的密码学家,他的核心研究重点是基于格的方法,尤其是在实用格加密、数字签名和隐私保护原语领域。他与 Chris Peiker 和 Oded Regev(LWE 的发明者)一起发表了一篇经典论文,题为「论理想格和环上的误差学习」,该论文已被用作后量子密码学中格方法的基础。
Vadim Lyubashevsky is a cryptographer at IBM Research Europe in Zurich.His core research focus is around lattice-based methods, and especially in areas of practical lattice encryption, digital signatures and privacy-preserving primitives. Along with Chris Peiker and Oded Regev (the inventor of LWE), he published a classic paper entitled "On ideal lattices and learning with errors over rings", which has been used as a foundation for lattice methods within post-quantum cryptography.
Reading Alan Turing - Avi Wigderson
概要:讨论图灵的一些知名和鲜为人知的论文,举例说明他提出的深刻、有先见之明的思想的范围,并提及理论 CS 社区对这些思想的后续工作。
Overview: Discussing some well-known and less-known papers of Turing, exemplify the scope of deep, prescient ideas he put forth, and mention follow-up work on these by the Theoretical CS community.
Avi Wigderson's Turing award biography
对 2023 年图灵奖获得者 Avi Wigderson 的个人介绍,重点总结了他的教育背景、职业经历、主要研究贡献(如随机性、复杂性理论和密码学),以及他在理论计算机科学领域的领导地位和获得的荣誉。
Avi Wigderson, 2023 Turing Award laureate, is honored for foundational contributions to computational theory, including randomness, cryptography, and complexity, and for his intellectual leadership in theoretical computer science.
Updates
Torus-acceleration for multiexponentiation on GT
ZK Accelerate Bangkok: Videos, Photos & Recap
Noir 1.0 Pre-Release is live
- https://github.com/noir-lang/noir/tree/master/docs/versioned_docs/version-v1.0.0-beta.0
- https://x.com/NoirLang/status/1864774000741880020
Papers
A Comprehensive Review of Post-Quantum Cryptography: Challenges and Advances
LiLAC: Linear Prover, Logarithmic Verifier and Field-agnostic Multilinear Polynomial Commitment Scheme
One-More Unforgeability for Multi- and Threshold Signatures
A Complete Characterization of One-More Assumptions In the Algebraic Group Model
Worst-Case Lattice Sampler with Truncated Gadgets and Applications
MultiReg-FE: Registered FE for Unbounded Inner-Product and Attribute-Weighted Sums
Proof of Time: A Method for Verifiable Temporal Commitments Without Timestamp Disclosure
Lova: Lattice-Based Folding Scheme from Unstructured Lattices
Efficient Succinct Zero-Knowledge Arguments in the CL Framework
Scribe: Low-memory SNARKs via Read-Write Streaming
RoK, Paper, SISsors – Toolkit for Lattice-based Succinct Arguments
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
The Map of ZK
A list of categorised projects pushing the ZK ecosystem further.
Latest ZK Research with Dan Boneh
Anna 采访了斯坦福大学教授 Dan Boneh,探讨了最新的零知识研究,包括基于格的 SNARKs、内容溯源的 ZK、全同态加密(FHE)中的 ZK 应用,以及机器学习中的 ZK 进展等。此外,还提及了多个相关研究工作和论文。
Anna interviews Stanford professor Dan Boneh to discuss the latest zero-knowledge research, including lattice-based SNARKs, ZK for content provenance, ZK in FHE, and advancements in ZK for machine learning. Several related works and papers are also highlighted.
Poseidon Cryptanalysis Initiative 2024-2026
Poseidon 密码分析计划(2024-2026)由以太坊基金会发起,旨在评估 Poseidon 和 Poseidon2 哈希函数的安全性与性能。计划包括赏金计划、攻击奖励、Groebner 基研究、工作坊及短期研究资助,重点关注抵御代数和统计攻击的能力。
The Poseidon Cryptanalysis Initiative (2024-2026), led by the Ethereum Foundation, evaluates the security and performance of Poseidon and Poseidon2 hash functions. It includes bounties, attack rewards, Groebner basis research, workshops, and short-term grants, focusing on resistance to algebraic and statistical attacks.
上纽大计算机科学助理教授王明苑:深耕密码学的教研之路
PQMagic
PQMagic(Post-Quantum Magic)是国内首个支持 FIPS 203 204 205标准 的高性能安全后量子密码算法库,并支持性能更高效的国产自研 PQC 算法 Aigis-Enc、Aigis-Sig(PKC 2020)和 SPHINCS-α(CRYPTO 2023)。 该项目由郁昱教授团队(上海交通大学 、上海期智研究院 )开发和维护,旨在提供自主、可控、安全、高性能的 PQC 算法,以及为后量子密码迁移工作提供解决方案。
Towards Fast Verification: Polynomial Commitments from Lattices by Ngoc Khanh Nguyen
A gentle introduction to functional encryption
A quick history of “precompiles” in zkVMs
Updates
How Fast We Can Go: Proving Million Keccak Function Per Second
3 updates about Jolt
Papers
On Threshold Signatures from MPC-in-the-Head
Opening the Blackbox: Collision Attacks on Round-Reduced Tip5, Tip4, Tip4' and Monolith
ZK-SNARKs for Ballot Validity: A Feasibility Study
On Efficient Computations of Koblitz Curves over Prime Fields
On Concrete Security Treatment of Signatures Based on Multiple Discrete Logarithms
On Witness Encryption and Laconic Zero-Knowledge Arguments
On White-Box Learning and Public-Key Encryption
Algebraic Zero Knowledge Contingent Payment
EndGame: Field-Agnostic Succinct Blockchain with Arc
An Extended Hierarchy of Security Notions for Threshold Signature Schemes and Automated Analysis of Protocols That Use Them
Orion's Ascent: Accelerating Hash-Based Zero Knowledge Proof on Hardware Platforms
Decentralized FHE Computer
Generic, Fast and Short Proofs for Composite Statements
Learning
椭圆曲线密码学与 Typescript 实现
ZK Whiteboard Sessions - S2M5: Small Fields, Binary Fields with Jim Posen
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
Devcon Key Insight: Indistinguishability Obfuscation
本文讨论了 不可区分混淆(iO) 这一被称为密码学「圣杯」的技术,它能够在保留程序功能的同时隐藏其逻辑。文章提到 Sora(基于标准假设)和 Gauss Labs(基于非标准假设)在 iO 实现上的最新进展,并探讨了如安全投票和抗串通多方系统等实际应用,同时提及了验证者串通等挑战。尽管 iO 目前效率低下且仍偏理论化,但其在区块链、zkSNARKs 等领域的潜力巨大,相关实践正在逐步推进。
This article discusses the advancements in Indistinguishability Obfuscation (iO), a cryptographic "holy grail" that hides program logic while preserving functionality. It highlights recent progress by Sora (standard assumptions) and Gauss Labs (non-standard assumptions). Practical applications, like secure voting and collusion-resistant multi-party systems, are explored, alongside challenges like validator collusion. Although iO remains inefficient and theoretical, its potential in blockchain, zkSNARKs, and beyond is immense, with ongoing efforts to make it practical.
awesome zkVm
这是一个关于 zkVM(零知识虚拟机)的精选资源仓库。 A curated list of zkVM, zero-knowledge virtual machine.
Getting the bugs out of SNARKs: The road ahead
About the challenges and progress in improving SNARKs.
- https://x.com/SuccinctJT/status/1859327094452277701
- https://a16zcrypto.com/posts/article/getting-bugs-out-of-snarks/
zkVM Security: What Could Go Wrong?
本文探讨了 zkVM(零知识虚拟机)的安全挑战。zkVM 通过抽象密码学复杂性,简化了零知识证明(ZKP)的开发,但其工作流程——从编译、执行到证明和验证——存在多种漏洞。编译器错误、不当的约束设置以及验证器缺陷可能导致关键的安全问题,如错误的证明或被篡改的输出。定制的预编译功能和确定性随机数等预处理步骤增加了复杂性和风险。确保内存一致性、指令执行正确性以及轨迹验证的严谨性至关重要。随着 zkVM 技术的发展,严格的审计、形式化验证和以安全为核心的开发将是构建可靠可信的零知识系统的关键。
The article explores the security challenges of zkVMs (Zero-Knowledge Virtual Machines), which simplify zero-knowledge proof (ZKP) development by abstracting cryptographic complexities. It highlights vulnerabilities across the zkVM workflow—compilation, execution, proving, and verification. Compiler bugs, improper constraints, and verifier weaknesses can lead to critical security failures, such as incorrect proofs or manipulated outputs. Custom preprocessing steps, like precompiles and deterministic randomness, add complexity and risk. Ensuring consistency in memory, instruction handling, and trace verification is essential. As zkVMs evolve, rigorous audits, formal verification, and security-focused development are vital to building robust and trustworthy zero-knowledge systems for real-world applications.
A formal verification tool for Noir
工具 coq-of-noir
将 Noir 程序翻译为 Coq,以进行形式化验证,从而确保程序在所有参数下的预期行为。
The tool, coq-of-noir
, translates Noir programs into Coq for formal verification, ensuring expected behavior for all parameters.
AlphaProof's Greatest Hits
本文重点介绍了 AlphaProof 使用 Lean 证明助手解决 2024 年国际数学奥林匹克(IMO)三道极具挑战性问题(第 1、2、6 题)的解法。
The article highlights AlphaProof's solutions to three challenging IMO 2024 problems (1, 2, and 6) using the Lean proof assistant.
New quantum algorithm for approximate polynomial interpolation
主要策略利用了 Regev 的归约(最初出现在基于格的密码学中):可以利用 Reed-Solomon 码的高效解码器,并通过应用量子傅里叶变换(QFT),从而得到一个用于近似多项式插值的高效量子算法。
the main strategy exploits Regev's reduction (that appeared initially in lattice-based crypto): one can exploit the existence of efficient decoders for Reed-Solomon codes and apply a QFT in order to get an efficient quantum algo for approximate polynomial intepolation
The DIF 2024 Hackathon List of Winners
DIF(Decentralized Identity Foundation,去中心化身份基金会) 是一个致力于推动去中心化身份(Decentralized Identity, DID)技术发展的组织。
DIF (Decentralized Identity Foundation) is an organization dedicated to advancing Decentralized Identity (DID) technology.
Updates
Slicing Up Binary Towers: Accelerating Sumcheck on GPUs
Improving the Security of the Jolt zkVM
Celebrating AleoBFT formal verification milestone
Extractable Witness Encryption for KZG Commitments - Brechy
Reflections and Insights Post-Devcon
CoSnarks in Action at Devcon7
E11: Nigel Smart, Zama
Fhenix Nitrogen Testnet Upgrade
Papers
Field-Agnostic SNARKs from Expand-Accumulate Codes
Cirrus: Performant and Accountable Distributed SNARK
Multi-Holder Anonymous Credentials from BBS Signatures
Practical Zero-Knowledge PIOP for Public Key and Ciphertext Generation in (Multi-Group) Homomorphic Encryption
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
How Public Key Cryptography Really Works, Using Only Simple Math
SNARGs Book Study Group
Alessandro Chiesa, co-author of "Building Cryptographic Proofs from Hash Functions" (aka the SNARGs Book), explained how the book was constructed, and clarified that the pre-requisites to study it are only undergrad class math!
ZNARKs: SNARKs for The Integers
10 Must-Read Papers That Shaped Modern Zero-Knowledge Proofs
Become a Halo2 Hero: Master Zero-Knowledge Proofs with Our New Course
New Elliptic Curve Breaks 18-Year-Old Record
Polygon ZisK
Linea zkEVM
The 33-Year Crypto War
Steven Rudich (1961-2024)
- https://blog.computationalcomplexity.org/2024/11/steven-rudich-1961-2024.html
- https://fortnow.com/weblog/media/Rudich-Remembrance-Impagliazzo.pdf
A Zero-Knowledge PCP Theorem
Unveiling the Magic Behind Starknet: A Deep Dive into New Specifications
Updates
Jolt: An update
STARKs & Friends by Giacomo Fenzi
The new NIST IR 8547 "Transition to Post-Quantum Cryptography Standards"
makes RSA, Elliptic Curve crypto disallowed by 2035. Hybrid (trad./pqc) solutions are accommodated by NIST.
ZK Whiteboard Sessions - S2M4: Risc-V ZKVMs with Uma Roy
noname 3.0
Native Hints, Standard Library, Compiler Visualizer
llvm-valida v0.5.0-alpha
ZK Hack - Let's Hash it Out - WriteUp
Papers
Verifying Jolt zkVM Lookup Semantics
Zero-Knowledge Location Privacy via Accurate Floating-Point SNARKs
Khatam: Reducing the Communication Complexity of Code-Based SNARKs
The LaZer Library: Lattice-Based Zero Knowledge and Succinct Proofs for Quantum-Safe Privacy
Notions of Quantum Reductions and Impossibility of Statistical NIZK
Non-Interactive Zero-Knowledge Proofs with Certified Deletion
BatchZK: A Fully Pipelined GPU-Accelerated System for Batch Generation of Zero-Knowledge Proofs
Lova: A Novel Framework for Verifying Mathematical Proofs with Incrementally Verifiable Computation
Faster algorithms for isogeny computations over extensions of finite fields
-
https://eprint.iacr.org/2024/1852 If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
Apple: Private Cloud Compute Security Guide
A new frontier for AI privacy in the cloud.
SpaZK: 100X Faster Verifiable AI powered by Cross-stack ZKML Optimization
To enable practical ZKML, model simplification techniques like pruning and quantization should be applied. These simplification techniques not only condense complex models into forms with sparse, low-bit weight matrices, but also maintain exceptionally high model accuracies that matches its unsimplified counterparts. In this paper, we propose SpaGKR, a novel sparsity-aware ZKML framework that is proven to surpass capabilities of existing ZKML methods. SpaGKR is a general framework that is widely applicable to any computation structure where sparsity arises. When applying SpaGKR-LS to a special series of simplified model - ternary network, it achieves further efficiency gains by additionally leveraging the low-bit nature of model parameters. 为实现实用的 ZKML,需要采用剪枝和量化等模型简化技术。 这些简化技术不仅能将复杂的模型压缩成稀疏、低比特权重矩阵的形式,还能保持极高的模型精度,与未简化的模型相媲美。 在本文中,我们提出了一种新颖的稀疏感知 ZKML 框架 SpaGKR,它已被证明超越了现有 ZKML 方法的能力。 SpaGKR 是一个通用框架,可广泛适用于出现稀疏性的任何计算结构。 在将 SpaGKR-LS 应用于一系列特殊的简化模型--三元网络时,它通过额外利用模型参数的低位特性,进一步提高了效率。
- https://brevisdotnetwork.wpcomstaging.com/2024/11/08/spazk-100x-faster-verifiable-ai-powered-by-cross-stack-zkml-optimization/
- https://github.com/brevis-network/SpaZK
Sampling for Proximity and Availability
Getting started with MPC
Here's a short list of resources that are beginner friendly in terms of both books, papers and code Mikerah 的推荐 MPC 学习清单,适合初学者,包括书籍,论文和代码
Known Attacks On Elliptic Curve Cryptography
This article presents what elliptic curves are, the basic operations that can be performed on them, and how they can be used in cryptographic context. The majority of this article consists of examples of known attacks on incorrect implementations or wrong uses of them. Throughout the article I try to separate the explanation into an intuitive and high level part, and a mathematical part that goes into more details. 本文介绍了什么是椭圆曲线、在椭圆曲线上可以执行的基本操作,以及如何在加密环境中使用椭圆曲线。 本文的大部分内容都是对椭圆曲线不正确实现或错误使用的已知攻击实例。 在整篇文章中,我试图将解释分为直观和高层次的部分,以及深入细节的数学部分。另外仓库还配套了相应的 sage 示例代码。
Updates
Ceno: Non-uniform, Segment and Parallel Risc-V Zero-knowledge Virtual Machine
libsecp256k1 v0.6.0: MuSig2 Support & Other Improvements
Benefits of EOF (EVM Object Format) for Zero Knowledge Proofs
o1js support secp256r1
Papers
Revisiting subgroup membership testing on pairing-friendly curves via the Tate pairing
Linear Proximity Gap for Reed-Solomon Codes within the 1.5 Johnson Bound
Foundations of Adaptor Signatures
Fast Two-party Threshold ECDSA with Proactive Security
Encrypted RAM Delegation: Applications to Rate-1 Extractable Arguments, Homomorphic NIZKs, MPC, and more
Smoothing Parameter and Shortest Vector Problem on Random Lattices
OPTIMSM: FPGA hardware accelerator for Zero-Knowledge MSM
Siniel: Distributed Privacy-Preserving zkSNARK
Honey I shrunk the signatures: Covenants in Bitcoin via 160-bit hash collisions
BrakingBase - a linear prover, poly-logarithmic verifier, field agnostic polynomial commitment scheme
VCVio: A Formally Verified Forking Lemma and Fiat-Shamir Transform, via a Flexible and Expressive Oracle Representation
Batching Adaptively-Sound SNARGs for NP
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
零知识证明递归与复合技术研究综述 (张宗洋 周子博 邓燚)
keyword: ZKP, Recursive proof, IPA, IVC, Commit-and-Proof
RLN- Rate-Limiting Nullifier
RLN (Rate-Limiting Nullifier) is a zk-gadget/protocol that enables spam prevention mechanism for anonymous environments.
Naysaying Ligero and Brakedown proofs
We present the first instantiation of Naysayer proofs for Ligero & Brakedown polynomial commitment schemes
An Update on Lookups w/ Ariel Gabizon
ZK HACK Whiteboard SEASON 2 MODULE 3. In this module, Nicolas Mohnblatt and Ariel Gabizon start by giving an overview of the lookup landscape, going over the three main approaches that have been used in lookup protocols. They then dive deep into one of those approaches, the log-derivative approach (or its clearer name, fractional sums).
ZK 黑客白板第二季第 3 单元。 在本模块中,Nicolas Mohnblatt 和 Ariel Gabizon 首先概述了查找表技术,并介绍了查找协议中使用的三种主要方法。 然后,他们深入探讨了其中一种方法,即对数派生方法(或其更清晰的名称,分数和)。
powdrVM: A Multi-Prover, Future-Proof zkVM
powdrVM is the zkVM with multi-prover flexibility. Developers can use Plonky3, Halo2 and eSTARKs in the same zkVM. powdrVM supports standard Rust.
powdrVM 是具有多验证器灵活性的 zkVM。 开发人员可以在同一个 zkVM 中使用 Plonky3、Halo2 和 eSTARKs。powdrVM 支持标准 Rust。
Abstract Algebra: Theory and Applications
Thomas W. Judson 制作的线性代数课程内容的网站,包括了完整的教程和配套的视频讲解。不同内容分模块呈现,是非常优秀的学习材料。
Introducing DARA: A New Design for ZK Prover Networks
Updates
Surya Mathialagan - Universal SNARGs for NP from Proofs of Completeness
PSE Lectures Ep 24 - Rational maps between elliptic curves
PSE Lectures Ep 34 - Constructing the Weil pairing
Bain Capital Crypto: Expanding
Plonky3: it's now over 2 million hashes per second
Alex Block: Concrete Security of the FRI Protocol
Papers
DEEP Commitments and Their Applications
We circumvent the obstacle posed by the naive approach by decoupling the FRI step from the preceding steps. Our technique reduces an algebraic execution trace to a single polynomial commitment in a way that can be verified independently from a possible follow-up low degree test. The immediate implication is that a single polynomial, along with some supplementary commitment information, suffices as the witness to a polynomial commitment, as opposed to the entire algebraic execution trace. This difference results in a factor 100-1000 reduction in the memory cost of the now-not-so-na¨ ıve approach.
Alan Szepieniec 在论文中提出了一种承诺多项式的方法,这种方法允许分批甚至推迟执行 FRI 等 low degree 测试。 特别是,它实现了 STARK 的(无限深度)聚合。
An update to the FRI-Binius paper
Improves the ring-switching technique for small-field polynomial commitments.
zkMarket : Privacy-preserving Digital Data Trade System via Blockchain
Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments
Quantum Black-Box Separations: Succinct Non-Interactive Arguments from Falsifiable Assumptions
Randoms
Mathematical Symbols
数学符号和数学格式写作的 4 页纸总结,有人打印出来贴在屏幕旁边 :)
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
NIST PQ Crypto: Additional Digital Signature Schemes round 2 announced
Combining Machine Learning and Homomorphic Encryption in the Apple Ecosystem
Machine Learning with Homomorphic Encryption and SVM
New Mersenne prime found
ZK stats
Ethereum Mainnet proof volume and fee spend by Zero-Knowledge projects
ZK-SXG
Verifiable Web Proofs using Signed HTTP Exchanges (SXG).
World's First ZK-Backed Digital Identity Launched in Buenos Aires for 3.6M Eligible Citizens
Math Is Still Catching Up to the Mysterious Genius of Srinivasa Ramanujan
Big Advance on Simple-Sounding Math Problem Was a Century in the Making
A new proof about prime numbers illuminates the subtle relationship between addition and multiplication — and raises hopes for progress on the famous abc conjecture.
Possible futures of the Ethereum protocol, part 4: The Verge
Updates
Awesome Binius
A curated list of awesome things related to learning Binius.
Introducing Valida Rust Alpha Compiler
Papers
Universally Composable Non-Interactive Zero-Knowledge from Sigma Protocols via a New Straight-line Compiler
Rate-1 Statistical Non-Interactive Zero-Knowledge
From One-Time to Two-Round Reusable Multi-Signatures without Nested Forking
Straight-Line Knowledge Extraction for Multi-Round Protocols
On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures
Arc: Accumulation for Reed--Solomon Codes
Embedded Curves and Embedded Families for SNARK-Friendly Curves
More Efficient Isogeny Proofs of Knowledge via Canonical Modular Polynomials
The Learning Stabilizers with Noise problem
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
The Sum-Check Protocol w/ Justin Thaler
In this module, Tracy Livengood and Justin Thaler provide a comprehensive introduction to the sum-check protocol and why it is so powerful, beginning with a catch-up on polynomials (univariate, multivariate, multilinear) as well as the important concept of multilinear extensions, and introduce the “equality” function. They go on to explain the mechanics of the sum-check protocol, detailing its goals and process, before walking us through the rounds of the protocol and demonstrating how it is applied. They then highlight the advantages of sum-check over other SNARK systems, and sketch the Spartan polynomial IOP. Toward the end, they delve into the Goldwasser, Kalai and Rothblum (GKR) protocol and discuss the trade-offs between this system and Spartan.
Deep dive into Circle-STARKs FFT
@ignaciohagopian wrote an article explaining the rationale and the mechanics of the specific fast Fourier transform (FFT) defined in the Circle STARKs paper.
Possible futures of the Ethereum protocol, part 1: The Merge
Possible futures for the Ethereum protocol, part 2: The Surge
Vac 101: Transforming an Interactive Protocol to a Noninteractive Argument
Intro To Math Proofs (Full Course)
A library for lattice-based multiparty homomorphic encryption in Go
Updates
Plonky3 has gotten 2-4x faster, with M3 Max now proving ~1.7 million Poseidon2 hashes per second.
Overview of Circle STARKs
Proof is in the Pudding 02: zkTLS
ZK12: ZK on Bitcoin - Liam Eagen
ZK12: Myth vs. Reality: Enhancing Proving Time in KZG-Backed Plonkish Systems for zkWASM - Sinka Gao
House of ZK - Virtual Conference 1.0
Interview with Eli Ben-Sasson - HoZK Virtual Conference 1.0
ZK-SecreC
Open sourced ZK-SecreC, a zero knowledge toolkit for building large proofs on computation. Imagine proving to someone that your health records don't have a diagnosis or that you have been staying in some are without leaking the source data.
On Distributed FRI-based Proof Generation
Papers
Glacius: Threshold Schnorr Signatures from DDH with Full Adaptive Security
Sparrow: Space-Efficient zkSNARK for Data-Parallel Circuits and Applications to Zero-Knowledge Decision Trees
RPO-M31 and XHash-M31: Efficient Hash Functions for Circle STARKs
Fiat-Shamir Goes Rational
Curve Forests: Transparent Zero-Knowledge Set Membership with Batching and Strong Security
One-Shot Native Proofs of Non-Native Operations in Incrementally Verifiable Computations
Compressed -protocol Theory from Sum-check
Instance Compression, Revisited
zkFFT: Extending Halo2 with Vector Commitments & More
A Hidden-Bits Approach to Black-Box Statistical ZAPs from LWE
Consensus on SNARK pre-processed circuit polynomials
Multi-party Setup Ceremony for Generating Tokamak zk-SNARK Parameters
Batch Range Proof: How to Make Threshold ECDSA More Efficient
Blind zkSNARKs for Private Proof Delegation and Verifiable Computation over Encrypted Data
GAPP: Generic Aggregation of Polynomial Protocols
On pairing-friendly 2-cycles and SNARK-friendly 2-chains of elliptic curves containing a curve from a prime-order family
Computational Analysis of Plausibly Post-Quantum-Secure Recursive Arguments of Knowledge
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
And our YouTube channel
Highlights
On Distributed FRI-based Proof Generation
这篇博客讨论了分布式基于 FRI 的 SNARK 证明生成方案。方案将不同子多项式的证明过程分配到不同的证明者上,利用这些子多项式都符合低阶多项式检查的特性来组合它们,减少了计算和通信开销。
zkVM Testing Report: Evaluating Zero-Knowledge Virtual Machines for Nescience
RISC ZERO: Introducing Steel 1.0
- https://risczero.com/blog/introducing-steel-1.0
- https://github.com/risc0/risc0-ethereum/tree/release-1.1/steel
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
WHIR 既是里德-所罗门编码的 IOPP,也是多线性多项式承诺方案(PCS),并在所有此类方案中实现了最快的验证速度,甚至包括具有可信设置的单变量 PCS。 它在保持基于哈希方案的最先进参数大小和验证器哈希复杂度的同时,只需要透明设置并保证后量子安全。
Succinct Ships: Optimized bn254 & bls12-381 Precompiles in SP1
WE-KZG: Encrypt to KZG.
Introducing xOS: The Provable Exchange
The universal ZK settlement layer that makes any exchange Provable. xOS leverages @RiscZero's ZK prover with @CelestiaOrg underneath to prove off-chain transactions on-chain.
- https://x.com/hashflow/status/1843730011875877114
- https://medium.com/@hashflowdex/introducing-xos-the-provable-exchange-e875f4e6b30e
Zero Knowledge Summit 12 - LIVESTREAM
The Potential of OP_CAT for BTC - Using CAT20 as an Example
- https://hackmd.io/@GMhPT1-rT6GY8bYBRDh1jA/H1Hr8Hz11x
- https://hackmd.io/@GMhPT1-rT6GY8bYBRDh1jA/HyTbYJiA0
Why You Should Pay Attention to RC-STARKs by Omer@Ingonyama
This article provides a friendly exposition to the new paper: “Really Complex Codes with Application to STARKs” by @Yuval_Domb
- https://x.com/Ingo_zk/status/1844662138645688406
- https://medium.com/@ingonyama/why-you-should-pay-attention-to-rc-starks-7e33cad2a743
- https://eprint.iacr.org/2024/1620.pdf
Without Permission, With Programmable Cryptography
Odyssey: A testnet OP Stack rollup aimed at enabling experimentation of bleeding edge Ethereum Research.
Barycentric Interpolation
Barycentric interpolation is a variant of Lagrange polynomial interpolation that is fast and stable. It deserves to be known as the standard method of polynomial interpolation.
- https://people.maths.ox.ac.uk/trefethen/barycentric.pdf
- https://www.inf.usi.ch/hormann/papers/Hormann.2014.BI.pdf
Circuitscan: submit/browse verified Circom circuits
The Impact of Quantum Computing on the Security of zk-Proofs: Approaches to Post-Quantum Cryptography
Updates
circom 2.2.0 introduces a new feature called signal buses.
The MuSig2 module has been merged into libsecp256k1.
Minimal Course on PCS in Python
Aztec: Road to Mainnet
o1js-blobstream
- https://x.com/__geometrydev__/status/1843743002797490619
- https://github.com/geometers/o1js-blobstream
- https://o1js-blobstream.gitbook.io/o1js-blobstream
Ethereum's ZK & Formal Verification Endgame with Alexander Hicks
Nexus: beta release of the Nexus network
the first distributed zkVM prover network openly accessible to anyone – is now live
Papers
The Uber-Knowledge Assumption: A Bridge to the AGM
Special Soundness in the Random Oracle Model
Special Soundness Revisited
Capybara and Tsubaki: Verifiable Random Functions from Group Actions and Isogenies
WHIR: Reed–Solomon Proximity Testing with Super-Fast Verification
Basefold in the List Decoding Regime
"It's a great week for Basefold! First, WHIR combines Basefold and STIR to yield an efficient multilinearPCS with the best of both constructions. Next, this work proves the size of Basefold-FRI is equal to the size of traditional univariate FRI 🎉" [Hadas Zeilberger@idocryptography]
MPC-in-the-Head Framework without Repetition and its Applications to the Lattice-based Cryptography
DART: Distributed argument of knowledge for rough terrains
DeepFold: Efficient Multilinear Polynomial Commitment from Reed-Solomon Code and Its Application to Zero-knowledge Proofs
Boosting SNARKs and Rate-1 Barrier in Arguments of Knowledge
Nebula: Efficient read-write memory and switchboard circuits for folding schemes
NeutronNova: Folding everything that reduces to zero-check
Blaze: Fast SNARKs from Interleaved RAA Codes
Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications
Really Complex Codes with Application to STARKs
Faster Proofs and VRFs from Isogenies
Lollipops of pairing-friendly elliptic curves for composition of proof systems
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
And our YouTube channel
Highlights
Computer Scientists Combine Two ‘Beautiful’ Proof Methods
零知识证明,它可以让验证者者相信一个陈述是真的,而不透露它为什么是真的。概率可检查证明,它可以说服验证者证明的真实性,即使只看到原始内容的一小部分。Gur, Spooner 和 O'Connor 成功解决了所有计数问题的完美零知识 PCP 构造问题。更重要的是,这些 PCP 的验证过程也完全是非交互式的。 Three researchers have figured out how to craft a proof that spreads out information while keeping it perfectly secret.
What is Zero-Knowledge (like, actually)? w/ David Wong
在本模块中,Nicolas Mohnblatt 和 David Wong 将深入探讨 "零知识 "这一术语,并讨论这一特性的实际含义、何时使用(或不使用)以及某些系统需要具备哪些特征才能被视为真正的零知识。 然后,他们强调了不同类型的零知识--完美的、统计的和计算的,讨论了不诚实和诚实验证者之间的区别,以及自适应模型比非自适应模型更受青睐的问题。 此外,他们还探讨了从 KZG、Pedersen 和哈希等技术中生成隐藏承诺的方法,最后概述了 PLONK 的零知识分析。 In this module, Nicolas Mohnblatt and David Wong dig into the term “Zero Knowledge” and discuss what this property actually is, when it is being used (or not) and what characteristics some systems need in order to be considered truly ZK. They then highlight the different types of ZK — perfect, statistical, and computational –, discuss the distinction between dishonest and honest verifiers, and the preference for adaptive models over non-adaptive ones. Additionally, they explore methods for generating hiding commitments from techniques such as KZG, Pedersen, and hashes, and conclude with an overview of the zero-knowledge analysis of PLONK.
Proof is in the Pudding
关于密码学和 ZK 的 201 级别的 IRL 系列讲座和讨论。 由 zkSecurity C 创始人兼 Archetype 研究顾问 David Wong 主持。 在第 01 讲中,David 从算术化开始讲起。 算术化涉及将逻辑语句转换为代数形式的过程,然后用代数形式创建算术电路,这是构建 ZK 证明的关键构件。 An IRL series of 201-level lectures and discussions about the in’s and out’s of cryptography and ZK. Hosted by zkSecurity C-founder and Archetype Research Advisor, David Wong. For Session 01, David started at the ground floor with arithmetization. Arithmetization involves the process of converting logical statements into algebraic form, which are then used to create arithmetic circuits, a key building block in the construction of a ZK proof.
Foundations and Applications of Zero-Knowledge Proofs
The Hitchhiker's Guide to Scaling Bitcoin with STARKs
Understanding ZKsync: A Comprehensive Overview
Binary Tower Fields are the Future of Verifiable Computing
小域使乘法速度更快,直接提高了 STARK 的性能。硬件效率比较显示,32 位二进制塔的效率是 Mersenne31 乘法器的 5 倍。由于不存在底层整数乘法及其固有的差异传播,二进制塔成为硬件友好型可验证计算系统的不二之选。
crafting qr codes
当女孩成为武器:追忆被遗忘的战时人工算力
Field-Agnostic SNARKs from Expand-Accumulate Codes
Updates
bitcoin-circle-stark 1.0.0
I used to hate QR codes. But they're actually genius
Episode 342: Catch up with Zac and Ariel
Papers
Rate-1 Zero-Knowledge Proofs from One-Way Functions
Practical Implementation of Pairing-Based zkSNARK in Bitcoin Script
DUPLEX: Scalable Zero-Knowledge Lookup Arguments over RSA Group
Black-Box Non-Interactive Zero Knowledge from Vector Trapdoor Hash
Witness Semantic Security
Functional Adaptor Signatures: Beyond All-or-Nothing Blockchain-based Payments
Lower Bounds on the Overhead of Indistinguishability Obfuscation
Schnorr Signatures are Tightly Secure in the ROM under a Non-interactive Assumption
Folding Schemes with Privacy Preserving Selective Verification
FLI: Folding Lookup Instances
PoUDR: Proof of Unified Data Retrieval in Decentralized Storage Networks
Fully-Succinct Arguments over the Integers from First Principles
Universally Composable SNARKs with Transparent Setup without Programmable Random Oracle
SNARKs for Virtual Machines are Non-Malleable
STARK-based Signatures from the RPO Permutation
Fiat-Shamir in the Wild
Dynamic zk-SNARKs
Ceno-zkvm: Non-uniform, Segment and Parallel Zero-knowledge Virtual Machine
提出zkvm设计思路:分段和并行化,发生在两个级别:操作码和基本块。这两种设计都试图最小化影响电路尺寸和支持的控制流动态拷贝数,确保计算成本与实际执行的代码直接相关, 第二个设计:通过提出创新的数据流重建技术中,我们可以大幅减少堆栈操作, 还提出了一种非对称GKR方案来实现我们的设计,将非均匀证明器和均匀验证器配对,为动态长度数据并行电路生成证明。使用GKR证明器也大大减少了承诺的大小
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
And our YouTube channel
Highlights
BitcoinOS - Open Sourcing the BitSNARK Verification Protocol
BitcoinOS 开源了 BitSNARK v.0.1,第一次使得使用户能够验证比特币上的零知识证明。允许任何人在不分叉代码的情况下升级网络。BitSNARK 协议是在比特币网络上验证零知识证明执行情况的一种方法,它允许将比特币的转移与可证明的外部事件(如另一个区块链上的资金转移或烧毁)挂钩。 这可用于原子交换、双向挂钩和其他跨链应用。
- https://x.com/BTC_OS/status/1838962436424061197
- https://www.bitcoinos.build/blog/bitcoinos-open-sourcing-the-bitsnark-verification-protocol
- https://github.com/bitsnark/bitsnark-lib
Lookups in Lurk
Lurk 目前的迭代版本(将在未来几个月内开源)使用 Sphinx 验证器,它是 Succinct Labs SP1 Prover 的友好分叉。 因此,Lurk 查找表技术的核心结构与 SP1 中使用的结构保持一致。第一篇短文旨在介绍支撑 Lurk 执行架构的查找表技术。 在第二篇短文中介绍该协议的简单实现中存在的合理性问题,以及修复建议。
RISC-V ZKVMs: the Good and the Bad
ZKVMs vs. ZK Circuits: A Spicy Debate
在本期节目中,我们将分别解读 ZKVMs 和 ZK Circuits 的独特之处。 我们将探讨使用通用 ZKVM 的利弊、对定制化 ZK 电路开发的影响,以及这些选择如何影响从开发人员体验到安全审计的方方面面。 本次讨论的目的是了解利弊权衡以及 ZK 如何与您项目的长期愿景相匹配。
In this episode, we’ll unpack what makes each approach unique. We’ll explore the pros and cons of using a generalizable ZKVM, the impact of custom circuit development, and how these choices affect everything from developer experience to security audits. The goal of this debate is understanding the trade-offs and how ZK fits into your project’s long-term vision.
Ova: A slightly better Nova
Ova 是 Bulletproof 的作者 Benedikt Bünz 提出的 一种 Nova 的微小改进。只需 1 组标量乘法和一定数量的哈希值和场运算就能产生递归电路。 Ova reduces the accumulation verifier in Nova from 2 to just 1 group exp, without increasing the number of hashes. This should yield the smallest recursive circuit to date. Should be useful for cyclefold.
A challenge on the Jolt zkVM
Giorgio Dell 在 MOCA 意大利黑客训练营期间 CTF "2+2=5 "密码学挑战的笔记,以 Jolt zkVM 为特点:它涉及利用修改版的 Jolt 库为 RISC-V 程序的无效执行制作证明。
Quantum Computing: Between Hope and Hype
by Scott Aaronson
Quantum Computer Programming in 100 Easy Lessons
卡内基梅隆大学 Ryan O'Donnell 关于量子计算机编程课程的课程视频,已经切分成了以单元为单位的 20 分钟左右长度的视频合集。
Binius STARK Proof Systems Over Binary Field
Eigen Network 提出了基于 Binius 的 二元域上的 STARK 证明系统,其构造基于多线性多项式。
Binius: Surfing on Binary Fields
Taiko Labs 关于 Binius 方案的概念介绍博客, 包含了域,当前 SNARKs 发展现状,SNARKs 运行和性能挑战,基于最小域的 SNARKs,二进制域塔式承诺的优势和未来,以及相关资源。是很好的入门读物。
Web Proof, Make more data verifiable
Here Come The Pufpunks
『解密』华为慕尼黑研究所密码学专家
Updates
a16z crypto Summer '24 Research Seminars
a16z 在今年夏天举办了第三届夏季研究项目,邀请学术界和工业界的研究人员前来分享他们的工作成果。包括 HyperNova,SNARK 安全性和持久加密等内容。
- https://x.com/a16zcrypto/status/1837189119442612378
- https://www.youtube.com/playlist?list=PLjQ9HCQMu_8zlqApmyd2_cJZHstiNbirl
The Network State Conference 2024 - Livestream
Solving Reproducibility Challenges in Deep Learning and LLMs: Our Journey (With ZKP)
Hyper-Greco: Verifiable FHE with GKR
Papers
Detecting and Correcting Computationally Bounded Errors: A Simple Construction Under Minimal Assumptions
Dense and smooth lattices in any genus
On the Spinor Genus and the Distinguishing Lattice Isomorphism Problem
Founding Quantum Cryptography on Quantum Advantage, or, Towards Cryptography from #P-Hardness
Compact Proofs of Partial Knowledge for Overlapping CNF Formulae
The transition to post-quantum cryptography, metaphorically
The Power of NAPs: Compressing OR-Proofs via Collision-Resistant Hashing
部分知识证明最早由 Cramer、Damgård 和 Schoenmakers(CRYPTO'94)以及 De Santis 等人(FOCS'94)提出,它允许证明𝑛个不同声明中𝑘个声明的有效性,但不透露是哪些声明。 作者提出了一种新方法,将某些证明系统转化为新的证明系统,允许证明部分知识。 由此产生的证明系统的通信复杂度仅与语句总数 n 成对数关系,其安全性仅依赖于抗碰撞哈希函数的存在。举例来说,作者证明了提出的转换适用于 Goldreich、Micali 和 Wigderson(FOCS'86)针对图同构和图 3 着色问题的证明系统。作者的主要技术工具是一种称为非适应性可编程函数(NAPs)的新加密基元,我们认为它具有独立的意义。这些函数可以看作是伪随机函数,可以在输入点对输出进行重新编程,而输入点在密钥生成过程中必须是固定的。即使给定了重新编程的密钥,要找出重新编程的位置仍然是不可行的。非适应性可编程函数(NAPs)是在适应性可编程函数的基础上发展而来的,根据应用场景,它去除了适应性可编程函数的一部分灵活性,带来了效率的明显提升。
Enhancing Digital Privacy: The Application of Zero-Knowledge Proofs in Authentication Systems
If you’d like to receive updates via email, click subscribe. Stay informed and never miss a post!
Highlights
Friends don’t let friends reuse nonces
This blog post tells a cautionary tale of what can go wrong when implementing a relatively basic type of cryptography: a bidirectional encrypted channel, such as an encrypted voice call or encrypted chat. We’ll explore how more subtle issues of this type can arise in a network with several encrypted channels, and we’ll describe a bug we discovered in a client’s threshold signature scheme.
The galois library
A performant NumPy extension for Galois fields and their applications
RISC ZERO: Introducing Boundless: The Verifiable Compute Layer
- https://x.com/RiscZero/status/1835665979201724639
- https://risczero.com/blog/boundless-the-verifiable-compute-layer
Fermah
The Universal Proof Generation Layer
Aleo Mainnet is Here
powdr: a toolkit that helps build zkVMs and similar proof frameworks.
It has two main components:
- powdr-asm: an extensible assembly IR language to perform dynamic executions.
- powdr-PIL: a low level constraint language that allows you to define arithmetic constraints, lookups, etc. It includes a functional meta-constraint language to describe how constraints are generated.
Updates
ZK Day at Science of Blockchain Conference '24
Succinct Bootcamp Notes
Semaphore V4
- https://x.com/SemaphoreDevs/status/1836427240784920722
- https://github.com/semaphore-protocol/semaphore/releases/tag/v4.0.0
Papers
LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK
Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation
Untangling the Security of Kilian's Protocol: Upper and Lower Bounds
Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos
On the Complexity of Cryptographic Groups and Generic Group Models
FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup
Highlights
What Does It Mean To Know?
这是一篇探讨零知识中的知识的含义的博客,ZK-proofs 是加密货币最伟大的进步之一。但是,哲学家对 "知识" 的研究已有千年历史。在这篇文章中,我将比较哲学家对知识定义的 "合理真实信念" 理论和 ZK- proofs 所隐含的知识规范。另外,博客还畅想了如果将 ZK- proofs 的知识范围推广到 NP 语言之外,可能带来的新变化。 ZK- proofs are one of crypto's greatest advancements. But "knowledge" has been studied by philosophers for 1000s of years. In this post, I compare the “justified true belief” theory of knowledge with the specification of knowledge implied by ZK-proofs
Two Vulnerabilities in gnark's Groth16 Proofs
对 Zellic 发现的两个漏洞的分析,这两个漏洞破坏了 gnark 的 Groth16 证明的零知识性和可靠性。 An analysis of two vulnerabilities Zellic discovered that broke zero-knowledge and soundness of gnark’s Groth16 proofs with commitments
Designing high-performance zkVMs
这是一篇来自RISC Zero的博客,介绍了关于高性能零知识虚拟机的设计。主要包括两个部分: 在第 1 部分中,作者对 RISC Zero 的 zkVM 所依赖的证明系统进行概述,并介绍他们在提高 zkVM 性能方面的计划。 在第 2 部分中,作者仔细研究证明系统的每一层,包括与折叠方案、JOLT、Binius 和 Circle STARKs 等创新有关的设计因素。 This article is a deep-dive into proof system design for zkVMs, split into two parts.
In Part 1, we give a high-level overview of the proof system that underlies RISC Zero’s zkVM, and what’s on our horizon for improving zkVM performance.
In Part 2, we’ll take a closer look at each layer of the proof system, touching on design considerations with respect to innovations such as folding schemes, JOLT, Binius, and Circle STARKs.
riscMPC
General-purpose multi-party computation from RISC-V assembly.
Knot Group Wiki
Meet the Mind: The Brain Behind Shor’s Algorithm
Introducing zkDL++
Ingonyama 提出的证明任何深度神经网络完整性的前沿框架。 演示:为 @AIatMetaStable 签名提取可证明的水印 A cutting-edge framework for proving the integrity of any deep neural network. Demo: Provable Watermark Extraction for @AIatMetaStable Signature
Provable Watermark Extraction
zkDL++ is a novel framework designed for provable AI. Leveraging zkDL++, we address a key challenge in generative AI watermarking: Maintaining privacy while ensuring provability. By enhancing the watermarking system developed by Meta, zkDL++ solves the problem of needing to keep watermark extractors private to avoid attacks, offering a more secure solution. Beyond watermarking, zkDL++ proves the integrity of any deep neural network (DNN) with high efficiency.
Updates
Yuval Ishai: Dot-Product Proofs
A dot-product proof is a simple probabilistic proof system in which the verifier decides whether to accept an input vector based on a single linear combination of the entries of the input and a proof vector. I will present constructions of linear-size dot-product proofs for circuit satisfiability and discuss two kinds of applications: exponential-time hardness of approximation of MAX-LIN from ETH, and minimizing verification complexity of succinct arguments.
Quang Dao: Non-Interactive Zero-Knowledge from LPN and MQ
We give the first construction of non-interactive zero-knowledge (NIZK) arguments from post-quantum assumptions other than Learning with Errors. In particular, we achieve NIZK under the polynomial hardness of the Learning Parity with Noise (LPN) assumption, and the exponential hardness of solving random under-determined multivariate quadratic equations (MQ). We also construct NIZK satisfying statistical zero-knowledge assuming a new variant of LPN, Dense-Sparse LPN, introduced by Dao and Jain (CRYPTO 2024), together with exponentially-hard MQ.
Polygon Miden Alpha Testnet v4 is Live
Papers
【论文速递】SCN`24(零知识证明、承诺)
ZKFault: Fault attack analysis on zero-knowledge based post-quantum digital signature schemes
Code-Based Zero-Knowledge from VOLE-in-the-Head and Their Applications: Simpler, Faster, and Smaller
The Black-Box Simulation Barrier Persists in a Fully Quantum World
Lego-DLC: batching module for commit-carrying SNARK under Pedersen Engines
A Recursive zk-based State Update System
New Techniques for Preimage Sampling: Improved NIZKs and More from LWE
A Note on Ligero and Logarithmic Randomness
This is a short note which explains how Ligero works in the framework of "succinct proofs and linear algebra" and how we can view it as a beautifully simple protocol for succinct proofs of matrix-vector multiplication!
Learn
Peter Shor's Lecture Notes for 8.370/18.435 Quantum Computation from Fall 2022
From AIRs to RAPs - how PLONK-style arithmetization works
What is algebraic geometry?
Course: Abstract Algebra
Algebra is the language of modern mathematics. This course introduces students to that language through a study of groups, group actions, vector spaces, linear algebra, and the theory of fields. These lectures are from the Harvard Faculty of Arts and Sciences course Mathematics 122, which was offered as an online course at the Extension School.
Course: Visual Group Theory
This course contains over 40 videos from undergraduate Abstract Algebra course (Math 4120) at Clemson University.
Course: Abstract Algebra I: Group Theory
Course: Exploring Abstract Algebra II
Highlights
quantum punks
我们的主要论点是,量子密码学这一规模虽小但正在不断发展的领域可以:
- 带来我们无法用经典密码学构建的新密码协议
- 对更广泛的量子产业起到加速作用 更重要的是,我们之外的一小部分人相信,量子技术还有更多我们尚未发现的朋克应用。我们撰写这篇短文的目的,就是要让人们认识到量子技术的可能性,并聚集志同道合者共创未来。 Our main thesis is that a small yet growing field called Quantum Cryptography can:
- lead to new cryptographic protocols that we could not build with classical cryptography
- be accelerationist for the broader quantum industry
Even more so, a small movement of people beyond us, believe that there could be more cypherpunk applications of quantum technology that we have yet to discover. We wrote this short doc to create awareness of what is possible and to gather like-minded people to build this future.
- https://x.com/iamnotnicola/status/1831376645766205533
- https://quantumpunks.org/
- https://deepquantum.xyz/
Glue and coprocessor architectur
Vitalik 关于中央「粘合」组件和协处理器架构介绍的博客。其主要观点是,现代计算越来越多地遵循粘合和协处理器架构:中央「粘合」组件具有高通用性但效率低,负责在一个或多个协处理器组件之间传送数据;协处理器组件具有低通用性但效率高。
Preserving Reality: The Crucial Role of Attestation in Anti-FakeAI.
TL;DR:加密技术成为应对这一威胁的主要防御手段,而验证则是确保内容真实性和验证人工参与的重要机制。本文深入探讨了验证,包括其定义、挑战和建议的解决方案。 TL;DR:Cryptography emerges as the primary defense against this threat, with attestation serving as a crucial mechanism to ensure content authenticity and validate human involvement. This article provides an in-depth exploration of attestation, including its definitions, challenges, and proposed solutions.
Crypto’s AirTag Moment: Unlocking Mass Adoption with Web Proofs
How zkTLS will revolutionize airdrops, incentives, and marketplaces
shinigami
shinigami is a Bitcoin Script library for generic Script VM execution in Cairo, enabling the generation of STARK proofs for Bitcoin Script computation and Bitcoin transaction execution.
Ente
Fully open source, End to End Encrypted alternative to Google Photos and Apple Photos
Notes on Extractable Witness Encryption for KZG Commitments and Efficient Laconic OT
‘Groups’ Underpin Modern Math. Here’s How They Work.
Quanta Magazine 关于群的发展历史的介绍。整数与三角形的对称性有什么共同点?19 世纪,数学家们发明了群来回答这个问题。 What do the integers have in common with the symmetries of a triangle? In the 19th century, mathematicians invented groups as an answer to this question.
Updates
Opening "packed" univariate polynomials over binary fields.
Mersenne 31 Polynomial Arithmetic
一个全面而简明的关于如何在 M31 域有效地实现域和多项式运算,特别是在 Circle STARK [UH24] 的背景下的介绍教程。通过探讨与这种域选择相关的优势和挑战,本说明旨在为从业人员提供有效优化其密码系统所需的知识。
ICICLE v3: Going multi-platform
Verifiable Summit 2024
Lurk 0.5 Benchmarks
Papers
Tightly Secure Non-Interactive BLS Multi-Signatures
Locally Verifiable Distributed SNARGs
Cache Timing Leakages in Zero-Knowledge Protocols
Bandersnatch: a fast elliptic curve built over the BLS12-381 scalar field
本文介绍了在 BLS12-381 标量域上建立的新椭圆曲线 Bandersnatch。该曲线配备了高效的自同态特性,允许使用快速的标量乘法算法。基准测试表明,与具有类似特性的另一条名为 Jubjub 的曲线相比,乘法运算速度提高了 42%,R1CS 形式的电路规模减少了 21%,Plonk 电路减少了 10%。许多依赖于 Jubjub 曲线的零知识证明系统都能从我们的结果中受益。
Learnings
Yet another circle STARK tutorial
Elliptic Curves: Cheat Sheet
椭圆曲线备忘清单,包含了关于椭圆曲线参数,性质和类型的介绍。
Developer's Guide to Application-Specific Elliptic Curves
Juypter Notebook: Cryptography Fundamental
Bill Buchanan OBE 创建了一个 Juypter Notebook 来演示密码学的一些基础组件是如何运行的。
MIRACL Core
MIRACL Core is an open source library, & includes a wide range of public key encryption methods. It is especially focused on elliptic curve and pairing-friendly methods, but also supports a wide range of encryption methods, including RSA, AES and hashing.
Highlights
Is Telegram really an encrypted messaging app?
Apropos Pavel Durov’s arrest, cryptographer Matthew Green wrote a short post about whether Telegram is an “encrypted messaging app”. The TL;DR here is that Telegram has an optional end-to-end encryption mode that you have to turn on manually. It only works for individual conversations, not for group chats.
Zirgen Circuit Compiler
Zirgen is a compiler for a domain-specific language, also called "zirgen", which creates arithmetic circuits for the RISC Zero proof system.
Signed web pages with SXG
How Base 3 Computing Beats Binary
Long explored but infrequently embraced, base 3 computing may yet find a home in cybersecurity.
How Does Math Keep Secrets?
Cryptography is the thread that connects Julius Caesar, World War II and quantum computing, and it now lies under nearly every part of modern life. In this week’s episode, computer scientist Boaz Barak and co-host Janna Levin discuss the past and future of secrecy.
Updates
A major breakthrough in multiplication over Bitcoin, and in STARK verification on Bitcoin signet
A new algorithm for M31 multiplication reduces multiplication cost by 70%. Unlike STARKs, this new multiplication algorithm (like the previous algorithm) does not require OP_CAT, cementing M31’s status as a Bitcoin-friendly prime, regardless of OP_CAT.
plonky3-ccs
A plonky3 to CCS converter.
ZKVMs and Proof Verification with @ZKVProtocol, @RiscZero, @ProjectZKM and @alignedlayer
IACR Crypto 2024 (Videos)
Frontiers in Complexity Theory: A Graduate Workshop (Videos)
ZK Con 2024 : ZK For Consumer Use (Videos)
Papers
ECC’s Achilles’ Heel: Unveiling Weak Keys in Standardized Curves
SoK: Instruction Set Extensions for Cryptographers
On the structure of quaternion rings over ℤ/nℤ
Generalized one-way function and its application
Quantum Security of a Compact Multi-Signature
SoK: An Engineer’s Guide to Post-Quantum Cryptography for Embedded Devices
Zero-Knowledge Validation for an Offline Electronic Document Wallet using Bulletproofs
Proximity Gaps in Interleaved Codes
Direct Range Proofs for Paillier Cryptosystem and Their Applications
What Did Come Out of It? Analysis and Improvements of DIDComm Messaging
A Documentation of Ethereum’s PeerDAS
FLIP-and-prove R1CS
Learnings
Foundations and Applications of Zero-Knowledge Proofs
The workshop will cover several topics within this field, including classical results, interactive oracle proofs, proof from symmetric primitives, group and pairing-based proof systems such as ZK-SNARKs, lattice-based proof systems, and real-world applications.
Error Correction Zoo
STARK101-rs
A Rust tutorial for a basic STARK protocol to prove the calculation of a Fibonacci-Square sequence, as designed for StarkWare Sessions, and authored by the StarkWare team.
ZK Hack Montréal
- Polygon - The eSTARK Proving System & Plonky3 : https://www.youtube.com/watch?v=2WjcXZYo7eA&list=PLj80z0cJm8QFGB6AsiAG3EB06L7xr5S1c&index=90
- Risc Zero - Boundless On-chain Execution using Proven Off-chain Coprocessing : https://www.youtube.com/watch?v=7M5aKRaGG1Q&list=PLj80z0cJm8QFGB6AsiAG3EB06L7xr5S1c&index=89
Programming ZKPs: From Zero to Hero
This post will show you how to write basic Zero Knowledge Proofs (ZKPs) from scratch.
Highlights
https://cryptography101.ca/
Greyhound: Fast Polynomial Commitments from Lattices
A new super fast and compact polynomial commitments from standard lattice assumptions! Greyhound combines the techniques that me and Khanh explored in FMN23 and SLAP with the LaBRADOR proof systems, constructing a super exciting and concretely efficient post quantum PCS, with a blazing fast vectorized AVX-512 implementation included. Just to give some numbers, for degree 2^30 proofs are 53KB and only take 3 minutes to compute!
StarkWare Scholar Summit
Updates
Implementation of the Labrador proof system
This repository contains our implementation of the Labrador proof system together with implementations of the Chihuahua, Dachshund and Greyhound front ends.
Bitcoin Header Validation using Nova
This repo contains circuits for validating Bitcoin headers using Nova. At each step, it allows validating multiple headers.
How we implemented the BN254 Ate pairing in lambdaworks
This post is a companion for implementation, explaining the mathematical theory and algorithms needed to understand the BN254 Ate pairing.
ZK Podcast Episode 335: Groth16, IVC and Formal Verification with Nexus
In this week’s episode, Anna chats with Jens Groth and Daniel Marin from Nexus. They catch up on all things Groth16 with the author himself before diving into a variety topics, such as formal verification in the context of ZKPs, the Nexus architecture, the benefits and challenges of building a system from the ground up, folding and IVC plus the properties these offer in a zkVM context and much more.
数学界最重要难题,快要破解了吗?
1859年,数学家黎曼提出了著名的“黎曼猜想”,100多年过去了,还是没有人能证明它,无数数学天才正在一步步向真相推进,现在他们又取得了新进展……
Noname Code Playground
Papers
【论文速递】Crypto 2024 (多项式承诺、SNARKs、零知识证明、数据可用性采样、后量子聚合签名)
Improved Lattice Blind Signatures from Recycled Entropy
Raccoon: A Masking-Friendly Signature Proven in the Probing Model
Identity-Based Encryption from Lattices with More Compactness in the Standard Model
Point (de)compression for elliptic curves over highly 2-adic finite fields
Permissionless Verifiable Information Dispersal (Data Availability for Bitcoin Rollups)
Efficient Zero-Knowledge Arguments for Paillier Cryptosystem
Learnings
Cryptography 101 : Kyber and Dilithium
Video lectures for Alfred Menezes's introductory course on Kyber-KEM and the Dilithium signature scheme. These lattice-based cryptographic scheme were standardized by NIST on August 13, 2024.
Cryptography 101: Error-Correcting Codes
This course is an introduction to algebraic methods for devising error-correcting codes. These codes are used, for example, in satellite broadcasts, CD/DVD/Blu-ray players, memory chips, two-dimensional bar codes (including QR codes), and digital video broadcasting. The mathematical ingredients for the course are linear algebra, elementary number theory (integers modulo n and congruences), and abstract algebra (groups, rings, ideals, and finite fields).
Plonk notes (wave 1) by ret2basic.eth
不同的 Interpolation 算法介绍
Highlights
NIST PQC 正式标准发布
- MLKEM https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.203.pdf
- MLDSA https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.204.pdf
- SLHDSA https://nvlpubs.nist.gov/nistpubs/fips/nist.fips.205.pdf
Additive NTT (ANTT) by Ingonyama
有限扩展域上的加法 FFT 出现于 20 世纪 80 年代末。 我们将加法 FFT 称为加法 NTT (ANTT),是对加法子群而非乘法子群的求值。有趣的是,它们根本不是傅里叶变换,但它们服从类似 FFT 的递归结构,实现了 复杂度。链接是参考的书籍和 Ingonyama 为 Open-Binius 项目实现的 python 参考代码。
- Theory: NTT201 book, chapter 3: https://github.com/ingonyama-zk/papers/blob/main/ntt_201_book.pdf
- Reference code, Open-Binius repo: https://github.com/ingonyama-zk/open-binius/tree/main/ref/antt
Fibonacci Air Implementation in Plonky3
This repo implements a Fibonacci sequence generator and prover using the Plonky3 framework.
Lemma: ZK Theorem Proving
Lemma is a ZK theorem proving framework that enables individuals to post unsolved theorem definitions accompanied by a bounty for anyone that can submit a valid Mathematical proof which solves the theorem. These proofs are validated on chain, and the bounties are trustlessly released to the solver.
Cryptographic Right Answers: Post Quantum Edition
后量子加密技术(PQC)的前景复杂而充满挑战,新算法和新标准不断涌现,如 Kyber、Dilithium 和 SPHINCS+,它们提供了更高的安全性,可抵御量子攻击。要驾驭这一格局,开发人员应优先使用成熟的加密库,避免定制实现,并专注于混合方案。
The post-quantum cryptography (PQC) landscape is complex and challenging, with new algorithms and standards emerging, such as Kyber, Dilithium, and SPHINCS+, which offer improved security against quantum attacks. To navigate this landscape, developers should prioritize using established cryptographic libraries, avoiding custom implementations, and focusing on hybrid schemes.
Updates
Sparta(0)
Rust implementation of the SuperSpartan IOP
Reproducing and Exploiting ZK Circuit Vulnerabilities by ZKSECURITY
What is a trusted setup and how is it secured? Pairings operations
Beginner's Guide to zkSNARKs 3: Math (to get to PLONK) part 1 by PSE
ZK Email 开源了一个基于 zk 电子邮件的通用账户恢复模块,其工作原理:
Papers
Succinct Non-Subsequence Arguments
Safe curves for elliptic-curve cryptography
AES-based CCR Hash with High Security and Its Application to Zero-Knowledge Proofs
A bound on the quantum value of all compiled nonlocal games
Improved Polynomial Division in Cryptography
论文的核心技术贡献是离散傅里叶变换下导数算子和逐点除法的新型共轭表示和组合,能够利用洛必达法则高效计算多项式除法。
Stackproofs: Private proofs of stack and contract execution using Protogalaxy
Basic Lattice Cryptography: The concepts behind Kyber (ML-KEM) and Dilithium (ML-DSA)
VerITAS: Verifying Image Transformations at Scale
VerITAS 使用零知识证明来证明只有某些编辑被应用于签名过的照片,首次实现了为真实大图像(3000 万像素)进行证明。其关键创新在于设计了一个新的证明系统,该系统能够证明对大量见证数据的有效签名。
Hekaton: Horizontally-Scalable zkSNARKs via Proof Aggregation
Hekaton 构造了一个新的「分发-聚合」框架,可以高效处理任意大规模计算。该框架将大型计算分解成小块,在分布式系统中并行证明这些小块,然后将得到的小块证明聚合成一个简洁的证明。实验表明 Hekaton 实现了很强的横向可扩展性(证明时间随着集群中节点数量的增加而线性减少),并且能够快速证明大型计算:它可以在一小时内证明大小为 个门的电路,这比之前的工作快得多。
Learnings
Abstract Algebra Online Course
抽象代数涉及群、环、场和模块。这些抽象结构出现在许多不同的数学分支中,包括几何、数论、拓扑学等。它们甚至出现在量子力学等科学课题中。
Abstract Algebra deals with groups, rings, fields, and modules. These are abstract structures which appear in many different branches of mathematics, including geometry, number theory, topology, and more. They even appear in scientific topics such as quantum mechanics.
Galois Theory Notes
The author has arXived their Galois theory course notes from 2021-2023, making them publicly available along with other course materials. The author notes that the Galois theory notes have been particularly popular, possibly due to their visually appealing format with color and icons.
Discrete Mathematics: An Open Introduction, 4th edition
Essential Coding Theory
zkML: Tradeoffs in accuracy vs. proving cost
为了展示 ML 模型准确性与 SNARK 成本之间的权衡,作者使用 EZKL zkML 框架进行了概念验证,目标是强调准确性的微小提高如何可能导致巨大的计算开销,从而鼓励人们在构建需要可验证性的模型时,深思熟虑地考虑这些权衡因素。这篇文章详细介绍了这一过程,包括数据预处理、模型训练和证明生成。
Highlights
SBC'24 Live Presentations
A live stream for the Science of Blockchain Conference (SBC) 2024 presentations taking place August 7-9 at Columbia University
0xPARC: Programmable Cryptography (Part 1)
Cryptography is undergoing a generational transition, from special-purpose cryptography to programmable cryptography.
SuperSpartan by Hand
The goal of this article is to dive into the techniques behind the SuperSpartan's polynomial IOP, which uses the sum-check protocol to prove CCS instances, by writing the protocol explicitely for a specific example.
HyperNova by Hand
The aim of this article is to unbundle the folding mechanism of the HyperNova protocol by writing it by hand.
A Survey on the Applications of Zero-Knowledge Proofs
Applications of ZK from a practitioner/engineer’s perspective.
How we created a research fast VM for ZKsync
LambdaClass team makes a deep dive into how the EraVM works and how it differs from the EVM.
Awesome zero knowledge proofs
A curated list of awesome ZKP resources, libraries, tools and more.
The exposition of Additive NTT
A detailed theoretical introduction and Python implementation of Additive NTT
- theory: https://github.com/ingonyama-zk/papers/blob/main/ntt_201_book.pdf
- code: https://github.com/ingonyama-zk/open-binius/tree/main/ref/antt
Updates
Nullifier Counter in RISC Zero for apps on top of Rarimo Protocol
ZK Summit 11 Folded
文章由 Jack Gilcrest 撰写,详细介绍了 Cursive 团队在 ZK Summit 11 中集成折叠方案(folding schemes)的实际应用和经验。
SP1 is live
SP1 is now feature-complete and recommended for production use.
SP1 Benchmarks: 8/6/24
SP1’s new GPU prover achieves state of the art performance, with the cheapest cloud costs vs. alternative zkVMs by up to 10x, across a diverse set of blockchain workloads like light clients and EVM rollups.
A thread about FRI by Paul Gafni
Chatting with peeps at SBC and realized I've made some educational resources about FRI soundness analysis that I never shared widely.
Papers
Optimizing Big Integer Multiplication on Bitcoin: Introducing w-windowed Approach
Garuda and Pari: Smaller and Faster SNARKs via Equifficient Polynomial Commitments
MSMAC: Accelerating Multi-Scalar Multiplication for Zero-Knowledge Proof
Non-Interactive Zero-Knowledge from LPN and MQ
Concrete Analysis of Schnorr-type Signatures with Aborts
Efficient (Non-)Membership Tree from Multicollision-Resistance with Applications to Zero-Knowledge Proofs
zk-Promises: Making Zero-Knowledge Objects Accept the Call for Banning and Reputation
Highlights
未来科学大奖得主访谈:王小云的数学和密码人生
关于王小云院士,迄今内容最翔实的一篇访谈。
New Directions in Property Testing | Richard M. Karp Distinguished Lecture
Property testing algorithms seek to determine whether an unknown massive object has some particular property of interest, or is "far" from having the property, while inspecting only a tiny portion of the object. Recent years have witnessed significant progress on both classic property testing problems and the development of several new property testing problems and frameworks, motivated by connections to machine learning theory and high-dimensional data analysis. In this talk, Rocco Servedio will survey several of these new property testing problems, models, and results.
Awesome-ZKP-Security
帝国理工博士 Stefanos Chaliasos 整理的零知识证明安全性研究的博客,播客,披露,审计,访谈,CTF,和谜题,论文,工具列表。
A curated list of awesome ZKP Security resources, papers, tutorials, and tools.
An Introduction to Verifiable Computation
可验证的计算的简单介绍,主要从概念和直觉层面介绍了可验证计算的定义,意义,基本组成部分和应用。
Part 1 What is verifiable computation? Part 2 Why should you care about verifiable computation? Part 3 What is a SNARK? Part 4 Conceptual building blocks for SNARKs Part 5 Building verifiable applications
Pinocchio: verifiable computation revisited
在这篇文章中,LambdaClass 介绍了匹诺曹协议背后的主要思想,以及他们使用 Lambdaworks 库的实现。
In this post LambdaClass covered the main ideas behind Pinocchio's protocol and their implementation using Lambdaworks library.
Apple Announcing Swift Homomorphic Encryption
苹果公司公布了 Swift 语言实现的同态加密包, 并且以 iOS 18 中实现的 Live 来电显示和垃圾邮件拦截服务进行了演示。
Sphinx (A fork of SP1)
Sphinx is an open-source zero-knowledge virtual machine (zkVM) that can prove the execution of RISC-V bytecode, with initial tooling support for programs written in Rust. Additionally, Sphinx aims to support other reduction engines, including the evaluator for the Lurk programming language , which could be extended to other functional languages like JavaScript or Lean.
Updates
Ingonyama x Starknet Strategic Partnership
Breaking the hashes-proven-per-second world record on Vitalik’s laptop
Irreducible x Polygon Labs
Irreducible 和 Polygon Labs 正在合作为 Polygon 的 ZK rollups 生态系统构建一个生产级、基于 Binius 的 ZK 虚拟机。
Announcing collaboration with Polygon Labs on Binius-based zkVM
LatticeFold is updated
Dan Boneh 和 Binyi Chen 在第 4.3 节中为 CCS 关系添加了优化的折叠方案(感谢 @srinathtv 提出批量求和检查的问题)。还更新了知识证明,以处理 k > 2 时的 k 对 1 格点折叠。
We add an optimized folding scheme for CCS relation in Sect. 4.3 (thanks @srinathtv for bringing up the question of batching sumchecks). We also update our knowledge proof to deal with k-to-1 lattice folding where k > 2.
PSE Project Spotlight Episode 1: Identity Day
The theme of our first episode is Identity featuring PSE projects such as TLSNotary, Semaphore and Anon Aadhaar. In this one-hour session we discuss all things identity and how cryptography enables a more secure and practical use case for it.
From (RISC) Zero to Hero: Advanced ZK Programming for Ethereum with Rami Khalil, RISC Zero
Think Like a Circom Circuit with OxMilica, ZK Educator
Unboxing Valida zkVM: Architectural Innovations in Custom ISA zkVM Design
Research Day 2024 (Video Playlist)
Encrypt Brussels 2024 (Video Playlist)
Eurocrypt 2024: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions (SLAP)
This blog post is based on the paper “SLAP: Succinct Lattice-Based Polynomial Commitments from Standard Assumptions” presented by Giacomo Fenzi in Zurich at Eurocrypt 2024.
Noir v0.31.0 is now live with:
- New
is_unconstrained
logic condition - New
set
andmap
BoundedVecs methods - Redefined Noir <> Proving Backend interface
Read more about the new Noir <> Proving Backend workflow from end to end:
Full changelog:
- https://github.com/noir-lang/noir/releases/tag/v0.31.0 Start building:
- https://noir-lang.org/docs/getting_started/installation/
noir-edwards
Optimized implementation of Twisted Edwards curves.
pz-web
Compiltion of a few useful phantom-zone applications usable in a browser.
Papers
Mova: folding without committing to error terms and without sumcheck
Mova 以 Nova 的折叠方案为基础,通过在验证器采样的随机点对 和 的多线性扩展 (MLE) 进行评估,从而避免对 Nova 的所谓误差项 和交叉项 做出承诺。
Mova, which is based on the Nova folding scheme, manages to avoid committing to Nova's so-called error term and cross term by replacing said commitments with evaluations of the Multilinear Extension (MLE) of and at a random point sampled by the Verifier.
What Have SNARGs Ever Done for FHE?
Does the SNARG actually add any meaningful security to input privacy? We address this question in this note and give a security definition that meaningfully captures the security of the FHE plus SNARG construction.
Hᴇᴋᴀᴛᴏɴ: Horizontally-Scalable zkSNARKs via Proof Aggregation
我们介绍 Hᴇᴋᴀᴛᴏɴ,它是一种可以高效处理任意大型计算的 zkSNARK。我们通过一个新的 "分发-聚合 "框架来构建 Hᴇᴋᴀᴛᴏɴ,该框架将大型计算分解成小块,在分布式系统中并行证明这些小块,然后将得到的小块证明聚合成一个简洁的证明。这个框架的基础是一种新技术,用于高效处理各块之间共享的数据。
We introduce Hᴇᴋᴀᴛᴏɴ, a zkSNARK that can efficiently handle arbitrarily large computations. We construct Hᴇᴋᴀᴛᴏɴ via a new "distribute-and-aggregate" framework that breaks up large computations into small chunks, proves these chunks in parallel in a distributed system, and then aggregates the resulting chunk proofs into a single succinct proof. Underlying this framework is a new technique for efficiently handling data that is shared between chunks.
Collaborative CP-NIZKs: Modular, Composable Proofs for Distributed Secrets
We present the first, general definition for collaborative commit-and-prove NIZK (CP-NIZK) proofs of knowledge and construct distributed protocols to enable their realization. We implement our protocols for two commonly used NIZKs, Groth16 and Bulletproofs, and evaluate their practicality in a variety of computational settings. Our findings indicate that composability adds only minor overhead, especially for large circuits.
More Optimizations to Sum-Check Proving
We describe an optimization to the sum-check prover that substantially reduces the cost coming from the eq factor. Over large prime-order fields, our optimization eliminates roughly field multiplications compared to a standard linear-time implementation of the prover, and roughly field multiplications when considered on top of Gruen's optimization. These savings are about a (respectively ) end-to-end prover speedup in common use cases, and potentially even larger when working over binary tower fields.
Efficient Layered Circuit for Verification of SHA3 Merkle Tree
We present an efficient layered circuit design for SHA3-256 Merkle tree verification, suitable for a GKR proof system, that achieves logarithmic verification and proof size.
Foldable, Recursive Proofs of Isogeny Computation with Reduced Time Complexity
We empirically build a system to prove the execution of the circuit computing the isogeny rather than produce a proof of knowledge. This proof can then be used as part of the verifiable folding scheme Nova, which reduces the complexity of an isogeny proof of computation for a chain of isogenies from to by providing at each step a single proof that proves the whole preceding chain.
Benchmarking Attacks on Learning with Errors
To improve our understanding of concrete LWE security, we provide the first benchmarks for LWE secret recovery on standardized parameters, for small and low-weight (sparse) secrets. We evaluate four LWE attacks in these settings to serve as a baseline: the Search-LWE attacks uSVP, SALSA, and Coo & Cruel, and the Decision-LWE attack: Dual Hybrid Meet-in-the-Middle (MitM).
Highlights
Exploring circle STARKs
Latest blog post by VitalikButerin covers Circle STARKs: how they can be implemented, how they're pushing STARK efficiency to the limit, and what’s next (optimizing for better UX and parallelization).
- https://vitalik.eth.limo/general/2024/07/23/circlestarks.html
- 中文翻译:https://mp.weixin.qq.com/s/g6hcok1tJVIIOSoz3dxRFQ
AI achieves silver-medal standard solving International Mathematical Olympiad problems
AlphaProof is a system that trains itself to prove mathematical statements in the formal language Lean. It couples a pre-trained language model with the AlphaZero reinforcement learning algorithm.
Schnorr signatures: Everything you wanted to know, but were afraid to ask!
Alin Tomescu 关于 Schnorr 签名的博客,Alin 的博客简洁清晰,具有很好的可读性,不管是初学者还是工程师都能够比较容易的理解协议的关键和数学核心。这篇博客介绍了:1. Schnorr 签名的历史 2. 定义 3. 批量验证技巧 4.(R,s)与(e,s)表示的对比 5. EdDSA 和 Ed25519 6. (错误)实现
Our crypto experts answer 10 key questions
The path to general computation on Bitcoin
By StarkWare the first research paper on STARK over Bitcoin. This paper is the most practical covenant-rollup research ever published.
Proof Composition Using Zero-Knowledge Virtual Machines: #RunawayZK
@wyatt_benno from @novanet_zkp introduced the concept of #RunawayZK, i.e. how zkVMs, proof composition and Non-Uniform Incremental Verifiable Computation can enable specialized proving schemes.
zkLogin: Send and Receive Crypto as Easily as Email
In @SoorajKSaju's latest writeup, he details how zkLogin makes accessing crypto "as simple as sending an email" – delivering web3 tech with a web2-like user experience.
What is Entropy?
Updates
Justin Thaler - Proofs, Arguments, and Zero-Knowledge Study group organized by ZK Hack
How to Construct Infinite Sets
jHan 的视频介绍,包括什么是自然数?整数?有理数?有理数?虽然我们可能对这些数和集合有直观的理解,但要真正正式构建这些集合却并不那么容易。为此,我们必须使用集合论的一些公理,并仅使用这些假设,正式描述这些无限集合应该是什么样子。我们将开发集合论中的各种工具,如有序对、关系、排序和等价类,从零开始,从无到有,建立所有的实数。 We will develop various tools in set theory, like ordered pairs, relations, ordering, and equivalence classes, to begin with only zero, and from nothing, build all of the real numbers.
They're all SNARKs
zkSecurity 联合创始人 David 关于 SNARK 和 SNARG 以及 zk-SNARK 和 STARK 定义范围的评论,他认为考虑到所有的方案的验证都比直接运行原始计算更快,保留 succinct 给某一类单独方案是没有必要的。 I want to also call STARKs and bulletproofs SNARKs.
Circle STARK notes
The Zama CoFHE Shop - EthCC 7 (Video Playlist)
FHE Summit 2024 (Video Playlist)
- Keynotes and Panel : https://www.youtube.com/playlist?list=PLeyFSoYRt-Wmp9w8THT64Bg3XOl1ZEw3O
- Workshops : https://www.youtube.com/playlist?list=PLeyFSoYRt-WkhEP1hD2ZuxG-ktDoMAK5W
The BLAKE3 Hashing Framework
Internet-Draft submitted! A formal standardized specification is a requirement for certain systems and organizations (for ex., OpenSSL). We hope the IETF crypto working group recognizes the value and adoption of BLAKE3.
Solvability of linear systems over finite fields
If you have n equations in n unknowns over a finite field with q elements, how likely is it that the system of equations has a solution?
Starkware’s Stwo prover now can prove 620,000 hashes in a second with Circle STARKs
They measured throughput for proving invocations of the Poseidon2 hash over M31 field on a MacPro M3.
ZkBoost: Proof Supply Chain Abstraction
Gevulot announced ZkBoost, which can connect all proof networks such as proof marketplaces, prover networks and proof aggregators.
Warlock open-sourced new linear algebra library Noether in Rust.
Noether provides traits and blanket implementations for algebraic structures, from basic ones like magmas to more complex ones like fields. It leans heavily on the basic traits available in std::ops and num_traits.
Zero-Knowledge Learning Path: Introduction.
Bitcoin Script VM in Cairo
shinigami is a library enabling Bitcoin Script VM execution in Cairo, thus allowing the generation of STARK proofs of generic Bitcoin Script computation. shinigami是一个可以在 Cairo 中执行比特币脚本虚拟机的库,因此可以生成通用比特币脚本计算的STARK证明。
noir_rsa
Optimized Noir library that evaluates RSA signatures.
Noir React Native starter
A simple template to generate ZK proofs with Noir on mobile using React Native
Introduction of Cysic Network
Papers
【论文速递】USENIX Security '24(密钥交换、零知识证明、安全多方计算、区块链)
Towards Quantum-Safe Blockchain: Exploration of PQC and Public-key Recovery on Embedded Systems
Tight Time-Space Tradeoffs for the Decisional Diffie-Hellman Problem
AVeCQ: Anonymous Verifiable Crowdsourcing with Worker Qualities
Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies
Efficient Implementation of Super-optimal Pairings on Curves with Small Prime Fields at the 192-bit Security Level
Jolt-b: recursion friendly Jolt with basefold commitment
Donate(ERC20) : 0x18226b84677a7a59D0A498d428feE9208105D0F7
Highlights
Pairings for the Rest of Us
文章基于作者从各种公开课程和资料学习的经验,介绍了基于域扩展的椭圆曲线配对的基础概念,重点包括弗罗贝尼乌斯自同态和 Trace 映射,以帮助建立 和 子群,并逐步实现泰特配对。 In this article, we covered the foundational concepts for understanding elliptic curve pairings over field extensions, focusing on the Frobenius endomorphism and the Trace map to identify subgroups and and implemented the Tate pairing step-by-step.
- https://hackmd.io/@brozorec/pairings-for-the-rest-of-us-1
- https://hackmd.io/@brozorec/pairings-for-the-rest-of-us-2
sigma0-polymath
Polymath: Groth16 Is Not The Limit by Helger Lipmaa 论文中描述的非通用 zk-SNARK 的首次(据我们所知)实现,基于 Rust 和 arkworks。 This is the first (as far as we know) implementation of the non-universal zk-SNARK described in the paper Polymath: Groth16 Is Not The Limit by Helger Lipmaa.
coCircom: Collaborative Circom
coCircom is a tool for building coSNARKs, a new technology that enables multiple distrusting parties to collaboratively compute a zero-knowledge proof (ZKP). It leverages the existing domain-specific language circom to define arithmetic circuits. With coCircom, all existing circom circuits can be promoted to coSNARKs without any modification to the original circuit. Additionally, coCircom is fully compatible with the Groth16 backend of snarkjs, the native proofing system for circom. Proofs built with coCircom can be verified using snarkjs, and vice versa.
A ZERO-KNOWLEDGE PROOF IS VERIFIED ON BITCOIN FOR THE FIRST TIME IN HISTORY
An open-source collaboration between StarkWare and venture firm L2 Iterative makes history verifying the first validity proof on a Bitcoin testnet
BIP-327 MuSig2 in Four Applications: Inscription, Bitcoin Restaking, BitVM Co-sign, and Digital Asset Custody
This article introduces the applications of the BIP-327 MuSig2 multi-signature protocol in four of the most trending fields: Inscription, Restaking, BitVM Co-sign, and Digital Asset Custody.
‘Sensational’ Proof Delivers New Insights Into Prime Numbers
The proof creates stricter limits on potential exceptions to the famous Riemann hypothesis.
Geometrized arithmetic and the unity of mathematics
Lectures on philosophy of mathematicians. Speaker: Prof. Colin McLarty (Case Western Reserve University, USA)
Digital Signature Algorithm intuitively
zkMarek 对于数字签名的讲解视频,通过样例出发,简洁明晰的展示了数字签名的工作原理。同时,这是一个系列视频,还包括了以太坊使用的 ECDSA 等的介绍。 In this video, we propose an intuitive approach to understanding digital signature, verifying it and what elliptic curve generator really does.
Updates
Polygon Plonky3 is Production Ready
Today, researchers at Polygon Labs are excited to announce that Polygon Plonky3, the next generation of ZK proving systems, is production ready and open-source licensed under MIT/Apache.
riscairo
RISC-V ELF interpreter in cairo 2.
zkVM 1.0: Industry-Leading Performance Benchmarks
Across the board, we found that a properly configured RISC Zero zkVM outperforms a similarly configured Succinct SP1 deployment in both cost and speed.
- https://www.risczero.com/blog/beating-moores-law-with-zkvm-1-0
- https://reports.risczero.com/release-1.0
Better, Faster, Smaller Binius
A major update to FRI-Binius yields better batching, faster recursion, and smaller proofs
Nexus 2.0: Jolt, HyperNova, and a New SDK
Nexus 2.0 与上个月发布的 1.0 zkVM 相比,引入了一些关键的新组件,推动了性能和效率的提升:
- 由 Jolt 算术化系统支持的新证明器前端
- 由 HyperNova 递归证明系统支持的新证明器后端
- Nexus SDK,一个用于大规模并行生成多个证明的编程框架 A new prover frontend, powered by the Jolt arithmetization system A new prover backend, powered by the HyperNova recursive proof system The Nexus SDK, a programmatic framework for producing multiple proofs in parallel and at scale
- https://blog.nexus.xyz/nexus-2-0-jolt-hypernova-and-a-new-sdk/
A key component of the Nexus 2.0 zkVM is a new SDK, a programmatic framework for computing multiple zkVM proofs at scale. It supports each of our Nova, HyperNova, and Jolt backends, enabling easy configuration to tailor proving to specific applications. Dynamic compilation, private input, public output, and logging support together provide a rich programmatic interface to guest programs. A simple, misuse-resistant design makes using the Nexus zkVM to prove even complex programs a straightforward process.
Jolt Roadmap Update
Jolt 七月份的路线图,主要是三个部分:
- On-chain verification: 基于 Zeromorph 的 PCS 来减少 verifier cost,基于 HyperKZG 的 PCS,以及 EVM Verifier 的实现
- Optimization: 使用 Quarks 来优化 GKR 的实现,以及使用稀疏化表示方式来减少 Sumcheck 的内存占用
- Devex: 支持 std,wasm,allocator,支持 RV32I-M,重构 R1CS
- https://x.com/samrags_/status/1813954274629689628
The Story of Shor's Algorithm
Peter Shor really understood the landscape of theory from complexity to cryptography, a curiosity for quantum computing and the vision to see how it all connected together to get the quantum algorithm that almost single-handedly brought billions of dollars to the field.
A Better World with Self-Sovereign Identity
Self-sovereign identity is a model for managing digital identities where individuals or businesses have complete control and ownership over their accounts and personal data.
BitVM verifier script optimization
This pull request fully implemented Algorithm 9 from "On Proving Pairings" paper for BitVM. Final Groth16 verifier script size is now approximately 2.9GB, reduced by 1.1G.
zk Warsaw Meetup 16: Zero Knowledge Applications on Mina Protocol
Brandon Kase - CEO of o1Labs - the incubators of Mina Protocol leads a focused discussion on the application of zero-knowledge proofs in the Mina Protocol.
circle-plonk
Using stwo to implement a Plonk prover and verifier over Circle STARK
Papers
On the Concrete Security of Non-interactive FRI
Providing a thorough concrete security analysis of non-interactive FRI under various parameter settings from protocols deploying FRI today.
A Crack in the Firmament: Restoring Soundness of the Orion Proof System and More
Orion in its current revision is still unsound (with and without the zero-knowledge property) and demonstrates practical attacks on it. Then show how to repair Orion without additional assumptions, which requies non-trivial fixes when aiming to preserve the linear time prover complexity.
Dot-Product Proofs and Their Applications
点积证明(DPP)是一个简单的概率证明系统,其中输入语句 和证明 是有限域 上的向量,而证明是通过对 和 进行单个点积查询 来验证的。DPP 可以看作是一个 1-query 完全线性 PCP。论文还讨论了 DPP 的可行性和效率。 A dot-product proof (DPP) is a simple probabilistic proof system in which the input statement and the proof are vectors over a finite field , and the proof is verified by making a single dot-product query jointly to and . A DPP can be viewed as a 1-query fully linear PCP. We study the feasibility and efficiency of DPPs.
Designated-Verifier zk-SNARKs Made Easy
Propose a construction of strong designated-verifier zk-SNARKs. The construction inspired by designated verifier signatures based on two-party ring signatures does not use encryption and can be applied on any public-verifiable zk-SNARKs to yield a designated-verifiable variant.
On cycles of pairing-friendly abelian varieties
One of the most promising avenues for realising scalable proof systems relies on the existence of 2-cycles of pairing-friendly elliptic curves. In this paper, the authors generalise the notion of cycles of pairing-friendly elliptic curves to study cycles of pairing-friendly abelian varieties, with a view towards realising more efficient pairing based SNARKs.
Quasi-Linear Size PCPs with Small Soundness from HDX
A fantastic new result by Bafna, Minzer, and Vyas shows what can be viewed as a version of the PCP theorem of @IritDinur in the low soundness regime. They do so using high-dimensional expanders and ideas from fault-tolerant distributed computing. It's interesting to note that ideas from fault tolerance also recently arose in the setting of the quantum PCP conjecture. This (perhaps unexpected) connection between PCPs and fault tolerance seems to be quite promising.
Highlights
Avi Wigderson Turing Award Lecture: “Alan Turing: A TCS Role Model”
阿维-维格德森 (Avi Wigderson) 获得了 2023 年 ACM A.M. 图灵奖,以表彰他对计算理论做出的奠基性贡献,包括重塑了我们对随机性在计算中的作用的理解,以及他数十年来在理论计算机科学领域的知识领导地位。 Wigderson 是新泽西州普林斯顿高等研究院数学学院的 Herbert H. Maass 教授。他在计算复杂性理论、算法与优化、随机性与密码学、并行与分布式计算、组合学、图论以及理论计算机科学与数学和科学之间的联系等领域一直处于领先地位。
Peter Shor is the recipient of the 2025 Claude E. Shannon Award
The IEEE Information Theory Society is pleased to announce that Peter Shor is the recipient of the 2025 Claude E. Shannon Award for consistent and profound contributions to the field of information theory.
To Schnorr and beyond
马修·格林是约翰霍普金斯大学的教授和密码学家,他在下面的两篇博客里面详细的介绍了 Schnorr 签名系统模型、协议和数学原理,博客清晰且重点清晰。
- https://blog.cryptographyengineering.com/2023/10/06/to-schnorr-and-beyond-part-1/
- https://blog.cryptographyengineering.com/2023/11/30/to-schnorr-and-beyond-part-2/
Fiat-Shamir Heuristic
Zkproof 工作小组关于 Fiat-Shamir Heuristic 的标准化草案,草案作者是 CNRS 的 M. Orrù。草案简洁的定义了Fiat-Shamir Heuristic的接口、步骤和示例。
Sigma Protocols
Network 工作小组关于 Sigma Protocols 的标准化草案,草案作者是 CNRS 的 M. Orrù 和 AIT 的 S. Krenn。草案状态是 Informational,已经包括了丰富的细节和示例。
Announcing AES-GEM (AES with Galois Extended Mode)
Interactive Arithmetization and Iterative Constraint Systems
David,zkSecurity的联合创始人,也是《真实世界的密码学》一书的作者关于交互式算术和迭代约束系统的总结博客,同时包含了一系列相关介绍的链接。
STIR won Best Paper at CRYPTO 2024!
Understanding the point at infinity in Elliptic Curves
“神秘”的密码学到底在学些什么?
The Phantom Zone
phantom-zone 是一个实验性的多方计算库,它使用多方完全同态加密来计算来自多方的私人输入的任意函数。目前,phantom-zone 的功能相当有限。它提供使用加密的 8 位无符号整数(称为 FheUint8)写入电路的功能,并且仅支持最多 8 方。FheUint8 支持与常规 uint8 相同的算法,介绍文档里面提到了一些例外情况。计划在未来将 API 扩展到其他有符号/无符号类型。
Privacy-preserving KYC
Proof of Twitter: ZK Email Demo
Hardhat ZKit
CryptoHack launched the ZKP section
Ethereum Proofs - Noir Library Use Cases
Blendy 🍹: a space-efficient sumcheck algorithm
Updates
ENCRYPT London 2024 (Playlist)
ZK and cryptography with Justin Thaler, Valeria Nikolaenko and Joseph Bonneau
The Man Who Solved the World’s Hardest Math Problem
The Zombie Misconception of Theoretical Computer Science
Privado ID
CUDA Mini Course #3, presented by Hadar Sackstein, Algorithms Engineer at Ingonyama
Now You Can Receive Crypto as Easily as an Email: The Mastermind Behind zkLogin - Kostas Kryptos
ETHGlobal Brussels (Video Playlist)
BOUNDLESS by RISC Zero at EthCC Brussels, Belgium 2024
- ZK Proofs in Action: Production-Ready Solutions for Real World Apps by Jeremy Bruestle
- Interoperability From Coordinated Sequencing & ZK Proofs by Ben Fisch, Espresso Labs
- https://www.youtube.com/watch?v=V3aIRUDp7eo&list=PLcPzhUaCxlCgCvzkkaBWzVuHdBRsTNxj1&index=43
- NEBRA UPA: Proof Aggregation for privacy, scaling and interoperability By Shumo Chu
- The Endgame for Web3 by Zac Williamson
Papers
【论文速递】CiC Vol. 1, Issue 2 (7篇)
【论文速递】ASIA CCS '24(隐私保护协议、后量子、密码学、去中心化系统、认证签名)
A Note on Efficient Computation of the Multilinear Extension
In this note we show how, given oracle access to and a point , to compute using field operations and only space.
Ringtail: Practical Two-Round Threshold Signatures from Learning with Errors
Introducing Ringtail, the most efficient 2-round lattice-based threshold signature from standard assumptions.
A Simple Post-Quantum Oblivious Transfer Protocol from Mod-LWR
Generic Anamorphic Encryption, Revisited: New Limitations and Constructions
Distributed Verifiable Random Function With Compact Proof
Jolt-b: recursion friendly Jolt with basefold commitment
Hadamard Product Argument from Lagrange-Based Univariate Polynomials
Learnings
STARK 101
STARK 101 is a hands-on tutorial on how to write a STARK prover from scratch (in Python).
Quantum Computer Programming in 100 Easy Lessons
A beginner's course on basic quantum computing algorithms. Background required: basic knowledge of computer programming, probability, and geometry. Knowledge of linear algebra a plus.
zkSync Era Tutorial
Highlights
Adi Shamir: Wolf Prize Laureate in Mathematics 2024
- https://wolffund.org.il/adi-shamir/ 恭喜 Shamir 由于密码学的数学基础等重要贡献,荣获本年度的沃尔夫数学奖。
Releasing Constantine v0.1.0, a modular cryptography stack for Ethereum
- https://ethresear.ch/t/releasing-constantine-v0-1-0-a-modular-cryptography-stack-for-ethereum/19990 Constantine 提供了截至目前以太坊特定加密原语的最快实现,包括 BLS 签名,BN254 预编译(EIP-196 和 EIP-197,在 EIP-1108 中重新定价),BLS12-381 预编译(EIP-2537)和 KZG 多项式承诺(EIP-4844)。 Constantine 与 C、Go、Nim 和 Rust 有绑定。Constantine 用 Nim 语言写成,具有优秀的表现力、类型系统强度、易于被打包成 C 和 C++, 并且与 Python 的语法接近,可以轻松移植以太坊研究和 PyEVM 的相关实现。Constantine 尚未经过审计,但由于以太坊基金会在 2023 年夏季的赞助,它已由 Guido Vranken 进行了广泛的模糊测试。还被添加到 OSS-Fuzz 和 Google 全天候开源模糊测试计划。
2 .com Blog
- https://xn--2-umb.com/ Remco Bloemen 的笔记,包括了大量密码学原语和协议的整理总结,比如 Groth16,BLS 签名等。笔记简洁清晰,关注于原语和协议的核心,并且贴心的标记了适合大众阅读的文章。
Zorch
Zorch is a package for CUDA-optimized STARK proving.
Proximity Is What You Want: Low-Degree Testing for Reed-Solomon Codes
Quantum is unimportant to post-quantum
Theory and Practical Implementation of BLS12-381
Convolutions, Fast Fourier Transform and Polynomials
- https://www.alvarorevuelta.com/posts/fft-polynomials Alvaro Revuelta 在这篇博客中简洁清晰的解释了如何使用 FFT 来加速多项式乘法,使复杂度从直接相乘的 O(n^2) 降到 O(nlogn)。博客中还给出了示例代码和仿真结果。
With Fifth Busy Beaver, Researchers Approach Computation’s Limits
Zero-Knowledge Proofs and Their Role within the Blockchain
- https://cacm.acm.org/article/zero-knowledge-proofs-and-their-role-within-the-blockchain/ Alex Williams 在 ACM 会刊上对零知识证明在区块链中的应用和限制进行了简明的总结。
Proteus
Proteus is an open-source platform for AI content provenance - leveraging proof of transformation to create incorruptible and robust watermarks.
Sumcheck and Open-Binius
- https://medium.com/@ingonyama/sumcheck-and-open-binius-35220e5bd03a
- https://hackmd.io/@suyash67/B1npBL_LR
Algebraic FFTs
The ECFFT algorithm
The Number Theoretic Transform in Kyber and Dilithium
A Zero Knowledge Paradigm : Part 3 Custom ISA
Updates
Episode 330: Frameworks for Programmable Privacy with Ying Tong and Bryan Gillespie
Zero-Knowledge Location Privacy
Jolt: SNARKs for virtual machines via lookups - Arasu Arun (NYU), Michael Zhu (a16z Crypto)
A STARK breakthrough: Next-gen provers may be at least 100x faster
- https://blockworks.co/news/starkware-polygon-labs-stwo-zk-prover
- https://starkware.co/starkware-new-proving-record/
Delegated Spartan
Ingonyama CUDA Mini Course
micro-rsa-dsa-dh
Minimal implementation of older cryptography algorithms: RSA, DSA, DH.
Add noname as a frontend to sonobe
Papers
Adaptor Signatures: New Security Definition and A Generic Construction for NP Relations
Optimized Computation of the Jacobi Symbol
Enhancing Local Verification: Aggregate and Multi-Signature Schemes
Shuffle Arguments Based on Subset-Checking
Natively Compatible Super-Efficient Lookup Arguments and How to Apply Them
Quirky Interactive Reductions of Knowledge
Insta-Pok3r: Real-time Poker on Blockchain
VIMz: Verifiable Image Manipulation using Folding-based zkSNARKs
- https://eprint.iacr.org/2024/1063 VIMz 旨在开发一个实用的框架,以在商用硬件上有效地证明高清和 4K 图像的真实性,通过使用 Nova 折叠证明,最大限度地降低了证明器复杂性。实验结果中减少了达到 3 倍的证明时间和 96 倍的内存开销(从 [Kang et al., arXiv 2022] 中的 309 GB 减少到仅 3.2 GB)。
VerITAS: Verifying Image Transformations at Scale
From Interaction to Independence: zkSNARKs for Transparent and Non-Interactive Remote Attestation
Trust Nobody: Privacy-Preserving Proofs for Edited Photos with Your Laptop
TaSSLE: Lasso for the commitment-phobic
Practical Non-interactive Multi-signatures, and a Multi- to Aggregate Signatures Compiler
Notes on Multiplying Cyclotomic Polynomials on a GPU
Highlights
Introducing the ZK Catalog
Ariel Gabizon UJ crypto course: the KZG PCS scheme and PlonK SNARK
Disarming Fiat-Shamir footguns
Building a Decentralized Privacy Preserving Order Book Exchange on Polygon Miden
FRIDA: Data-Availability Sampling from FRI
Montgomery Multiplication
Many algorithms in number theory, like prime testing or integer factorization, and in cryptography, like RSA, require lots of operations modulo a large number. The Montgomery (modular) multiplication is a method that allows computing such multiplications faster. Instead of dividing the product and subtracting n multiple times, it adds multiples of n to cancel out the lower bits and then just discards the lower bits.
zkPages
Zero-knowledge digital content single page store fronts. Enable anyone to create a secure digital content store front page on Starknet. Privacy-focused checkouts.
zKastle
zKastle is a solo strategy card game. Manage resources, and upgrade your village to make the maximum points possible. Make tactical decisions to help your village grow and flourish.
Solas
An attestation / citation system built on starknet using Cairo and starknet tooling.
Ingopedia
A comprehensive collection of resources and information related to Zero Knowledge Proofs from Ingonyama
Updates
ZK Summit 11 Retrospective
Reflections on NFC cards and advanced cryptography at ZK Summit 11
zkStudyClub - FRI-Binius: Polylogarithmic Proofs for Multilinears over Binary Towers (Ben Diamond)
Cloaking Layer - zCloak Network released its universal ZKP verification infrastructure for all blockchains
HyperNova: Recursive arguments for customizable constraint systems
The paper is now updated. The newly added content highlights a new use of folding schemes. Previously, folding schemes were used to construct IVC. We now show that certain folding schemes (e.g., Nova's) unlock a new approach to add ZK in proof systems.
Papers
【论文速递】STOC 2024(量子、电路、单向函数、承诺、零知识、证明、不可区分混淆、格基SNARKs)
On the vector subspaces of over which the multiplicative inverse function sums to zero
The Sum-Check Protocol over Fields of Small Characteristic
Constraint-Packing and the Sum-Check Protocol over Binary Tower Fields
A note on adding zero-knowledge to STARKs
A note on the G-FFT
Sparsity-Aware Protocol for ZK-friendly ML Models: Shedding Lights on Practical ZKML
Dong Mo博士团队新做的一个ZKML的工作。主要讲的是通过ternary network可以将神经网络模型 (LLM之类)无损压缩和整数化,并且在这种简化的基础上面设计了一个叫SpaGKR的ZK算法,实现高效ZKML inference。目前初步测下来能做到100X以上的速度提升,之后会补实验部分。
Accelerating pairings on BW10 and BW14 Curves
A Succinct Range Proof for Polynomial-based Vector Commitment
Highlights
Luca Trevisan (1971-2024)
- https://windowsontheory.org/2024/06/19/luca-trevisan-1971-2024/
- https://scottaaronson.blog/?p=8057
- https://blog.computationalcomplexity.org/2024/06/luca-trevisan-1971-2024.html
Luca Trevisan's Cryptography Lecture Notes from CS276, Spring 2009
One of the best learning resources about the Goldreich-Levin theorem, recommended by Prof. Deng Yi.
The ZF FROST Book
SoK: Programmable Privacy in Distributed Systems
Abstract Algebra: Theory and Applications
A nice book with examples and programming exercises.
- http://abstract.ups.edu/aata/aata.html
10 Weeks of Journey into vFHE
- https://paragraph.xyz/@moyed/10-weeks-of-journey-into-vfhe
- https://drive.google.com/file/d/1IKhckgus2WkyVtGqaeA8fJOe5THNzv-V/view
Arithmetizing FHE in Circom
Juvix: a language for intent-centric and declarative decentralized applications
Updates
Nexus zkVM 1.0
RISC Zero zkVM 1.0: Industry-Leading Performance Benchmarks
Episode 328: ZK on Bitcoin with Alpen Labs
Arkwork v0.5.0-alpha
北京密码学日成功举办
Eurocrypt 2024 Videos
- SNARKs: https://www.youtube.com/watch?v=_WsCQc9Elcg
- Proof Systems: https://www.youtube.com/watch?v=e0b3oKSrYt8
Papers
Fast SNARK-based Non-Interactive Distributed Verifiable Random Function with Ethereum Compatibility
ICICLE v2: Polynomial API for Coding ZK Provers to Run on Specialized Hardware
Volatile and Persistent Memory for zkSNARKs via Algebraic Interactive Proofs
Hadamard Product Arguments and Their Applications
On Knowledge-Soundness of Plonk in ROM from Falsifiable Assumptions
Cross-chain bridges via backwards-compatible SNARKs
Dishonest Majority Multi-Verifier Zero-Knowledge Proofs
zkVoting : Zero-knowledge proof based coercion-resistant and E2E verifiable e-voting system
Relaxed Vector Commitment for Shorter Signatures
Formal Verification of Zero-Knowledge Circuits
Highlights
Ronkathon: Learn Cryptography from First Principles
Ronkathon是受Plonkathon启发的一组密码原语的 Rust 实现。旨在展示应用密码学的理论特性以及编程语言中的具体应用的技术内容。Ronkathon是根据第一性原理构建的,因此无需了解外部库或详细依赖项(除rand和itertools之外)。大部分代码并未针对数学透明度和简洁性进行优化。
A Zero Knowledge Paradigm: Part 2- Exploring zk-VM Design Trade-offs
In the part 2 of their article series about zkVMs, @ventalitan from @lita_xyz first gave an overview of zkVM design, and then covered the trade-offs of all the different aspects it involves.
- https://www.lita.foundation/blog/a-zero-knowledge-paradigm-part-2--exploring-zk-vm-design-trade-offs
Diving into Poseidon hash and its security
The Nexus zkVM
Polygon Zero zkEVM
A collection of libraries to prove Ethereum blocks with Polygon Zero Type 1 zkEVM, powered by starky and plonky2 proving systems.
How to verify ZK proofs on Bitcoin? by Polyhedra Network
All the proof aggregation solutions will use RISC-V zkVMs
Episode 327: Proof Aggregation with Shumo and Yi from NEBRA
In this week’s episode Anna chats with Shumo and Yi from NEBRA. They discuss the high price of putting ZKPs on-chain before diving into NEBRA’s proposed solution to mitigating this, their Universal Proof Aggregation product. They cover what it takes to incorporate extra pricing systems into NEBRA UPA as well as the benefits that these systems will bring, how developers are meant to interact with them, and future integrations to enable seamless cross-zkRollup applications. The group round off by discussing prover marketplaces, verification aggregation systems, and the design space that this all opens up.
Pairings in Cryptography
Dan Boneh 介绍了 pairing 的原理和计算 pairing 的算法, 还讲了相关的应用, 比如可以利用 pairing 构建 BLS 签名和门限签名. https://youtu.be/8WDOpzxpnTE?si=JIguXJMSss9dru1A&t=1992 这里很搞笑, 说 pairing 的公式是法国数学家 Andre Weil 在二战期间的 2 年监狱服刑中搞出来的(因为拒绝当兵), 之后他在自传中建议法国数学家都去监狱中待两年, 因为确实很高产
Cryptography and Privacy in Context | Ying Tong | Web3Privacy Now Berlin Meetup 2024
Zero Knowledge Security from OpenSense
A very nice and general introduction about Zero Knowledge Security. ZK Developers and auditors can level up their ZK auditing skills in this video.
Fancy cryptography in the wild
Curated list of deployments of fancy cryptography. Cryptography counts as fancy if it uses primitives beyond symmetric ciphers, (EC)DH as key agreement, digital signatures, public key encryption such as RSA-OAEP, or KEMs, or uses those primitives in unusual ways, especially if it relies on properties beyond IND-CCA2.
Updates
Poseidon{2} for Noir
Verification of zkWasm in Coq
This repository previews a Coq development to formally verify the zkWasm zkVM.
Catnet Bitcoin signet
Catnet is a custom Bitcoin signet with OP_CAT enabled, used to test implementation of Bitcoin Circle STARK Verifier.
David Wong - noname walkthrough
Justin Thaler - Proofs, Arguments, and Zero-Knowledge - Week 1
Justin Thaler在学习群组中对于自己名作Proofs, Arguments, and Zero-Knowledge一书的讲解,这是第一周的录像,还附有讲解时使用的笔记。
- https://www.youtube.com/watch?v=qQ7yIEJKCtE&list=PLTPK8HRi5qmlIBA7TDTO8hBOprAc1FIQv
- https://www.dropbox.com/scl/fi/3e0feorbpi1q5yiobswd3/Note-Jun-12-2024.pdf?rlkey=dclie5k2oveahjxn1m1113aau&e=1&dl=0
Ariel Gabizon - FFT's on the projective line and circle-STARKs
Ariel Gabizon gave a talk about how to enable fast FFTs over Fp when a large power of 2 divides p+1, which is the idea behind Circle STARK.
How zkSharding Addresses the Blockchain Trilemma
=nil; Foundation的博客,总结了当前使用零知识证明对区块链进行扩展的技术路线,强调了zkSharding作为水平扩容路线的优势。
zkStudyClub - LatticeFold: Lattice Folding Schemes (Binyi Chen)
Papers
Polymath: Groth16 Is Not The Limit
Proposes a zk-SNARK Polymath for the Square Arithmetic Programming constraint system using the KZG polynomial commitment scheme. Polymath has a shorter argument than Groth16. At 192-bit security, Polymath's argument is nearly half the size, making it highly competitive for high-security future applications.
Leveled Fully-Homomorphic Signatures from Batch Arguments
We do not have homomorphic signatures with features such as multi-hop evaluation, context hiding, and fast amortized verification, while relying on standard falsifiable assumptions. In this work, we design homomorphic signatures satisfying all above properties. Constructing homomorphic signatures for polynomial-sized circuits from a variety of standard assumptions such as sub-exponential DDH, standard pairing-based assumptions, or learning with errors.
A Pure Indistinguishability Obfuscation Approach to Adaptively-Sound SNARGs for NP
Constructing an adaptively-sound SNARG for NP in the CRS model from sub-exponentially-secure iO and sub-exponentially-secure one-way functions.
Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing
Extending the existing zk-SNARKs Libra (Crypto'19) and HyperPlonk (Eurocrypt'23) into scalable collaborative zk-SNARKs.
SmartZKCP: Towards Practical Data Exchange Marketplace Against Active Attacks
Dual Polynomial Commitment Schemes and Applications to Commit-and-Prove SNARKs
Communication Complexity vs Randomness Complexity in Interactive Proofs
SNARGs under LWE via Propositional Proofs
Interests
The State of Security Tools for ZKPs
zkSecurity team briefly discuss where vulnerabilities can be introduced when using ZKPs, and the state of security tools for finding vulnerabilities in ZKPs.
Highlights
The State of Security Tools for ZKPs
Circle STARKs: Part I, Mersenne
Understanding Jolt: Clarifications and reflections by Justin Thaler
Justin Thaler explored four areas in Lasso and Jolt: (1) the relationship between the sum-check protocol and the Binius commitment scheme, (2) the role of sum-check and lookups in Jolt, (3) elliptic curves versus hashing, and (4) precompiles as they relate to zkVMs.
BrainSTARK
This tutorial teaches the reader how to design a Turing-complete zk-STARK engine, consisting of a virtual machine, prover, and verifier. Brainfuck was chosen as the target language due to its well-known and simple instruction set, but the design patterns introduced in this tutorial generalize to arbitrary instruction set architectures
Bivariate Kate-Zaverucha-Goldberg (KZG) Constant-Sized Polynomial Commitments
This article presents a variant of the KZG commitment, the bivariate KZG commitment, which allows us to commit to polynomials with two variables. PolyhedraZK在这篇笔记中描述了二元KZG承诺,可以支持双变量的多项式承诺和验证。笔记简洁易懂。
Updates
zkStudyClub - Reef: Fast Succinct Non-Interactive ZK Regex Proofs (Eli Margolin, Jess Woods: UPenn)
- https://www.youtube.com/watch?v=68-BuxRR-EA
- https://eprint.iacr.org/2023/1886
zkSecurity x Bain Capital Crypto Whiteboards: Unveiling the Power of Multi-Party Computation
- https://www.zksecurity.xyz/blog/posts/mpc/
noname meets Ethereum: Integration with SnarkJS
- https://www.zksecurity.xyz/blog/posts/noname-r1cs/
Scaling Bitcoin for mass use: A realistic vision by Eli Ben-Sasson
Starknet can become a single layer that settles on both Bitcoin and Ethereum.
- https://starkware.co/scaling-bitcoin-for-mass-use/
HyperNova was accepted to appear at CRYPTO’24
Made several improvements. A significant addition is achieving ZK while only using a non-zk SNARK. This means an on-chain verifier can continue to verify sum-check messages in plaintext while being truly ZK! Eprint updating soon! 知名折叠方案,Kothapalli和Setty的著名工作,本次确定被密码学顶会CRYPTO’24接收发表。实现了对CCS约束的增量计算的递归证明。可以被推广到Plonkish, R1CS, 和AIR约束。HyperNova的优势在于复杂度上的大量优化,证明的每一步的主要复杂度来源于单个MSM,其大小等于约束系统中的变量数。另外本文还提出了nlookup,一个查找证明,特别适用于基于折叠方案的递归证明。
- https://eprint.iacr.org/2023/573.pdf
Noir v0.30.0 update
Breaking changes:
- remove
Opcode::Brillig
from ACIR - AES blackbox
- https://github.com/noir-lang/noir/releases/tag/v0.30.0
Papers
Analyzing and Benchmarking ZK-Rollups
This paper offers a theoretical and empirical examination aimed at comprehending and evaluating ZK-Rollups, with particular attention to ZK-EVMs. Stefanos Chaliasos在zk-Bench之后关于零知识证明实施的又一个Benchmark研究,该研究主要关注ZK-Rollups的设计和实施,论文前半部分主要关注设计上的分析,后半部分对Polygon zkEVM和zkSync Era进行了一些实验和测试。
- https://eprint.iacr.org/2024/889
zkCross: A Novel Architecture for Cross-Chain Privacy-Preserving Auditing
Proposes zkCross, a novel two-layer cross-chain architecture equipped with three cross-chain protocols to achieve privacy-preserving cross-chain auditing.
- https://eprint.iacr.org/2024/888
Security of Fixed-Weight Repetitions of Special-Sound Multi-Round Proofs
- https://eprint.iacr.org/2024/884
Epistle: Elastic Succinct Arguments for Plonk Constraint System
Presents Epistle, an elastic SNARK for Plonk constraint system. For an instance with size , in the time-efficient configuration, the prover uses cryptographic operations and memory; in the space-efficient configuration, the prover uses cryptographic operations and memory. Compared to Gemini, this approach reduces the asymptotic time complexity of the space-efficient prover by a factor of . The key technique we use is to make the toolbox for multivariate PIOP provided by HyperPlonk elastic.
- https://eprint.iacr.org/2024/872
Cryptanalysis of Algebraic Verifiable Delay Functions
Analyze the security of these algebraic VDF candidates. In particular, shows that the latency of exponentiation can be reduced using parallel computation, against the preliminary assumptions.
- https://eprint.iacr.org/2024/873
On cycles of pairing-friendly abelian varieties
Generalizes the notion of cycles of pairing-friendly elliptic curves to study cycles of pairing-friendly abelian varieties, with a view towards realizing more efficient pairing-based SNARKs.
- https://eprint.iacr.org/2024/869
Loquat: A SNARK-Friendly Post-Quantum Signature based on the Legendre PRF with Applications in Ring and Aggregate Signatures
Designs and implements a novel NARK-friendly post-quantum signature scheme based on the Legendre PRF, named Loquat.
- https://eprint.iacr.org/2024/868
Collaborative, Segregated NIZK (CoSNIZK) and More Efficient Lattice-Based Direct Anonymous Attestation
Defines collaborative, segregated, non-interactive zero knowledge (CoSNIZK). This notion generalizes the property of collaborative zero-knowledge so that the zero-knowledge property need only apply to a subset of provers during collaborative proof generation. The main contribution is the construction of a DAA based on the hardness of problems over module lattices as well as the ISISf assumption.
- https://eprint.iacr.org/2024/864
Novel approximations of elementary functions in zero-knowledge proofs
In ZKP, all algebraic functions are exactly computable. Recognizing that, proceeds to the approximation of transcendental functions with algebraic functions.
- https://eprint.iacr.org/2024/859
Generalized Indifferentiable Sponge and its Application to Polygon Miden VM
- https://eprint.iacr.org/2024/911
Interests
Dark pool
Dark Pool 可以理解为一类平台的统称,这些平台使用增强隐私的技术,允许用户在不透露其身份或交易细节的情况下进行资产交易。下面的第一篇文章介绍了如何使用(门限)完全同态加密(Threshold Fully Homomorphic Encryption, TFHE)来构造一个暗黑的 Dark Pool,即使 Dark Pool 的运营者也无法查看订单详情。第二篇文章是对 Dark Pool 的一些介绍和延展。
- https://blog.sunscreen.tech/building-a-truly-dark-dark-pool-2/
- https://distributedresearch.substack.com/p/diving-into-dark-pools
ZKM’s Proving Service
ZKM 宣布发布其独家的证明服务,为开发人员提供高性能服务器的访问,这些服务器能够有效地处理生成零知识证明的密集计算要求。该服务专门针对 zkMIPS 进行了优化,zkMIPS 用于促进将 ZKP 功能集成到各种应用程序中。
- https://www.zkm.io/blog/zkms-proving-service-breaking-down-the-barriers-for-proof-generation
Highlights
ZKProof 6 in Berlin (video list)
- https://www.youtube.com/playlist?list=PLOEty2U8Y69Uzkd6MthUjWbOxQHzBAtCQ
- https://www.youtube.com/playlist?list=PLOEty2U8Y69XR-KVpuDi4mCIOjBtUA-mQ
- https://www.youtube.com/playlist?list=PLOEty2U8Y69WTd1ZVXgGCTZim5TCEAB9H
Polyhedra Expander Compiler Collection
The ExpanderCompilerCollection is a component of the Expander proof system. It transforms circuits written in gnark into an intermediate representation (IR) of a layered circuit. This IR can later be used by the Expander prover to generate proofs.
- https://github.com/PolyhedraZK/ExpanderCompilerCollection
Lita launches alpha release of Valida zero knowledge virtual machine and C Complier,
- https://www.lita.foundation/blog/announcing-litas-valida-c-compiler-zkvm-the-first-step-towards-true-universal-zk
A Zero Knowledge Paradigm: Part 1 - What is a zk-VM?
- https://www.lita.foundation/blog/zero-knowledge-paradigm-zkvm
Current state of SNARKs
A survey of today’s SNARKs landscape.
- https://www.alpenlabs.io/blog/current-state-of-snarks
Alpen Labs Team对当前SNARKs相关方案进行了分类总结,包括三种不同SNARKs方案的区分,sumcheck和GKR的使用,以及BitVM。简短明晰的总结了当前主流方案的发展现状,是不错的入门材料。
Kobi Gurkan: on the risk of circuit-specific setups
- https://x.com/kobigurk/status/1793846260291588312
Nimue: a Fiat-Shamir library
- https://github.com/arkworks-rs/nimue
Nimue是arkworks框架下一个实现了Fiat-Shamir相关协议的新库。Nimue的随机性不基于哈希,而是随机预言。它有助于编写多轮公共硬币协议。Nimue建立在SAFE框架之上,能提供生成验证者和证明者的随机硬币的API。
The first ZKP Verify Code Implementation using Bitcoin Script
Zulu Network team has Open-Sourced the first ZKP Verify Code Implementation using Bitcoin Script, involving mainstream algorithms such as Groth16/FFlonk. This achievement lays the foundation for constructing a decentralized bridge based on BitVM2. It is based on the On Proving Parings paper whch significantly reduces the overall script size.
- Fflonk verifier script code: https://github.com/BitVM/BitVM/pull/69
- Groth16 verifier script code: https://github.com/zulu-network/BitVM
- Groth16 verifier rust code: https://github.com/zulu-network/bitvm-groth16-verifier
Updates
Plonkish Constraint Systems
As part of the ZKProof standardization effort, the Plonkish Constraint System Working Group is developing a specification, a reference implementation written in Rust, and test vectors for Plonkish arithmetisation.
- https://github.com/zkpstandard/wg-plonkish
On Proving Pairings - Andrija Novakovic
This paper explores efficient ways to prove correctness of elliptic curve pairing relations. First shows that the final exponentiation step of pairing verification can be replaced with a more efficient “residue check,” which can be incorporated into the Miller loop. Then shows how to reduce the cost of the Miller loop by precomputing all the necessary lines, and how this is especially efficient when the second pairing argument is fixed in advance. Instantiateing algorithms and show results for the BN254 curve.
- https://www.youtube.com/watch?v=ddtKDO_GQ5o
- https://eprint.iacr.org/2024/640.pdf
RISC Zero's Zeth Brings Validity Proofs to Optimism’s OP Stack
- https://www.risczero.com/blog/zeth-brings-validity-proofs-to-optimisms-op-stack
Sumcheck over GPU
Ingonyama release the CUDA code of sumcheck protocol.
- https://github.com/ingonyama-zk/icicle/blob/828fc9c006a6470f2d1b4f8ba7788f79473f5589/icicle%2FappUtils%2Fsumcheck%2Fsumcheck.cu#L595
Papers
Resettable Statistical Zero-Knowledge for NP
Showing an equivalence of resettable statistical zero-knowledge arguments for NP and witness encryption schemes for NP.
- https://eprint.iacr.org/2024/806
Zero-knowledge IOPs Approaching Witness Length
Constructing the first ZK-IOPs approaching the witness length for a natural NP problem. More specifically, designs constant-query and constant-round IOPs for 3SAT.
- https://eprint.iacr.org/2024/816
The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs
Establishing the UC security of Groth16 without any significant overhead. Providing a general framework for proving protocols secure in the presence of global generic groups, which then applys to Groth16.
- https://eprint.iacr.org/2024/818
zkLLM: Zero Knowledge Proofs for Large Language Models
Standing as the inaugural specialized zero-knowledge proof tailored for LLMs to the best of our knowledge. Presenting tlookup, a parallelized lookup argument designed for non-arithmetic tensor operations in deep learning, offering a solution with no asymptotic overhead. Introducing zkAttn, a specialized zero-knowledge proof crafted for the attention mechanism, carefully balancing considerations of running time, memory usage, and accuracy.
- https://arxiv.org/abs/2404.16109
Multivariate Multi-Polynomial Commitment and its Applications
Introducing and formally define Multivariate Multi-Polynomial (MMP) commitment, a commitment scheme on multiple multivariate polynomials, and illustrate the concept with an efficient construction, which enjoys constant commitment size and logarithmic proof size.
- https://eprint.iacr.org/2024/827
Hamming Weight Proofs of Proximity with One-Sided Error
A wide systematic study of proximity proofs with one-sided error for the Hamming weight problem Ham. Showing proofs of proximity for Ham with one-sided error and sublinear proof length in three models (MA, PCP, IOP).
- https://eprint.iacr.org/2024/832
The Round Complexity of Proofs in the Bounded Quantum Storage Model
- https://eprint.iacr.org/2024/836
Fully Secure MPC and zk-FLIOP Over Rings: New Constructions, Improvements and Extensions
Presenting a new MPC framework to obtain full security, compatible with effectively any ring. The framework works with any linear secret sharing scheme and relies on a new to utilize the machinery of zero-knowledge fully linear interactive oracle proofs (zk-FLIOP) in a black-box way.
- https://eprint.iacr.org/2024/837
Almost optimal succinct arguments for Boolean circuit on RAM
- https://eprint.iacr.org/2024/839
Batching-Efficient RAM using Updatable Lookup Arguments
- https://eprint.iacr.org/2024/840
How (Not) to Simulate PLONK
Constructs a simulator for the patched version of PLONK and prove that it achieves statistical zero knowledge.
- https://eprint.iacr.org/2024/848
Constant-Round Arguments for Batch-Verification and Bounded-Space Computations from One-Way Functions
- https://eprint.iacr.org/2024/850
Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk
- https://eprint.iacr.org/2024/854
Indistinguishability Obfuscation from Bilinear Maps and LPN Variants
Construct an indistinguishability obfuscation (IO) scheme from the sub-exponential hardness of the decisional linear problem on bilinear groups together with two variants of the learning parity with noise (LPN) problem, namely large-field LPN and (binary-field) sparse LPN.
- https://eprint.iacr.org/2024/856
Interests
Why There’s No ZK in Bitcoin: The Missing Pieces
Briefly introduced the significance and current development status of the bitcoin ecosystem of zk technology.
- https://www.youtube.com/live/GrSCZmFuy7U
BitVM: Smarter Bitcoin Contracts
-
BitVM 为比特币开启了更加智能的合约功能.
-
使用场景: 目前看来主要是用于 Layer 2 的 Bridge
-
不需要软分叉就能实现 BitVM
-
https://www.youtube.com/live/VIg7BjX_lJw?si=djNaeeufQ6Pq0oIl
-
https://harryx1x1.fun/2024-05-29/bitvm/
Highlights
ZKProof 6 in Berlin
- https://zkproof.org/events/zkproof-6-berlin/
Open-Binius by Ingonyama
Open-source hardware IPs for accelerating ZK proofs over binary fields.
- https://github.com/ingonyama-zk/open-binius
Sonobe BTC
Using folding schemes for a provable bitcoin light client. Folding and proving 100,000 Bitcoin blocks with Nova via Sonobe library!
- https://github.com/dmpierre/sonobe-btc
ZKThreads: A canonical ZK sharding framework for dApps
an application-level component allowing users to locally prove a batch of transactions and update the canonical state.
- https://ethresear.ch/t/zkthreads-a-canonical-zk-sharding-framework-for-dapps/19619
SNARKnado
SNARKnado 用于验证比特币上的 SNARK,用基于SNARK的更像电路的协议取代了BitVM的RISC-V抽象。通过这种优化,可以将挑战-响应轮次减少到四个,从而将现有 BitVM RISC-V 设计改进了 8 倍以上。然而,与 BitVM2 不同的是,SNARKnado 不支持无需许可的挑战。
- https://www.alpenlabs.io/blog/snarknado-practical-round-efficient-snark-verifier-on-bitcoin
Expander-rs
The Expander-RS cryptography library,is the open source rust version of Expander.
- https://github.com/PolyhedraZK/Expander-rs
Updates
Noir v0.29.0 重大变化
- use distinct return value witnesses by default
- Bit shift is restricted to u8 right operand
- https://github.com/noir-lang/noir/releases/tag/v0.29.0
Papers
Speeding Up Multi-Scalar Multiplications for Pairing-Based zkSNARKs
Revisiting the recent precomputation-based MSM calculation method proposed by Luo, Fu and Gong at CHES 2023 and generalize their approach, presented a general construction of optimal buckets. This improvement leads to significant performance improvements.
- https://eprint.iacr.org/2024/750
More Embedded Curves for SNARK-Pairing-Friendly Curves
Showing how the problem of finding families of embedded curves is related to the problem of finding optimal formulas for subgroup membership testing on the pairing-friendly curve side. Then apply Smith's technique and Dai, Lin, Zhao, and Zhou criteria to obtain the formulas of embedded curves with KSS, and outline a generic algorithm for solving this problem in all cases; Provide two families of embedded curves for KSS18 and give examples of cryptographic size.
- https://eprint.iacr.org/2024/752
Breaking Verifiable Delay Functions in the Random Oracle Model
Showing that VDFs with imperfect completeness and non-adaptive computational uniqueness cannot be constructed in the pure random oracle model (without additional computational assumptions).
- https://eprint.iacr.org/2024/766
Clap: a Rust eDSL for PlonKish Proof Systems with a Semantics-preserving Optimizing Compiler
- https://arxiv.org/abs/2405.12115
The Ouroboros of ZK: Why Verifying the Verifier Unlocks Longer-Term ZK Innovation
Researchers from Matter Labs outline a research program and justify the need for more work at the intersection of ZK and formal verification research.
- https://eprint.iacr.org/2024/768
Instance-Hiding Interactive Proofs
The instance-hiding property requires that the prover should not learn anything about x in the course of the interaction. Investigating the properties and power of such instance-hiding proofs.
- https://eprint.iacr.org/2024/776
Doubly-Efficient Batch Verification in Statistical Zero-Knowledge
- https://eprint.iacr.org/2024/781
SmartBean: Transparent, Concretely Efficient, Polynomial Commitment Scheme with Logarithmic Verification and Communication Costs that Runs on Any Group
- https://eprint.iacr.org/2024/785
A Note on Zero-Knowledge for NP and One-Way Functions
- https://eprint.iacr.org/2024/800
Highlights
zkSNARKs in the ROM with Unconditional UC-Security
This paper proves that there exist zkSNARKs in the random oracle model (ROM) that unconditionally achieve UC-security.
- https://eprint.iacr.org/2024/724
Relativized Succinct Arguments in the ROM Do Not Exist
This paper proves that relativized succinct arguments in the ROM do not exist. The impossibility holds even if the succinct argument is interactive, and even if soundness is computational (rather than statistical). Relativized SNARGs are a powerful primitive that, e.g., can be used to obtain constructions of IVC (incrementally-verifiable computation) and PCD (proof-carrying data) based on falsifiable cryptographic assumptions. This results rule out this approach for IVC and PCD in the ROM.
- https://eprint.iacr.org/2024/728
Bain Capital Crypto Whiteboards
David Wong关于MPC (Multi-Party Computation) & Shamir Secret Sharing (SSS)的系列白板介绍视频。
- https://www.youtube.com/playlist?list=PLRSMpO6IlBK1p3GMhbWEBmVfOFL-Fs4g1
Updates
DelphiusLab 发布 ZKWASM-Book
- https://zkwasmdoc.gitbook.io/delphinus-zkwasm
Jolt 更新路线图
- https://jolt.a16zcrypto.com/tasks.html
A proof-of-concept implementation of KiloNova
- https://github.com/FranklinZty/KiloNova-poc
Noir v0.28.0
新的 min
和 max
函数简化了数值比较
新的 as_array
方法简化了从切片到数组的转换
新的 BarretenbergVerifier
类加速了证明验证,并支持验证密钥加载
- 变更日志: https://github.com/noir-lang/noir/releases/tag/v0.28.0
- 最新安装版本: https://noir-lang.org/docs/getting_started/installation/
Learning
图解 Lasso
看这个图能对 Lasso 有个框架的认识
- 图: https://excalidraw.com/#json=rxe_CEVy9pKi1OO6YaUKr,uWoUBAq26lkKj1akg5FbRg
- 对应的视频 https://www.youtube.com/watch?v=iDcXj9Vx3zY
为什么 Prover 不能在 Groth16 中作弊
这篇文章详细探讨了 Groth16 证明系统中的 Prover 为什么无法作弊,并且以一种与原始论文不同的方式证明了 Groth16 的 knowledge soundness 的性质。
- https://hackmd.io/@chokermaxx/S1rh7EGeR
Notes on Collaborative zk-SNARKs
介绍 co-SNARKs。In Collaborative zk-SNARKs (co-SNARKs), the 3 parties , and each hold a piece of the secret data (secret witness ). They will then interact with each other into this MPC protocol to generate a single which is a zk-SNARK.
- https://www.leku.blog/co-snarks/
Binyi Chen: LatticeFold - A Lattice-based Folding Scheme and Applications to Succinct Proof Systems
Binyi Chen 在 CMU Cylab Crypto Seminar 再次讲解 LatticeFold
- https://www.youtube.com/watch?v=pre-nW3jawM
“Is Bandersnatch for Real?” by Antonio Sanso
presents a procedure to construct parameterized families of prime-order endomorphism-equipped elliptic curves that are defined over the scalar field of pairing-friendly elliptic curve families such as Barreto–Lynn–Scott (BLS), Barreto–Naehrig (BN) and Kachisa–Schaefer–Scott (KSS), providing general formulas derived from the curves’ seeds.
- https://www.youtube.com/watch?v=aeDMk1XNzuw
A summary on the FRI low degree test
Polygon Labs的Ulrich Haböck对 [BSBHR18a]、[BSCI+20] 和 [BSGKS20] 等文献中的FRI low degree test和DEEP algebraic linking等技术进行了非正式的总结。总结基于[BSCI+20]带来的最新的健全性分析,讨论了实际安全参数的设置,FRI如何转化为多项式承诺方案,以及列表解码机制中DEEP采样的健全性。这篇文章能够帮助初学者快速理解FRI相关的技术要点和安全性设置。
- https://eprint.iacr.org/2022/1216
Highlights
Building Cryptographic Proofs from Hash Functions
Alessandro Chiesa 和 Eylon Yogev 关于密码证明系统的重量级新书。其未来的历史地位恐怕不低于 Justin Thaler 的 Proofs, Arguments, and Zero-Knowledge。
This book provides a comprehensive and rigorous treatment of cryptographic proofs based on ideal hash functions. This includes notable constructions of SNARGs (succinct non-interactive arguments) based on ideal hash functions. For example, STARKs (scalable transparent arguments of knowledge) are an example of such SNARGs.
- https://hash-based-snargs-book.github.io/
两种新的阈值加密方案
- Silent Threshold Encryption 第一个方案不使用 iO/WE,完全避免了使用交互式设置。各方独立地生成其公钥对,但需要一个 KZG CRS(可验证的 zk-SNARK 公共参考字符串)。要进行加密,你只需要下载委员会的公钥+可以在加密时选择阈值,这还为我们提供了具有静默设置的时间锁加密。
- Batched Threshold Encryption 第二种方法可以实现批量解密密文,而这种方法的通信量与批量大小无关。通常情况下,如果有一个由 n 个参与方组成的委员会,他们需要通过 O(nB) 的通信量来解密 B 个密文,即每个参与方需要针对每个密文发送一条消息。但是,这个方法仅需要 O(n) 的通信量,即总体通信量与参与方数成正比,与密文数量无关。 这种方法特别适用于加密的交易池场景,例如,在区块链技术中,需要快速解密整个区块的情况。简单来说,就像是无论我们要解密多少数据,所需要的沟通工作量都相当于只解密一个数据那么多。这样可以大大减少解密过程中的通信成本,提高整体效率。
Reckle Trees: Updatable Merkle Batch Proofs with Applications
Reckle trees, a new vector commitment based on succinct RECursive arguments and MerKLE trees. Reckle trees’ distinguishing feature is their support for succinct batch proofs that are updatable—enabling new applications in the blockchain setting where a proof needs to be computed and efficiently maintained over a moving stream of blocks. Assuming enough parallelism, our batch proofs are also computable in 𝑂(log𝑛) parallel time— independent of the size of the batch.
- https://www.youtube.com/watch?v=lcWQHYox0qc
- https://eprint.iacr.org/2024/493.pdf (已被CCS'24录用)
Polyhedra 开源基于 GKR 的证明系统 Expander
证明者性能在 Apple M3 Max CPU 上可达到每秒生成 5000 个 Keccak 哈希的证明。
- https://expander.polyhedra.network/
- https://github.com/PolyhedraZK/Expander
Updates
Binius: highly efficient proofs over binary fields 翻译及补充
来自 Harold & Jade 的翻译,并在原文的基础上补充了 RS-code 和二进制扩域相关的内容,V 在原文中简单介绍了 Plonky2 等协议来引出在小域上进行计算的优势,相信读者可以通过 Simple Binius ,Binary fields 和 Full Binius 这三节来完整的体会到 Binius 的威力和 Overview 。原文中的 Plonky2 部份由于不影响后续的理解,暂时没有校对。同时欢迎读者们通过在译文的仓库中留下 issue 来进行提问和交流。
zkStudyClub: Accumulation w/o Homomorphism (Wilson Nguyen - Stanford, William Wang - NYU)
首个仅使用基于对称密码假设(Merkle Tree)的非同态向量承诺来构造的 Folding 方案。
- https://www.youtube.com/watch?v=mQ0hZeJMAgo
- https://eprint.iacr.org/2024/474
SP1 Testnet 的几个关键特性
SP1 Testnet 是一种针对开发者的快速、功能完整的零知识虚拟机(zkVM)。文章重点介绍了 SP1 Testnet 的几个关键特性:
- 性能与递归:SP1 Testnet 现在支持高效的 STARK 递归和链上验证,这使得它可以在任何 EVM 兼容链上快速生成端到端的零知识证明。
- 开源与 Rust 支持:SP1 是唯一一个完全开源的 zkVM,支持 Rust 标准库,开发者可以使用现有的 Rust crates 编写可验证的程序。
- 预编译中心架构:通过针对常见操作(如哈希、椭圆曲线运算等)的预编译中心架构,SP1 显著提高了区块链应用(如 ZK Rollups 和 ZK 桥接)的性能。
- 性能基准测试:文章还提供了 SP1 与其他 zkVMs(如 Risc0 和 JOLT)的性能比较,展示了 SP1 在生成 EVM 可验证证明的速度和效率上的优势。
Ingonyama 的新服务 ZaKi
本文介绍 ZaKi 如何通过使用最新的 ICICLE 库和专门配置的硬件,来提升零知识证明的计算效率和降低成本。
重点内容包括:
- 技术优势:ZaKi 利用 ICICLE 库(特别是其新变种 ICICLE-NG,无需 GPU 即可使用)来优化 ZK 特定工作负载的过渡,支持高核心计数 CPU 和尖端 Nvidia GPU。
- 性能提升:通过硬件加速,ZaKi 在最坏情况下比其他实例在有效成本性能上提高了多达 12.7 倍。
- 开发者支持:ZaKi 为开发者提供了一个已经优化好的托管环境,避免了硬件设置和配置的复杂性,使团队可以专注于他们的 ZK 应用。
- 持续改进和支持:随着开发者对平台越来越熟悉,他们将从 ICICLE 软件和硬件配置的持续更新中受益,后台处理这些更新,无需开发者承担常见升级的负担。
- article link
- Related info
Verifiable Compute: Scaling Trust with Cryptography
一篇系统性介绍可验证计算功能及用例的文章。
A High-Level Technical Overview of Fully Homomorphic Encryption
Google工程师关于全同态加密最新最全的介绍。
- https://www.jeremykun.com/2024/05/04/fhe-overview/
Trustless Audits without Revealing Data or Models
这篇论文提出了一个 ZkAudit 协议,支持证明 ML 模型或者数据集,目前支持 ImageNet 等数据集和 DNNs 等模型。
- http://arxiv.org/abs/2404.04500
一个有意思的中心化地理位置猜测游戏。
玩家们试图在地图上准确指出一个隐藏的位置,但与传统的 GeoGuessr 不同,他们的确切猜测保持隐藏。通过零知识证明,游戏验证猜测是否落在指定的接近实际位置的范围内。 程序采用 Noir 开发并编译,并且包含一个应用所需要的前端部分代码,对于想学习一个完整 app 开发的同学可以试试。
Highlights
Binius
highly efficient proofs over binary fields
来自 Vitalik Buterin,指明方向:
- https://vitalik.eth.limo/general/2024/04/29/binius.html
Tower field and commitment in binius
来自 Wang Yao 的分享,学习 binius 的材料:
- 视频链接 https://youtu.be/X_kmmbBY6rQ
- Ref:https://www.ulvetanna.io/news/binius-hardware-optimized-snark
- Paper:https://eprint.iacr.org/2023/1784
Updates
On Proving Pairings
基于配对的协议被广泛使用,但在实际应用中配对计算成本过高依然是一个很大的问题。本文提出了一种高效的方式去证明椭圆曲线配对关系。
-
配对验证最后的求幂步骤可以被替换为更高效的“residue check”,并且合并到“Miller loop”中。
-
通过预计算必要的行来降低“Miller loop”的成本,并且当预先固定第二配对参数时,会相当高效。
-
如何通过组合商来改进[gar]的协议,从而更有效地证明更高阶关系,这些技术也自然延续到配对验证中。
Vision Mark-32: A ZK-Friendly Hash Function Over Binary Tower Fields
- Irreducible(原 Ulvetanna)和 3MI Labs合作,提出新的 ZK 友好哈希函数--Vision Mark-32。这是一种面向算术化的哈希函数,专为与 Binius 一起使用而设计。Vision Mark-32 是 Vision 结构的一个特殊实例化,利用二进制塔域的独特性质来实现硬件的高性能实现,同时在 Binius 证明系统中保持高效可验证性,是对 Binus 论文提出的 Grøstl 哈希函数进一步地可以降低验证成本和证明大小的优化。
- Link
- paper
Keelung
一个基于 Haskell 的 ZK 开发的工具. 得益于 Haskell 强大的函数式编程能力,你可以通过基础的内置数据类型,复合成复杂的数据结构。目前基隆的默认后端使用的是 Aurora,开发者正在支持 Groth16 和 PLONK。0.21 版本已经支持了绝大部份的算法,比较,位操作。0.22 版本将支持 slicing 和 joining。喜欢 Haskell的同学可以尝试一下。
Proof of Passport
护照证明让用户可以扫描政府颁发的护照中的 NFC 芯片,并证明 zk-SNARK 中签名的正确性。这解锁了两个有趣的用例:
-
对于抗女巫攻击,护照证明可以提供唯一身份的来源。
-
为了身份和隐私,护照证明允许选择性地披露私人数据。例如,用户可以透露他们的国籍或出生日期,而无需透露任何其他私人信息。
Justin Thaler 关于 Sumcheck/LASSO/JOLT 最新的两个播客
- https://zeroknowledge.fm/322-2/
- https://a16zcrypto.com/posts/article/17-misconceptions-about-snarks/
Introducing Expander: The Fastest GKR Proof System to Date
Polyhedra Network 推出了新的开源 ZK 证明系统 Expander,其生成速度打破现有的世界纪录,为实现 ZKVM 和 ZKML 提供了基础设施。
Expander 使得任何规模的项目都能高效、安全、低成本地处理数据。同時,它为 AI Layer1 的实现提供了强大的支持,并且让用户使用手机支持 AI 分布式算力,推动 AI 和区块链技术的深度集成。
Highlights
理解 Lasso
- Github Link 郭老师的理解 Lasso 系列文章,将 Lasso 总共分成四个不同的 Indexed Lookup Arguments 协议:
- Lookup Arguments based on Offline Memory Checking
- Lookup Arguments based on Spark
- Lookup Arguments based on Surge
- Lookup Arguments based on Sparse-dense Sumcheck
并单独对这些协议进行了解析。
Updates
Ulvetanna 现已更名为 Irreducible
Irreducible 最近发布的基准测试显示,在没有使用 Binius 的情况下,他们的 Polygon Hermes FPGA 证明器 (Plonky2) 就要比 GCP 参考实例快 40%,而且比 spot 用例更便宜。 这个基准测试通过将低度扩展和叶哈希计算迁移到 FPGA 上,同时在一个 64 核 CPU 上完成其他所有操作。
出处:
- https://twitter.com/gakonst/status/1783589455271739678
相关链接:
- https://www.irreducible.com/posts/becoming-irreducible
- https://www.irreducible.com/posts/accelerating-polygon-zkevm
Hadamard Product Argument from Lagrange-Based UnivariatePolynomials
这篇论文提出了一种新方案,用于证明两个向量的 Hadamard 积关系,作为基于一元多项式的 SNARKs 的一个子协议。证明者使用线性密码学操作生成包含对数场元素的证明。验证需要对数密码学操作和固定数量的双线性群配对。该方案的构建基于 Lagrange 形式的 KZG(Kate, Zaverucha和Goldberg在2010年Asiacrypt上的工作)承诺和折叠技术。通过在 Lagrange 形式的一元多项式上使用折叠技术,构造了一个内积协议,通过精心选择适合折叠技术的随机多项式,从内积协议构造了 Hadamard 积协议,提供了一种验证线性代数关系的替代方法,该协议的具体证明大小优于以往工作。
Noir 更新到 v0.27.0
重大变更:Brillig 实现了类型化的内存
这一版使 "Brillig" 更符合 AVM 的标准,并且删除了 arithmetic.rs
中的截断操作。
- 相关链接:https://github.com/noir-lang/noir/releases/tag/v0.27.0
一季度 ZK 前沿研究汇总
- STIR: Reed–Solomon Proximity Testing with Fewer Queries
- Beyond the Circuit: How to Minimize Foreign Arithmetic in ZKP Circuits
- Circle STARKs
- SoK: What don’t we know? Understanding Security Vulnerabilities in SNARKs
- zkPi: Proving Lean Theorems in Zero-Knowledge
- Parallel zkVM
出处:
- https://twitter.com/zkv_xyz/status/1782832332862263454
zkSummit 11 系列 talk 已全部上线
出处: https://www.youtube.com/playlist?list=PLj80z0cJm8QFy2umHqu77a8dbZSqpSH54
Updates
Are Verkle proofs ZK-friendly?
Daniel Lubarov探讨Verkle 证明的 ZK 友好性的文章。结论:与二进制 Merkle 证明相比,很难说哪个对 ZK 更友好,会归结为一堆实现细节.
Sonobe
Sonobe 是由 0xPARC 和 PSE 共同实现的一个模块化库,用于以Incremental Verifiable computation (IVC) 方式的折叠电路实例上。 Sonobe 是一个模块化库,用于以增量可验证计算 (IVC) 方式折叠电路实例。它具有多种折叠方案和决策器设置,允许用户选择最适合他们需求的方案。 当前已经实现的折叠方案包括Nova及CycleFold(包括链上验证代码),接下来会继续实现 HyperNova 和 ProtoGalaxy。 Sonobe 被认为是一项探索性工作,旨在推动折叠方案的实践方面并推进链上 (EVM) 验证。 但由于目前还尚未被审计,因此目前还尚不能用在产品开发上。
State of ZK Report
2024 Q1 的 State of ZK Report, 介绍了 ZK 在 Bitcoin 的应用, 提到了 SP1 的发布等.
zkWasm
Delphinus Lab开源了其zkWasm Prover,其基于Halo2对WASM指令集进行高度定制优化,支持Halo2 GPU加速、GWC和Shplonk两种多项式承诺方案,可在17秒内生成1百万WASM指令(NVIDIA 4090 GPU).
Highlights
https://github.com/a16z/jolt
a16z 开源的的一个新的zkvm, 实现了 lookup singularity,对于开发者扩展来说是一个非常好的消息。相比较大多数项目工作在31bit或者64, 其工作在一个256-bit field上,理论上可以实现更偏移的递归,并且保留了对未来64位数据的优化空间。
Quantum Algorithms for Lattice Problems
清华大学交叉信息研究院陈一镭助理教授提出了一个破解格密码的量子算法。该算法能够解决格上的近似最短向量问题(Approximate Shortest Vector Problems in Lattices, 简称 Lattice Problems)以及与之等价的带错误学习问题(Learning with Errors,简称LWE)。这项工作仍在同行评议中。如果被验证为正确,将为这个悬而未决的问题给出肯定的答复。它在科学上的意义将是双层的: 第一,这将是自30年前 Peter Shor 提出大数分解的量子算法以来,最重要的量子算法突破。第二,这将对美国NIST过去10年来选择后量子密码设计的思路产生颠覆性的影响,因为多数选出的后量子密码方案都是基于 Lattice Problems 或 LWE。陈一镭的工作无疑将使他们安全性受到质疑。(原文https://mp.weixin.qq.com/s/IdSmmJI2npQeRORRHHAScQ)
Updates
LaZer: a Lattice Library for Zero-Knowledge and Succinct Proofs
一个便于协议设计师轻松使用基于格的SNARKs和零知识证明(ZK-proofs)的库。该库的基础是代数运算,最近效率最高的基于格的SNARKs和零知识证明就是建立在这些运算之上的。这些底层实现以及零知识协议都是用C语言编写的。随后,创建一个Python封装器,使协议设计师能够轻松创建实例和生成证明,同时使用高效的C语言操作,以便能够完全在Python中编写他们的协议,而不会在效率上损失太多
A library that allows for easy consumption of lattice-based SNARKs and ZK-proofs by protocol designers. The foundation of the library consists of algebraic operations upon which the most efficient recent lattice-based SNARKs and ZK proofs are built. These low-level implementations, as well as the ZK protocols, are written in C. Then create a Python wrapper that allows protocol designers to easily create instances and create proofs, as well as use the efficient C operations to be able to write their protocols entirely in Python without sacrificing much in the form of efficiency.
A Time-Space Tradeoff for the Sumcheck Prover
这篇文章介绍了基于 multilinear sumcheck 协议的一类证明算法 Blendy,它实现了新的时间与空间的权衡算法。已有的证明算法中,时间和空间使用规模要么需要时间上O(NlogN),空间上O(logN),要么需要时间上O(N)空间上O(N)。新算法 Blendy 将n轮分为k个阶段来处理,通过在不同的阶段使用预计算和分阶段处理来优化性能,有效地平衡了执行时间和所需存储空间,最终实现了运行空间上需要O(kN) ,而空间上仅需要O(N^{1/k})。
Proving the correct execution of concurrent services in zero-knowledge
Jolt 中为了处理对 RAM(和寄存器)的读/写,使用了 Spice 内存检查证明,该证明与 Lasso 本身密切相关。它们都基于离线内存检查(offline memory checking)技术,主要区别在于 Lasso 支持只读内存,而 Spice 支持读写内存,因此开销更高。
可验证推理的水印和指纹的综述
一篇关于 AI 模型推理的可验证性的总综述,这个问题即怎么确保你这个推理结果是由某个特定的模型推理出来,这点无论是对私有大模型的订阅用户,或者是去中心化大模型服务商来说都很重要。 文章提出了不同于 zk 的另一个传统方法,即水印方法。有兴趣的同学可以根据这篇综述涉及的链接继续阅读。
Highlights
基于对称密钥假设的有上限深度累积方案及其优化
所有以往的累积方案(accumulation schemes)都依赖于同态向量承诺(homomorphic vector commitments),这些承诺的安全性基于公钥假设。本文中提出通过构建一个来自非同态向量承诺的累积方案,该方案仅基于对称密钥假设(例如 Merkle 树)。此方案通过利用对承诺向量的错误纠正(error-correcting)编码进行抽查(spot-checks)来克服对同态的需求。与以往的累积方案不同,此方案仅支持有限数量的累积步骤。但即使深度有上限的累积方案(accumulation schemes),也足以构建携带证明的数据(IVC的泛化)。另外本文还展示了几种对 PCD 构建的优化,显著提高了效率。 本文的主要贡献主要包括: (1)引入了一种新的有上限的深度累积方案(bounded-depth accumulation schemes)概念,支持有限数量的累积。 (2)有上限的深度的携带证明数据(PCD),根据已知结果[BCCT13],足以获得多项式深度的增量可验证计算(IVC)。 (3)从任意(非同态的)向量承诺方案(例如基于随机预言机的 Merkle 树)和任何线性代码构建了高效的有上限的深度累积方案。这种 PCD 方案需要更少的证明者开销,并实现了可信的后量子安全。 (4)为实例化的 PCD 方案提供了几种优化,包括支持“批量”累积('batch' accumulation)、从低深度 PCD 到 IVC 的新低开销编译器,以及一种新的混合 PCD 方案,将低深度 PCD 与任何基于 SNARK 的 PCD 方案结合。
a note on the elliptic curve pairing checks in zero knowledge proofs
这篇文章主要探讨了零知识证明中椭圆曲线配对检查的一些重要概念和应用。它着重介绍了在零知识证明系统中使用椭圆曲线配对检查的技术,并深入讨论了其在密码学中的作用和应用。文章通过对配对检查的基本原理、常见应用场景以及一些相关概念的解释,为读者提供了对这一领域的深入理解和探索的入口。
Do You Need a Zero Knowledge Proof?
如果你正在探索零知识证明(ZKPs)的世界,想要了解它们如何在不同情境下发挥作用,我强烈推荐你阅读这篇文章。
它批判性地分析了 ZKPs 的适用性,将它们分为几种类型:SNARKs(简洁的非交互式知识论点)、提交然后证明 ZKPs、MPC in-head 和 Sigma 协议。每种类型都提供了不同的权衡和好处。文章通过一种创新的流程图方法,帮助你确定最适合你需求的ZKP系统,并提出了一套技术应用要求。它深入探讨了外包计算、数字自主身份和网络中的 ZKPs 这三个主要用例,提供了关于 ZKPs 其他应用的高层次概述,并探讨了它们在更广泛领域内的含义和机会。
这篇文章能够帮助你理解选择合适的 ZKP 系统所涉及的决策过程,明确这些加密工具何时以及如何在不同领域中有效使用,以及何时应该避免使用这些工具。对于那些寻求深入了解 ZKPs 潜力和局限的人来说,这篇文章是一份宝贵的资源。
Updates
Aleo IP core.
最近 Ingo 公布了关于 Aleo 的最新产品 - Aleo IP core。 Aleo 首创了 KZG 谜题的概念,其中,作为 Aleo 共识机制的一部分,证明者竞相解决 ZK 币库谜题。最具成本效益的证明者可以获得更多奖励。这种独特的机制是迄今为止唯一能够产生公平竞争环境和对 ZK 证明的足够需求的实例 Aleo IP 是面向运行 Aleo 测试网难题的 ASIC 平台。Aleo IP 采用参数化 RTL 设计,可实现最先进的性能和功效。该设计是使用与运行频率为 1.2 GHz 的 TSMC 7nm 工艺兼容的工具进行综合的,包括单个矿工管理器负责用户界面和整个逻辑的管理与Aleo 核心数量。 链接https://medium.com/@ingonyama/product-announcement-aleo-ip-core-e7181ca31094
bitvm1 与 bitvm2 的比较
bitvm1版本: Verifier 不断要求 Prover 揭示他指定步骤的中间状态,从而在 logN 次挑战之后可以确认 Prover 作恶了没。
- 两方参与挑战,链上交互次数为logN次
- 链上采用的验证的是 RISC_V 指令集执行的不正确性
- 在网络开始之前需要 Prover 和 Verifeir 提前的 presign,网络一经启动就无法再更改
bitvm2版本: Prover直接在链上用一笔交易揭示所有的中间状态之后,如果任何人发现揭示的某一步中间状态执行不正确都可以通过 f(x)!=y 的逻辑来解锁对应的Prover质押金额
- 任何人都可以 premissionless 的参与挑战 prover
- 链上交互次数大大减少
- 不再验证采用 RISC_V 指令集,而是采用在链上写一个原生的 zk verifier
- 因为每个 tapleaf 的 script 大小是 400kb(比特币节点限制),意味着链上每 400kb 的验证 script 就 prover 需要揭示一个中间状态,同时又因为缺少 op_loop 指令,op_mul 指令以及 op_cat,会导致比特币无论是在做 groth16 verifier (椭圆曲线运算贵,并且 field size 是 254bit )或者在做 stark verifier (计算 Merkle Path 的困难)都会出现比较多中间状态的问题,这样 prover 需要花费更多的手续费来证明他是对的。 -link
其他
-
Constant-Size zk-SNARKs in ROM from Falsifiable Assumptions - Roberto Parisella:https://www.youtube.com/watch?v=VPAA85Mtt2s
-
Great work by @weikengchen: We now have finite field arithmetic for the M31 and Baby Bear fields, as well as for their degree-4 extensions.These are the basis for implementing STARK verifiers on Bitcoin.
- link: https://twitter.com/robin_linus/status/1771809562246463577
Updates
Perfect Zero-Knowledge PCPs for #P
这周有一些关于计算复杂性理论的讨论出来, Kurt Pan 也写了一个关于PSPACE的随笔。而这篇文章讨论了一个针对 #P 族编程语言的 ZK PCP 构造的问题。如果对PCP陌生的同学,可以看看链接2的文章, 交互式证明系统(IP)的零知识性质可以细分为完美零知识PZK, 统计零知识SZK, 计算零知识CZK。历史上的一些重要理论结果都与此相关,比如:CZK = IP = PSPACE,PZK-MIP = MIP = NEXP, MIP*=RE,PCP定理等。一个ZK-PCP就是一个具有零知识性的PCP。类似的,一个PCP证明系统也可以细分成PZK,SZK,CZK(注意目前认为ZK-IPs和ZK-PCP无直接关系)。即使现在也有不错的相关理论结果出现,比如SZK-PCP[poly, poly] = NEXP,但对于PZK-PCP类的结构依然不甚清晰,是否有BPP之外的语言存在PZK-PCP构造依然是开放问题。
这篇论文是来自资深理论密码学家/计算复杂性理论家Tom Gur和Nicholas Spooner的一篇重要工作:为任意#P语言构建出了PZK-PCP,从而得到了首个BPP外语言的PZK-PCP构造,且同时对任意多项式时间恶意验证者实现了非自适应性和(完美)零知识。
论文基于 ZK sumcheck IOP 来实现:为了验证在上的(对于算术电路F),证明者发送一个随机的 mask ,使得;验证者选择一个随机数;然后他们对 进行。交互过程在这里很重要, 如果我们试图通过让证明者为多个不同的发送的证明来消除交互,那么零知识性将会丧失(因为sumcheck是线性的)。而论文利用了求和检查声明的置换不变性来打破这种线性关系。
Towards Verifiable FHE in Practice
Zama团队关于可验证FHE最新的一篇工作。FHE虽然可以对密文空间数据进行任意计算,但如果不能对该计算生成计算完整性证明,则无法在恶意敌手存在的环境下(比如云计算)得到真正的落地应用。在这项工作中,Zama团队使用plonky2设计了一个证明bootstrapping操作(FHE中最重要的操作)的算术电路,从而首次在实践中对FHE使用 SNARK 进行了计算完整性验证。在 AWS C6i.metal 实例上证明该电路,生成时间大约20分钟, 证明大小约为 200 kB,验证时间不到 10 毫秒。该结果表明该技术路线可行,但依然是一个很慢的结果,未来改进空间依然巨大。
BitVM ZK Verifier
BitVM 最近开源了他们的 ZK Verifier,以比特币上证明任何事情为目标,其主要流程如下:
- 用 RISC0 客户端程序创建STARK证明
- 将STARK证明包装成Groth16证明,并在在C语言中编写其对应的Groth16验证器
- 将验证器编译为rv32i指令集,从而转化为BitVM指令集
就第二部来看, 似乎如果有更多的工具可以减少开发 verifer的工作会更靠。
Client-side proof generation
这篇文章探讨了用于证明私有函数正确执行的客户端(资源受限)证明生成,并解释了它与通用rollup的证明生成的区别。隐私保护的zk-rollup的证明生成与通用zk-rollup有很大的区别。
这篇文章比较简单易懂,对于zk入门学习者可以参考文中的例子增加对 zk 的理解。笔者感兴趣的地方在于 Goblin Plonk(可能笔者之前没有了解过),他允许允许资源受限的证明者构建具有多层递归的zk-snark,其核心逻辑是将每个递归层的昂贵操作(如椭圆曲线操作)被推迟到最后一步,而不是在每个层次上执行。链接2是对Goblin Plonk的进一步参考资料。
Universal Proof Aggregation protocol
NEBRA 发布了Universal Proof Aggregation protocol (通用证明聚合协议),使用零知识证明本身来扩展零知识证明验证。其核心思想是使用高效的递归SNARK(IVC/PCD)来获得近乎无限量的递归。这意味着可以在链外递归地证明多个零知识证明,并在链上仅验证单个聚合证明。
一些学习资料
Getting Started with RISC Zero