Sunday, June 8, 2025
Show HN: Chaum Pedersen ZK Protocol Using gRPC https://ift.tt/PYJnBjd
Show HN: Chaum Pedersen ZK Protocol Using gRPC Here is the protocol worklow. Let us define g as the generator of the multiplicative cyclic group G of order q. Let us define p = 2q + 1 (a safe prime). The values p, g, a1, b1, c1 are publicly available to the prover and the verifier. a1 = g^a mod q b1 = g^b mod q c1 = g^ab mod q where a and b are cryptographically secure randomly generated numbers. prover wants to prove he knows a secret x. the prover computes y1 = g^x mod q and y2 = b1^x mod q. the prover sends y1 and y2 to the verifier. The verifier then computes a challenge value s and sends it to the prover. the prover then computes z = (x + as) mod q. the prover sends z to the verifier. The verifier then does two checks, g^z mod q = a1^s * y1 mod q and b1^z mod q = c1^s * y2 mod q. If the checks are satisfied that means the prover has proved that he indeed knows x. It can be mathematically proven that these checks are indeed true if and only if the prover knows a valid x. https://ift.tt/VMbLeOH June 8, 2025 at 10:50PM
Subscribe to:
Post Comments (Atom)
Show HN: Easily visualize torch, Jax, tf, NumPy, etc. tensors https://ift.tt/anqfwJx
Show HN: Easily visualize torch, Jax, tf, NumPy, etc. tensors hey hn, wrote a python library for myself to visualize tensors. Makes learning...
-
Show HN: An AI logo generator that can also generate SVG logos Hey everyone, I've spent the past 2 weeks building an AI logo generator, ...
-
Show HN: I Made an AI Social Media Manager to Automate Content Creation Hey HN, I am a Solopreneur, and I love building apps to automate bor...
-
RoboPianist, a piano playing robot simulation in the browser https://ift.tt/zywcBo6 March 30, 2023 at 10:52PM
No comments:
Post a Comment