Cryptography Algorithms by Massimo Bertaccini
Author:Massimo Bertaccini
Language: eng
Format: epub
Publisher: Packt Publishing Pvt Ltd
Published: 2022-01-20T00:00:00+00:00
Conclusions and the weaknesses of zk-SNARKs in Zcash
As we saw in the previous section, one of the weak points of this protocol can be found in QAP. As I have explained, Zcash has tried to overcome this problem using homomorphic evaluation, in other words, keeping the polynomials in blind. The issue is that homomorphic encryption usually causes bit-overflow; moreover, the protocols and schemes required to achieve fully homomorphic encryption are very complex. As you already know, my theory is that in cryptography, complexity is the enemy of security. I won't enter this debate now because it's not within the scope of the book to analyze the entire protocol of Zcash.
Imagine the scenario discussed in the Non-interactive ZKPs section based on the RSA problem. If I have to demonstrate to an expert that I hold the formula for an atomic bomb, then the experts will probably ask me to show something more than a hash function of the document, [m], that states the proof. The verifier will be convinced only when they get substantial proof. In other words, ZKPs are limited in the amount of evidence of knowledge they are able to provide.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4127)
Ego Is the Enemy by Ryan Holiday(3982)
Offensive Shellcode from Scratch by Rishalin Pillay(3620)
Exploring Deepfakes by Bryan Lyon and Matt Tora(3182)
Robo-Advisor with Python by Aki Ranin(2955)
Learning C# by Developing Games with Unity 2021 by Harrison Ferrone(2839)
Speed Up Your Python with Rust by Maxwell Flitton(2832)
Liar's Poker by Michael Lewis(2806)
Linux Command Line and Shell Scripting Techniques by Vedran Dakic and Jasmin Redzepagic(2784)
Agile Security Operations by Hinne Hettema(2782)
OPNsense Beginner to Professional by Julio Cesar Bueno de Camargo(2780)
Extreme DAX by Michiel Rozema & Henk Vlootman(2777)
Essential Cryptography for JavaScript Developers by Alessandro Segala(2717)
Elevating React Web Development with Gatsby by Samuel Larsen-Disney(2710)
AI-Powered Commerce by Andy Pandharikar & Frederik Bussler(2628)
Python for ArcGIS Pro by Silas Toms Bill Parker(2622)
Cryptography Algorithms by Massimo Bertaccini(2614)
Incident Response Techniques for Ransomware Attacks by Oleg Skulkin(2609)
Distributed .NET with Microsoft Orleans by Bhupesh Guptha Muthiyalu Suneel Kumar Kunani(2609)