## Reinforcing the Security of the Sapling MPC

The engineering and cryptography team at Zcash makes very large efforts to minimize risk. This is always a positive thing, […]

The engineering and cryptography team at Zcash makes very large efforts to minimize risk. This is always a positive thing, […]

zk-SNARKs – the zero-knowledge proofs at the core of Zcash – require a parameter generation ceremony to take place for […]

Decentralization is a key characteristic of cryptocurrencies because it removes dependence on trusting third parties in order to transact between […]

<< Part VI In Part VI, we saw an outline of the Pinocchio zk-SNARK. We were missing two things – […]

<< Part V In part V we saw how a statement Alice would like to prove to Bob can be […]

<< Part IV In the three previous parts, we developed a certain machinery for dealing with polynomials. In this part, […]

<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind […]

<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:`E(P(s))` of her polynomial :math:`P` […]

<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” […]

Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take […]

Members of the Ethereum R&D team and the Zcash Company are collaborating on a research project addressing the combination of […]

In ‘Anatomy of A Zcash Transaction’ we gave a general overview of Zcash Transactions. The purpose of this post is […]

At its core, Zcash’s privacy technology relies on a novel cryptographic tool called a zkSNARK – a small zero-knowledge proof […]