zk-insights-20240922

Highlights

Friends don’t let friends reuse nonces

This blog post tells a cautionary tale of what can go wrong when implementing a relatively basic type of cryptography: a bidirectional encrypted channel, such as an encrypted voice call or encrypted chat. We’ll explore how more subtle issues of this type can arise in a network with several encrypted channels, and we’ll describe a bug we discovered in a client’s threshold signature scheme.

The galois library

A performant NumPy extension for Galois fields and their applications

RISC ZERO: Introducing Boundless: The Verifiable Compute Layer

Fermah

The Universal Proof Generation Layer

Aleo Mainnet is Here

powdr: a toolkit that helps build zkVMs and similar proof frameworks.

It has two main components:

  1. powdr-asm: an extensible assembly IR language to perform dynamic executions.

  2. powdr-PIL: a low level constraint language that allows you to define arithmetic constraints, lookups, etc. It includes a functional meta-constraint language to describe how constraints are generated.

Updates

ZK Day at Science of Blockchain Conference '24

Succinct Bootcamp Notes

Semaphore V4

Papers

LogRobin++: Optimizing Proofs of Disjunctive Statements in VOLE-Based ZK

Interactive Line-Point Zero-Knowledge with Sublinear Communication and Linear Computation

Untangling the Security of Kilian's Protocol: Upper and Lower Bounds

Eva: Efficient IVC-Based Authentication of Lossy-Encoded Videos

On the Complexity of Cryptographic Groups and Generic Group Models

FlashSwift: A Configurable and More Efficient Range Proof With Transparent Setup

Subscribe to ZK Insights and never miss a post.