Questions tagged [blockchain]
18 questions
4
votes
2 answers
Can blockchain be considered a cryptographic primitive?
This might be a silly question. But since more and more people simply use public blockchains as a secure ledger to store mutually agreed information to secure their high level applications, could we abstract blockchains as a secure ledger primitive…
Chunchi Liu
- 97
- 5
3
votes
0 answers
Linear Verification time for zk-SNARKs?
I've come across this paper that benchmarks the efficiency of zk-SNARKs, zk-STARKs and Bulletproofs.
The table on page 8 states that the verification time for zk-SNARKs is linear in the size of the computation:
Specifically they refer to Groth16…
Niko Wolf
- 111
- 4
2
votes
0 answers
The state of the art in zero-knowledge proofs
I am not aware of modern cryptographic protocols, hence my next questions may be too stupid for experts. If so, I am sorry in advance. Instead, I am an academic researcher in (fast secure implementation of) elliptic curve cryptography, so I want to…
Dimitri Koshelev
- 495
- 2
- 8
1
vote
0 answers
Can I use Bitcoin blockchain's timestamp as the witness of a statement?
Suppose that I create a statement commitment at a time for a someone.
In which, I have already stated it at a specified timestamp, but I will confess it in the future.
To concinve her that I ever said it before, can it be done where I hash my…
Muhammad Ikhwan Perwira
- 375
- 2
- 11
1
vote
0 answers
Could a Blockchain-Based System with Self-Replicating and Self-Destructing Nodes Work?
Would it be feasible to create a blockchain-based system where data hashes are stored in the blockchain, replicated across all nodes, and protected by a self-destruct mechanism? In this system, if a node tries to modify or delete a hash, it triggers…
cawani_
- 11
- 2
1
vote
0 answers
Advantages of a private block chain vs. a database, signatures and Merkle Damgard / similar Constructions
If I understood correctly, private blockchains are either managed/validated by a centralized trusted party or a few validators. All in all, a 51% attack should be possible due to the small network size.
For example, this is acknowledged by this…
user13182493
- 11
- 1
1
vote
1 answer
How do non-Turing complete languages like Clarity support sha256 hashing, which internally relies on loops?
In non-Turing complete languages like Clarity (used for writing smart contracts on the Stacks blockchain), loops and recursion are intentionally excluded to ensure predictability and prevent non-termination. However, these languages still provide…
Nerses Asaturyan
- 15
- 2
1
vote
0 answers
How can the validity of signatures in layer-2 transactions be proven in zk-rollup?
I have many questions about the details of using zk-SNARK technology in zk-rollup:
How can the validity of signatures in layer-2 transactions be proven in zk-rollup?
In zk-rollup, is a single large zero-knowledge proof circuit used to prove the…
user109993
- 135
- 5
0
votes
0 answers
Key Leakage in Shamir's Secret Sharing in Blockchain
The Data Owner has a large file (100MB or more) and wants to share this file with multiple Data Requesters. However, the Data Owner does not know the Data Requester's public key initially.
The Data Owner starts by chunking the file into M chunks,…
master boy
- 1
- 1
0
votes
1 answer
Open Problems in Cryptography for a Capstone Project
I am looking for open research problems in cryptography that would be suitable for a capstone project. My focus is on practical implementations or theoretical advancements in areas like:
Zero-Knowledge Proofs (ZKPs)
Multi-Party Computation…
Nerses Asaturyan
- 15
- 2
0
votes
1 answer
Dynamic Hash Size in SHAKE256: Pros, Cons, and Security of the Structure
The concept involves the first round of SHAKE256 generating a hash of dynamic length (ranging from 256 to 512 bits). The length is determined based on certain parameters, such as a combination of nonce and timestamp.
As an example, let's consider a…
blockchainman
- 33
- 3
0
votes
0 answers
Why is drand's protocol better than using blockchain hashes to generate publicly verifiable randomness?
I was looking into publicly verifiable randomness and noticed that there is a protocol called drand that uses a bunch of nodes that work together to release publicly verifiable randomness at regular intervals.
Why this such a complex protocol…
user1936752
- 778
- 1
- 4
- 17
0
votes
0 answers
Significance of The Account
What is the significance of the account in blockchain network? You can't derive public key from it, only thing you can do is to say that JoeBloggsAccountName is very likely derived from a certain public key. I understand that blockchains also act as…
vladimir_1969_2
- 21
- 6
0
votes
1 answer
What is the reason to use blocks in the first place?
I am not sure this question is really for this forum. But to be honest, I could not think of a better one.
This question is about blockchains in general. As far as I know, there is no site for general blockchain questions, only specific to ethereum,…
unsafe_where_true
- 171
- 5
0
votes
1 answer
Can Cryptographic Proofs Directly Attest to Function Call Results?
In systems where computations are performed in remote or potentially untrusted environments(e.g. Ethereum NaaS providers such as Infura), how can we gain confidence in the accuracy of the results? Zero-knowledge proofs (ZKPs) provide an intriguing…
MShakeG
- 101
- 2