SlideShare a Scribd company logo
1 of 45
Download to read offline
zkSNARKs in Ethereum,
and Baby ZoE
Privacy issues of
blockchain transactions
Why privacy is an issue
fundamental human right
necessary for people exercise unique moral
choices
privacy which our societies evolved around is
healthy, and makes it more resilient and more
humane
3
Why privacy is an issue
Industrial blockchain business requires
improved privacy before they can use
blockchain technology.
People do not want their contracts and
transactions be exposed to enemies,
competitors, criminals, hackers.
4
Why privacy is an issue
A company wants to protect information
regarding its supply chain from competitors
An individual doesn't want it publicly known
that she is paying a bankruptcy lawyer or a
divorce lawyer for advice
A family that wishes to shield from employers
and insurers, for fear of discrimination, the fact
that their child has a chronic medical condition
or genetic problem.
A wealthy individual who doesn't want criminal
elements to see their activities and possibly
attempt to extort value from them. 5
Why privacy is an issue
A trading desk, or other middleman company
between buyers and sellers of different
commodities, that wants to prevent getting cut
out of the trade.
Banks, hedge funds, and other types of financial
entities that trade financial instruments
(securities, bonds, derivatives); if external
agents can figure out what their position or
interest is, it can be used to the traders'
disadvantage and affect their ability to trade
well.
6
Anonymity should have unlinkability of pseudonyms
7
Anonymity should have unlinkability of pseudonyms
8
Anonymity should have unlinkability of pseudonyms
9
Adapt zero knowledge proof methodology
EIP 86 (account security abstraction) helps the
adaption
An highlight in Metropolis
move the logic for verifying signatures and
nonces into contracts, allowing
developers to experiment with new
signature schemes, privacy-preserving
technologies and modifications to parts of
the protocol without requiring further
hard forks or support at the protocol
level. Also allows contracts to pay for gas.
10
Zero knowledge proof
What is zero knowledge proof
A ZKP is a cryptographic technique which allows
two parties ( a prover and a verifier ) to prove
that a proposition is true, without revealing any
information about that thing apart from it being
true.
12
What is zero knowledge proof
completeness: if the statement is true, the
honest verifier (the one following the protocol
properly) will be convinced of this fact by an
honest prover.
soundness: if the statement is true, no cheating
prover can convince the honest verifier that it is
true, except with some small probability.
zero-knowledge: if the statement is true, no
cheating verifier learns anything other than the
fact the statement is true.
13
ZKP examples
where's waldo
counting leaves
the secret cave
14
zero knowledge proof usages
used for verifying transactions
Zcash
used for verifying smart contracts
Hawk
15
zkSNARKs
zero-knowledge Succinct Non-interactive
ARguments of Knowledge
pros
Succinct non-interactive zero-knowledge proof
easy to verify
protect completeness of computations
do not bring too much overhead to non-
participants of the proof
17
What is zkSNARKs
Succinct
Non-interactive
ARgument
of Knowledge
zero-knowledge
18
What is zkSNARKs
succinct
the sizes of the messages are tiny in
comparison to the length of the actual
computation
19
What is zkSNARKs
non-interactive
there is no or only little interaction. For
zkSNARKs, there is usually a setup phase and
after that a single message from the prover to
the verifier. Furthermore, SNARKs often have
the so-called "public verifier" property
meaning that anyone can verify without
interacting anew, which is important for
blockchains.
20
What is zkSNARKs
arguments
the verifier is only protected against
computationally limited provers. Provers with
enough computational power can create
proofs/arguments about wrong statements
(Note that with enough computational power,
any public-key encryption can be broken).
This is also called "computational
soundness", as opposed to "perfect
soundness"
21
What is zkSNARKs
of knowledge
it is not possible for the prover to construct a
proof/argument without knowing a certain so-
called witness (for example the address she
wants to spend from, the preimage of a hash
function or the path to a certain Merkle-tree
node).
22
What is zkSNARKs
zero knowledge
during the interaction, the verifier learns
nothing apart from the validity of the
statement. The verifier especially does not
learn the witness string
23
What is zkSNARKs
witness string
consider transaction validation computation:
f(σ_1, σ_2, s, r, v, p_s, p_r, v) = 1
where σ_1 and σ_2 are the root hashes of
account Merkle-trees (pre- and post- state)
s and r are sender and receiver accounts.
p_s, p_r are Merkle-tree proofs. v is the
threshold in the test of Merkle-tree proof.
When turning f into a zkSNARK where only
σ_1 and σ_2 are publicly known. Then
(s,r,v,p_s,p_r,v) is the witness string. 24
Current implementation of zkSNARKs
Four main ingrediant
Encoding as a polynomial problem
Succinctness by random sampling
Homomorphic encoding / encryption
Zero knowledge
25
Current implementation of zkSNARKs
Encoding as a polynomial problem
The program that is to be checked is
compiled into a quadratic equation of
polynomials: t(x) h(x) = w(x) v(x), where the
equality holds iff the program is computed
correctly. The prover wants to convince the
verifier that this equality holds.
26
Current implementation of zkSNARKs
Succinctness by random sampling
The verifier chooses a secret evaluation point
s to reduce the problem from multiplying
polynomials and verifying polynomial
function equality to simple multiplication and
equality check on numbers:
t(s) h(s) = w(s) v(s)
This reduces both the proof size and the
verification time tremendously.
27
Current implementation of zkSNARKs
Homomorphic encoding / encryption
An encoding/encryption function E is used
that has some homomorphic properties (but
is not fully homomorphic, which is not yet
practical).
This allows the prover to compute E(t(s)),
E(h(s)), E(w(s)), E(v(s)) without knowing s,
she only knows E(s) and some other helpful
encrypted values.
28
Current implementation of zkSNARKs
Zero knowledge
The prover permutes the values E(t(s)),
E(h(s)), E(w(s)), E(v(s)) by multiplying with a
number so that the verifier can still check
their correct structure without knowing the
actual encoded values.
Roughly speaking, check t(s)h(s) = w(s)v(s) is
identical to check t(s)h(s)k = w(s)v(s)k a
random secret non-zero number k. And if you
are sent only the numbers (t(s)h(s)k) and
(w(s)v(s)k), it is impossible to derive t(s)h(s)
or w(s)v(s). 29
cons
currently (Zcash implementation) costs between
45 seconds to 1 minute to generate new proof
and move money from someone else.
suffer from big scalability issues
currently (Zcash implementation) need one
specific party for trust
30
Combine privacy and programmability
Add privacy to Ethereum
BabyZoE
Add programmability to Zcash
Programmable Zcash
Connect the Zcash and Ethereum blockchains
Project Alchemy
31
Bringing zkSNARKs to Ethereum
Smart contracts where some of computation is
performed off-blockchain
Without sacrificing integrity
With zero knowledge
Scalability
Privacy-preserving cryptocurrency
Zerocash over Ethereum (ZoE)
First milestone: Baby ZoE
32
Baby ZoE
first step towards Zerocash over Ethereum
What is Baby ZoE
Simple coin mixer contract
Can deposit and later withdraw privately
Fixed denomination
Protocol based on commitments and Merkle
trees
34
Implementation components
Arithmetic circuit expressing the NP statement
for the zkSNARK
Contract
Extend the Ethereum VM to support native
SNARK verification
Wallet
35
Implementation components
Native SNARK verification
snarkverify(vk, proof, public_input)
Verifies the zkSNARK proof with the
verification key, given the public input
Parity EVM patch
Rust wrapper for libsnark
36
Implementation components
- ZoE Circuit
- Given serial, addr, rt, and MAC,
there exists sk such that
- cm := SHA256(sk||serial)
- cm appears in the depth-4
merkle tree with root rt
- MAC = SHA256(addr||sk)
37
BabyZoE contract: internal state
Internal Merkle tree for commitments
Verification key for zkSNARK
List of spent serial numbers
List of past Merkle tree roots
38
BabyZoE contract: code
contract Mixer { 
  mapping (bytes32 => bool) public serials; 
  mapping (bytes32 => bool) public roots; 
  SnarkPrecompile zksnark = SnarkPrecompile(0x000000000000000000
  struct Mtree { 
    uint cur; 
    bytes32[16] leaves;
  } 
  Mtree public MT; 
  bytes public vk; 
   
  function Mixer(bytes _vk) { 
    vk = _vk; 
    MT.cur = 0; 
    for (uint i = 0; i < 16; i++﴿ MT.leaves[i] = 0x0; 
  } 
  ... 
} 
39
BabyZoE contract: code
function insert(bytes32 com) returns (bool res) { 
  if (MT.cur == 16) { 
    return false; 
  } 
  MT.leaves[MT.cur] = com; 
  MT.cur++; 
  return true; 
} 
40
BabyZoE contract: code
function deposit(bytes32 com) returns (bool res) { 
  if (msg.value != 1 ether) { 
    msg.sender.send(msg.value); 
    return false; 
  } 
  if (!insert(com)) { 
    msg.sender.send(msg.value); 
    return false; 
  } 
  bytes32 rt = getRoot(); 
  roots[rt] = true; 
  return true; 
} 
41
BabyZoE contract: code
function withdraw(bytes32 serial, address addr, bytes32 rt, byte
  success = false; 
  bytes20 addr_byte = bytes20(addr); 
  bytes memory pub = new bytes(128); 
  uint i; 
  for (i = 0; i < 32; i++) pub[i] = serial[i]; 
  for (i = 0; i < 20; i++) pub[32 + i] = addr_byte[i]; 
  for (i = 20; i < 32; i++) pub[32 + i] = 0; 
  for (i = 0; i < 32; i++) pub[32*2 + i] = rt[i]; 
  for (i = 0; i < 32; i++) pub[32*3 + i] = mac[i]; 
  if (roots[rt] == true) { 
    if (!serials[serial]) { 
      if (!zksnark.verify_proof(vk, proof, pub)) { return false;
      serials[serial] = true; 
      if (!addr.send(1 ether)) { throw; } 
      else { success = true; } 
    } else { return; } 
  } else { return; } 
}  42
Roadmap
Grown-up ZoE
Variable denomination
Splitting and joining coins
Payment destinations
EIP (Ethereum improvement proposal) for
snarkverify precompile
Full wallet
Hawk over Ethereum
Cool contracts
43
References
一文讀懂區塊鏈上的隱私與監管問題
Zcash + ethereum
Zero knowledge proof
The trend towards blockchain privacy: zero
knowledge proofs
Privacy on the blockchain
zkSNARKs in a nutshell
Baby ZoE
44
Q&A

More Related Content

Viewers also liked

Fair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyFair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyPhilippe Camacho, Ph.D.
 
Ethereum Madrid - Cambio de paradigma en el sector energético
Ethereum Madrid - Cambio de paradigma en el sector energéticoEthereum Madrid - Cambio de paradigma en el sector energético
Ethereum Madrid - Cambio de paradigma en el sector energéticoEthereum Madrid
 
Chatbots et assistants virtuels : l'automatisation du poste de travail
Chatbots et assistants virtuels : l'automatisation du poste de travailChatbots et assistants virtuels : l'automatisation du poste de travail
Chatbots et assistants virtuels : l'automatisation du poste de travailH2 University
 
Ethereum Madrid - Blockchain for dummies
Ethereum Madrid - Blockchain for dummiesEthereum Madrid - Blockchain for dummies
Ethereum Madrid - Blockchain for dummiesEthereum Madrid
 
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Tomoaki Sato
 
Comment faire de la publicité sur Facebook ?
Comment faire de la publicité sur Facebook ?Comment faire de la publicité sur Facebook ?
Comment faire de la publicité sur Facebook ?H2 University
 
Copy of nordledger living asa_service_20170130_new
Copy of nordledger living asa_service_20170130_newCopy of nordledger living asa_service_20170130_new
Copy of nordledger living asa_service_20170130_newJouko Salonen
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofArunanand Ta
 
Building 'Google For The Economic Web' using the Ethereum blockchain
Building 'Google For The Economic Web' using the Ethereum blockchainBuilding 'Google For The Economic Web' using the Ethereum blockchain
Building 'Google For The Economic Web' using the Ethereum blockchainUserfeeds.io
 
Nordledger hack theliving_20170213
Nordledger hack theliving_20170213Nordledger hack theliving_20170213
Nordledger hack theliving_20170213Jouko Salonen
 
Blockchain, Ethereum et OpenBazaar - Think Liberal Assas
Blockchain, Ethereum et OpenBazaar - Think Liberal AssasBlockchain, Ethereum et OpenBazaar - Think Liberal Assas
Blockchain, Ethereum et OpenBazaar - Think Liberal AssasAlbin CAUDERLIER
 
El ataque a The DAO: Seguridad y Consenso
El ataque a The DAO: Seguridad y ConsensoEl ataque a The DAO: Seguridad y Consenso
El ataque a The DAO: Seguridad y ConsensoEthereum Madrid
 
Nordledger living asa_service_20170208
Nordledger living asa_service_20170208Nordledger living asa_service_20170208
Nordledger living asa_service_20170208Jouko Salonen
 
Nordledger regtech 2017_02_09.pptx
Nordledger regtech 2017_02_09.pptxNordledger regtech 2017_02_09.pptx
Nordledger regtech 2017_02_09.pptxJouko Salonen
 
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWEEcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWEJohn Lilic
 

Viewers also liked (20)

Fair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third PartyFair Exchange of Short Signatures without Trusted Third Party
Fair Exchange of Short Signatures without Trusted Third Party
 
Ethereum Madrid - Cambio de paradigma en el sector energético
Ethereum Madrid - Cambio de paradigma en el sector energéticoEthereum Madrid - Cambio de paradigma en el sector energético
Ethereum Madrid - Cambio de paradigma en el sector energético
 
Chatbots et assistants virtuels : l'automatisation du poste de travail
Chatbots et assistants virtuels : l'automatisation du poste de travailChatbots et assistants virtuels : l'automatisation du poste de travail
Chatbots et assistants virtuels : l'automatisation du poste de travail
 
Ethereum Madrid - Blockchain for dummies
Ethereum Madrid - Blockchain for dummiesEthereum Madrid - Blockchain for dummies
Ethereum Madrid - Blockchain for dummies
 
V-Pesa
V-PesaV-Pesa
V-Pesa
 
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~ Restribute ~ Wealth re-distirbution by blockchain hardfork ~
Restribute ~ Wealth re-distirbution by blockchain hardfork ~
 
Comment faire de la publicité sur Facebook ?
Comment faire de la publicité sur Facebook ?Comment faire de la publicité sur Facebook ?
Comment faire de la publicité sur Facebook ?
 
Copy of nordledger living asa_service_20170130_new
Copy of nordledger living asa_service_20170130_newCopy of nordledger living asa_service_20170130_new
Copy of nordledger living asa_service_20170130_new
 
Elliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge ProofElliptic Curve Cryptography and Zero Knowledge Proof
Elliptic Curve Cryptography and Zero Knowledge Proof
 
Building 'Google For The Economic Web' using the Ethereum blockchain
Building 'Google For The Economic Web' using the Ethereum blockchainBuilding 'Google For The Economic Web' using the Ethereum blockchain
Building 'Google For The Economic Web' using the Ethereum blockchain
 
Nordledger hack theliving_20170213
Nordledger hack theliving_20170213Nordledger hack theliving_20170213
Nordledger hack theliving_20170213
 
Web3j 2.0 Update
Web3j 2.0 UpdateWeb3j 2.0 Update
Web3j 2.0 Update
 
Blockchain, Ethereum et OpenBazaar - Think Liberal Assas
Blockchain, Ethereum et OpenBazaar - Think Liberal AssasBlockchain, Ethereum et OpenBazaar - Think Liberal Assas
Blockchain, Ethereum et OpenBazaar - Think Liberal Assas
 
El ataque a The DAO: Seguridad y Consenso
El ataque a The DAO: Seguridad y ConsensoEl ataque a The DAO: Seguridad y Consenso
El ataque a The DAO: Seguridad y Consenso
 
Nordledger living asa_service_20170208
Nordledger living asa_service_20170208Nordledger living asa_service_20170208
Nordledger living asa_service_20170208
 
Introducción The DAO
Introducción The DAOIntroducción The DAO
Introducción The DAO
 
Provident One
Provident OneProvident One
Provident One
 
Ether mining 101 v2
Ether mining 101 v2Ether mining 101 v2
Ether mining 101 v2
 
Nordledger regtech 2017_02_09.pptx
Nordledger regtech 2017_02_09.pptxNordledger regtech 2017_02_09.pptx
Nordledger regtech 2017_02_09.pptx
 
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWEEcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
EcoSummit 2016 in Berlin Presentation - ConsenSys / RWE
 

Similar to zkSNARKs in Ethereum, and Baby ZoE

Exploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge ProofExploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge Proof22f2000330
 
Blockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indyBlockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indyManishKumarGiri2
 
DevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, ING
DevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, INGDevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, ING
DevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, INGR3
 
Privacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyPrivacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyGokul Alex
 
CHAPTER 12 - Zero-knowledge proof protocols.ppt
CHAPTER 12 - Zero-knowledge proof protocols.pptCHAPTER 12 - Zero-knowledge proof protocols.ppt
CHAPTER 12 - Zero-knowledge proof protocols.pptsprojectdirector
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Razi Rais
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4AfiqEfendy Zaen
 
Paranoid's View of Token Engineering
Paranoid's View of Token Engineering Paranoid's View of Token Engineering
Paranoid's View of Token Engineering Token Engineering
 
Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...
Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...
Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...Scott Deatherage
 
Exploring the World of Cryptocurrency Technology
Exploring the World of Cryptocurrency TechnologyExploring the World of Cryptocurrency Technology
Exploring the World of Cryptocurrency TechnologyOmerfauzan
 
El Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign onEl Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign onFrank Denis
 
Blockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxBlockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxDr. Mohamed Torky
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Michele Orru'
 
Blockchain - a formal introduction
Blockchain - a formal introductionBlockchain - a formal introduction
Blockchain - a formal introductionSander Demeester
 
Zero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdfZero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdfKonrad Kokosa
 
Blockchain Technology and Cryptocurrency
Blockchain Technology and CryptocurrencyBlockchain Technology and Cryptocurrency
Blockchain Technology and CryptocurrencyAdityaSingh1213
 
Vertcoin stealth addresses (sx)
Vertcoin stealth addresses (sx)Vertcoin stealth addresses (sx)
Vertcoin stealth addresses (sx)depboy
 
Monero Presentation @ Bitcoin Meetup Geneva
Monero Presentation @ Bitcoin Meetup GenevaMonero Presentation @ Bitcoin Meetup Geneva
Monero Presentation @ Bitcoin Meetup Genevaarnuschky
 

Similar to zkSNARKs in Ethereum, and Baby ZoE (20)

Exploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge ProofExploring the role of DSA in Zero Knowledge Proof
Exploring the role of DSA in Zero Knowledge Proof
 
Blockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indyBlockchain privacy approaches in hyperledger indy
Blockchain privacy approaches in hyperledger indy
 
DevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, ING
DevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, INGDevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, ING
DevDay: Have Your Cake and Eat it Too, Privacy and Security with ZKP, ING
 
Privacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain TechnologyPrivacy Preserving Paradigms of Blockchain Technology
Privacy Preserving Paradigms of Blockchain Technology
 
CHAPTER 12 - Zero-knowledge proof protocols.ppt
CHAPTER 12 - Zero-knowledge proof protocols.pptCHAPTER 12 - Zero-knowledge proof protocols.ppt
CHAPTER 12 - Zero-knowledge proof protocols.ppt
 
Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption Improving privacy in blockchain using homomorphic encryption
Improving privacy in blockchain using homomorphic encryption
 
Blockchain
BlockchainBlockchain
Blockchain
 
Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4Protocols and Practices in Using Encryption Chapter 4
Protocols and Practices in Using Encryption Chapter 4
 
Paranoid's View of Token Engineering
Paranoid's View of Token Engineering Paranoid's View of Token Engineering
Paranoid's View of Token Engineering
 
Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...
Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...
Deatherage presentation blockchain, cryptocurrency, smart contracts and the l...
 
Exploring the World of Cryptocurrency Technology
Exploring the World of Cryptocurrency TechnologyExploring the World of Cryptocurrency Technology
Exploring the World of Cryptocurrency Technology
 
El Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign onEl Passo - Privacy-preserving single sign on
El Passo - Privacy-preserving single sign on
 
Blockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptxBlockchain : A Key Player in Metaverse.pptx
Blockchain : A Key Player in Metaverse.pptx
 
Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...Current standard implementations for security/authorization in distributed c...
Current standard implementations for security/authorization in distributed c...
 
Blockchain - a formal introduction
Blockchain - a formal introductionBlockchain - a formal introduction
Blockchain - a formal introduction
 
Zero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdfZero-knowledge proofs and why it is future of blockchain.pdf
Zero-knowledge proofs and why it is future of blockchain.pdf
 
Blockchain Technology and Cryptocurrency
Blockchain Technology and CryptocurrencyBlockchain Technology and Cryptocurrency
Blockchain Technology and Cryptocurrency
 
Vertcoin stealth addresses (sx)
Vertcoin stealth addresses (sx)Vertcoin stealth addresses (sx)
Vertcoin stealth addresses (sx)
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Monero Presentation @ Bitcoin Meetup Geneva
Monero Presentation @ Bitcoin Meetup GenevaMonero Presentation @ Bitcoin Meetup Geneva
Monero Presentation @ Bitcoin Meetup Geneva
 

Recently uploaded

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Recently uploaded (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

zkSNARKs in Ethereum, and Baby ZoE