Explaining SNARKs Part IV: How to make Blind Evaluation of Polynomials Verifiable
<< Part III In this part, we build on Part II and III to develop a protocol for verifiable blind […]
Explaining SNARKs Part III: The Knowledge of Coefficient Test and Assumption
<< Part II In Part II, we saw how Alice can blindly evaluate the hiding :math:`E(P(s))` of her polynomial :math:`P` […]
Explaining SNARKs Part II: Blind Evaluation of Polynomials
<< Part I In this post, we recall the notion of a polynomial, and explain the notion of “blind evaluation” […]
A Shielded Ecosystem
In Zcash, users have the option to employ transparent or shielded addresses for sending, receiving and storing their ZEC. While […]
Explaining SNARKs Part I: Homomorphic Hidings
Constructions of zk-SNARKs involve a careful combination of several ingredients; fully understanding how these ingredients all work together can take […]
Transaction Linkability
Having the two types of addresses within Zcash (transparent and shielded) is an advantage which allows users to have more […]
How Transactions Between Shielded Addresses Work
In ‘Anatomy of A Zcash Transaction’ we gave a general overview of Zcash Transactions. The purpose of this post is […]
Anatomy of A Zcash Transaction
Since the successful launch of the Zcash network on October 28th, we’ve had an outpouring of interest from miners and […]