Sunday, June 8, 2025
Show HN: Chaum Pedersen ZK Protocol Using gRPC https://ift.tt/PYJnBjd
Show HN: Chaum Pedersen ZK Protocol Using gRPC Here is the protocol worklow. Let us define g as the generator of the multiplicative cyclic group G of order q. Let us define p = 2q + 1 (a safe prime). The values p, g, a1, b1, c1 are publicly available to the prover and the verifier. a1 = g^a mod q b1 = g^b mod q c1 = g^ab mod q where a and b are cryptographically secure randomly generated numbers. prover wants to prove he knows a secret x. the prover computes y1 = g^x mod q and y2 = b1^x mod q. the prover sends y1 and y2 to the verifier. The verifier then computes a challenge value s and sends it to the prover. the prover then computes z = (x + as) mod q. the prover sends z to the verifier. The verifier then does two checks, g^z mod q = a1^s * y1 mod q and b1^z mod q = c1^s * y2 mod q. If the checks are satisfied that means the prover has proved that he indeed knows x. It can be mathematically proven that these checks are indeed true if and only if the prover knows a valid x. https://ift.tt/VMbLeOH June 8, 2025 at 10:50PM
Subscribe to:
Post Comments (Atom)
Show HN: Inspect and extract files from MSI installers directly in your browser https://ift.tt/X6PntGW
Show HN: Inspect and extract files from MSI installers directly in your browser Hey everyone! I'm excited to share a small web app I bui...
-
Show HN: High school robotics code/CAD/design binder release Hello HN! My name is Patrick, and I am a junior at my High School’s FRC robotic...
-
Show HN: D&D meets Siri – Interactive voice adventure Hey HN! I've been building tooling for voice-driven apps over the past few mon...
-
Show HN: I Made an AI Social Media Manager to Automate Content Creation Hey HN, I am a Solopreneur, and I love building apps to automate bor...
No comments:
Post a Comment