Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Bulletproofs: Short Proofs for Confidential Transactions and More

Автор: IEEE Symposium on Security and Privacy

Загружено: 2018-05-22

Просмотров: 5515

Описание:

Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bünz (Stanford University)
Presented at the
2018 IEEE Symposium on Security & Privacy
May 21–23, 2018
San Francisco, CA
http://www.ieee-security.org/TC/SP2018/

ABSTRACT
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup; the proof size is only logarithmic in the witness size. Bulletproofs are especially well suited for efficient range proofs on committed values: they enable proving that a committed value is in a range using only 2 log_2(n)+9 group and field elements, where n is the bit length of the range. Proof generation and verification times are linear in n.

Bulletproofs greatly improve on the linear (in n) sized range proofs in existing proposals for confidential transactions in Bitcoin and other cryptocurrencies. Moreover, Bulletproofs supports aggregation of range proofs, so that a party can prove that m commitments lie in a given range by providing only an additive O(log(m)) group elements over the length of a single proof. To aggregate proofs from multiple parties, we enable the parties to generate a single proof without revealing their inputs to each other via a simple multi-party computation (MPC) protocol for constructing Bulletproofs. This MPC protocol uses either a constant number of rounds and linear communication, or a logarithmic number of rounds and logarithmic communication. We show that verification time, while asymptotically linear, is very efficient in practice. The marginal cost of batch verifying 32 aggregated range proofs is less than the cost of verifying 32 ECDSA signatures. Bulletproofs build on the techniques of Bootle et al. (EUROCRYPT 2016). Beyond range proofs, Bulletproofs provide short zero-knowledge proofs for general arithmetic circuits while only relying on the discrete logarithm assumption and without requiring a trusted setup. We discuss many applications that would benefit from Bulletproofs, primarily in the area of cryptocurrencies. The efficiency of Bulletproofs is particularly well suited for the distributed and trustless nature of blockchains. The full version of this article is available on ePrint.

Bulletproofs: Short Proofs for Confidential Transactions and More

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

FuturesMEX: Secure, Distributed Futures Market Exchange

FuturesMEX: Secure, Distributed Futures Market Exchange

Zero Knowledge Proofs: A Technical Deep Dive

Zero Knowledge Proofs: A Technical Deep Dive

Benedikt Bünz : Bulletproofs

Benedikt Bünz : Bulletproofs

Bulletproofs: Short Proofs for Confidential Transactions and More

Bulletproofs: Short Proofs for Confidential Transactions and More

Как работала машина

Как работала машина "Энигма"?

Новый год не для всех: Москва празднует, регионы кринжуют | Украшения, флешмоб, общественная реакция

Новый год не для всех: Москва празднует, регионы кринжуют | Украшения, флешмоб, общественная реакция

Opening Remarks of the 39th IEEE Symposium on Security & Privacy

Opening Remarks of the 39th IEEE Symposium on Security & Privacy

Confidential Transactions and Validation | Blockchain and Cryptocurrency Courses | 2019

Confidential Transactions and Validation | Blockchain and Cryptocurrency Courses | 2019

Zero Knowledge Proofs - Computerphile

Zero Knowledge Proofs - Computerphile

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Основные теоремы в теории игр — Алексей Савватеев на ПостНауке

Основные теоремы в теории игр — Алексей Савватеев на ПостНауке

Discrete Log based Zero-Knowledge Proofs - Dan Boneh, Stanford

Discrete Log based Zero-Knowledge Proofs - Dan Boneh, Stanford

But how does bitcoin actually work?

But how does bitcoin actually work?

18. Confidential Transactions

18. Confidential Transactions

Серебро по $71 — это ГЛУБОКИЙ НАРКОЗ, который уничтожит ваш КАПИТАЛ | Уоррен Баффет

Серебро по $71 — это ГЛУБОКИЙ НАРКОЗ, который уничтожит ваш КАПИТАЛ | Уоррен Баффет

Bulletproofs: Short proofs for confidential transactions (Benedikt Bünz, July 2018)

Bulletproofs: Short proofs for confidential transactions (Benedikt Bünz, July 2018)

Bitcoin Internals: Verifying Merkle Roots using Merkle Proofs in JavaScript

Bitcoin Internals: Verifying Merkle Roots using Merkle Proofs in JavaScript

Dan Boneh: Blockchain Primitives: Cryptography and Consensus

Dan Boneh: Blockchain Primitives: Cryptography and Consensus

How the hell does Monero work

How the hell does Monero work

ZK Whiteboard Sessions - Module One: What is a SNARK? by Dan Boneh

ZK Whiteboard Sessions - Module One: What is a SNARK? by Dan Boneh

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]