ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Bulletproofs: Short Proofs for Confidential Transactions and More

Автор: IEEE Symposium on Security and Privacy

Загружено: 2018-05-22

Просмотров: 5540

Описание: Bulletproofs: Short Proofs for Confidential Transactions and More
Benedikt Bünz (Stanford University)
Presented at the
2018 IEEE Symposium on Security & Privacy
May 21–23, 2018
San Francisco, CA
http://www.ieee-security.org/TC/SP2018/

ABSTRACT
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very short proofs and without a trusted setup; the proof size is only logarithmic in the witness size. Bulletproofs are especially well suited for efficient range proofs on committed values: they enable proving that a committed value is in a range using only 2 log_2(n)+9 group and field elements, where n is the bit length of the range. Proof generation and verification times are linear in n.

Bulletproofs greatly improve on the linear (in n) sized range proofs in existing proposals for confidential transactions in Bitcoin and other cryptocurrencies. Moreover, Bulletproofs supports aggregation of range proofs, so that a party can prove that m commitments lie in a given range by providing only an additive O(log(m)) group elements over the length of a single proof. To aggregate proofs from multiple parties, we enable the parties to generate a single proof without revealing their inputs to each other via a simple multi-party computation (MPC) protocol for constructing Bulletproofs. This MPC protocol uses either a constant number of rounds and linear communication, or a logarithmic number of rounds and logarithmic communication. We show that verification time, while asymptotically linear, is very efficient in practice. The marginal cost of batch verifying 32 aggregated range proofs is less than the cost of verifying 32 ECDSA signatures. Bulletproofs build on the techniques of Bootle et al. (EUROCRYPT 2016). Beyond range proofs, Bulletproofs provide short zero-knowledge proofs for general arithmetic circuits while only relying on the discrete logarithm assumption and without requiring a trusted setup. We discuss many applications that would benefit from Bulletproofs, primarily in the area of cryptocurrencies. The efficiency of Bulletproofs is particularly well suited for the distributed and trustless nature of blockchains. The full version of this article is available on ePrint.

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Bulletproofs: Short Proofs for Confidential Transactions and More

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

FuturesMEX: Secure, Distributed Futures Market Exchange

FuturesMEX: Secure, Distributed Futures Market Exchange

Double-efficient zkSNARKs Without Trusted Setup

Double-efficient zkSNARKs Without Trusted Setup

Opening Remarks of the 39th IEEE Symposium on Security & Privacy

Opening Remarks of the 39th IEEE Symposium on Security & Privacy

But how does bitcoin actually work?

But how does bitcoin actually work?

Benedikt Bünz : Bulletproofs

Benedikt Bünz : Bulletproofs

Проблема нержавеющей стали

Проблема нержавеющей стали

Гипотеза Пуанкаре — Алексей Савватеев на ПостНауке

Гипотеза Пуанкаре — Алексей Савватеев на ПостНауке

18. Confidential Transactions

18. Confidential Transactions

Автоматизация взлома оборудования с помощью кода Клода

Автоматизация взлома оборудования с помощью кода Клода

Экономика современного искусства. Лекция Марата Гельмана

Экономика современного искусства. Лекция Марата Гельмана

Тоннель под Ла-Маншем | Потрясающие инженерные решения, лежащие в его основе

Тоннель под Ла-Маншем | Потрясающие инженерные решения, лежащие в его основе

Shafi Goldwasser: From Basic Idea to Impact: the story of modern cryptography

Shafi Goldwasser: From Basic Idea to Impact: the story of modern cryptography

Efficient Confidential Transactions Using Bulletproofs-Dan Boneh, Stanford University | NEO DevCon 1

Efficient Confidential Transactions Using Bulletproofs-Dan Boneh, Stanford University | NEO DevCon 1

Zero Knowledge Proofs: A Technical Deep Dive

Zero Knowledge Proofs: A Technical Deep Dive

How Bitcoin Works Under the Hood

How Bitcoin Works Under the Hood

Как производятся микрочипы? 🖥️🛠️ Этапы производства процессоров

Как производятся микрочипы? 🖥️🛠️ Этапы производства процессоров

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Zero Knowledge Proofs - Computerphile

Zero Knowledge Proofs - Computerphile

Mimblewimble and Scriptless Scripts | Andrew Poelstra (Blockstream) | RWC 2018

Mimblewimble and Scriptless Scripts | Andrew Poelstra (Blockstream) | RWC 2018

Для Чего РЕАЛЬНО Нужен был ГОРБ Boeing 747?

Для Чего РЕАЛЬНО Нужен был ГОРБ Boeing 747?

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]