Double-Efficient ZkSNARKs Without Trusted Setup

Double-Efficient ZkSNARKs Without Trusted Setup

IEEE Symposium on Security and Privacy via YouTube Direct link

polynomial evaluation

15 of 24

15 of 24

polynomial evaluation

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Double-Efficient ZkSNARKs Without Trusted Setup

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 What is a zkSNARK
  3. 3 Comparing zkSNARKs
  4. 4 Cryptographic assumptions
  5. 5 Higher X
  6. 6 Efficiency
  7. 7 Comparison
  8. 8 Design Space
  9. 9 General Purpose Proof Systems
  10. 10 Proof Machinery
  11. 11 Proof Systems
  12. 12 Hyrax
  13. 13 Commitment properties
  14. 14 Interactive proof
  15. 15 polynomial evaluation
  16. 16 vector matrix vector product
  17. 17 multi commitments
  18. 18 dotproduct argument
  19. 19 refinements
  20. 20 points of comparison
  21. 21 proof size vs log
  22. 22 proof time
  23. 23 verifier time
  24. 24 conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.