Posts by Tags

RLWE

RSA

VPN

anonymous tokens

blind signatures

bulletproofs

Building on Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I explain how Bulletproofs works, and how we’re building a confidential assets protocol and confidential smart contract language using this proof system. This post was originally written for the MIT Digital Currency Review newsletter.

Programmable Constraint Systems for Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.

climbing

Rocktober in Yosemite

less than 1 minute read

Published:

Link to Medium post. My fall season in Yosemite was stacked with great friends, big adventures, and rad climbing! There is no cryptography in this blog post.

confidential assets

Programmable Constraint Systems for Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.

homomorphic encryption

lattice based cryptography

multi-party computation

post quantum cryptography

rust

Building on Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I explain how Bulletproofs works, and how we’re building a confidential assets protocol and confidential smart contract language using this proof system. This post was originally written for the MIT Digital Currency Review newsletter.

Programmable Constraint Systems for Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.

session types

yosemite

Rocktober in Yosemite

less than 1 minute read

Published:

Link to Medium post. My fall season in Yosemite was stacked with great friends, big adventures, and rad climbing! There is no cryptography in this blog post.

zero-knowledge proofs

Building on Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I explain how Bulletproofs works, and how we’re building a confidential assets protocol and confidential smart contract language using this proof system. This post was originally written for the MIT Digital Currency Review newsletter.

Programmable Constraint Systems for Bulletproofs

less than 1 minute read

Published:

Link to Medium post. I discuss the programmable constraint system (R1CS) API for writing custom zero knowledge proof circuits over Bulletproofs. I also introduce Cloak, Chain’s Confidential Asset framework that uses custom proofs built using this API.