Incomplete information games on Bitcoin: Solving blockchain privacy dilemma using zero knowledge
Games with incomplete information can be developed on Bitcoin today since sCrypt has implemented zk-SNARKs.
Games with incomplete information can be developed on Bitcoin today since sCrypt has implemented zk-SNARKs.
sCrypt reimplement ZKKSP by leveraging the programmability of zkSNARKs. They simply combine elliptic curve point multiplication used in Part 2 and hashing library that resulted to Circom code.
sCrypt shows how to implement another sophisticated cryptographic primitive by simply “programming” it in zero knowledge language Circom: ring signatures.
Developing a ZKP for a problem often requires the invention of a whole new cryptographic algorithm. It has no standard recipe and requires extensive and in-depth knowledge of cryptography.
The MiMC hash function is specifically designed to minimize circuit size and thus ZKP cost by using only additions and multiplications.
In this post, sCrypt implemented the first-ever ZK-Rollup (ZKR) directly on Bitcoin. They also showed why ZKR works better on Bitcoin than on Ethereum.
zk-SNARK is a powerful primitive for blockchain privacy and scalability, and in this article, sCrypt showed what zk-SNARK is and how to implement it on Bitcoin.
sCrypt have demonstrated how to verify a single BLS signature on Bitcoin and how BLS’s main power lies in aggregated signatures and keys.
The transpiler facilitates developers to migrate their applications onto the Bitcoin network from Ethereum and other Solidity/EVM-compatible blockchains without writing code from scratch.
In this article, sCrypt demonstrates how pairings can be implemented directly on Bitcoin and thus enable all kinds of pairing-based cryptography applications previously thought impossible.
A ring signature is a digital signature that allows a message to be signed by a member of a group, or a ring. It proves that someone in the ring signs, but there is no way to tell who the signer is.
sCrypt generalizes the proof of knowledge of a private key using zero-knowledge proof techniques, constructing arbitrary complex puzzles, called zero-knowledge puzzles, as spending conditions.