1. Introduction On July 17, 2023, zkSync’s official twitter Say hello to Boojum announced that zkSync Era would be migrated to the Boojum proof system without regenesis. Boojum is a STARK proof system (Plonk + FRI), see the open source code: https://github.com/matter-labs/era-boojum/tree/main (Rust) Its characteristics are: Arithmetic representation in the form of PLONK: makes ZK […]
Tag: proof
ZoKrates+Remix implements zkSNARK zero-knowledge proof online
ZoKrates + Remix implements zkSNARK zero-knowledge proof online 1. Install plugin Remix lower left corner Search, click activate 2. Write zkSNARK arithmetic circuit Create a new file main.zok copy code def main(private u8 p, private u8 q, u8 n) -> bool { return p * q == n; } Code Explanation: Two private inputs p […]
Nova-based SHA256 proof
1. Introduction Preface blog: SHA-256 algorithm and examples Nova code analysis Based on Nova’s SHA256 proof, see the open source code: https://github.com/avras/nova-sha256 Take the SHA-256 hash operation input as input as an example, where the SHA-256 algorithm and the example in: 1) “4. Padding” corresponds to the add_sha256_padding(input) function, which returns padded_input. 2) Each 512-bit […]
How to punish miners with false information in the blockchain, workload proof POW, consensus algorithm
Directory How to punish miners with false information in the blockchain Proof of Work POW What is Proof of Work? Now another question arises: What if someone else peeks at Xiao Ming’s answer and rushes to answer it? Why are blocks safe to broadcast? consensus algorithm summary How to punish miners with false information in […]
How to punish miners with false information in the blockchain, workload proof POW, consensus algorithm
Directory How to punish miners with false information in the blockchain Proof of Work POW What is Proof of Work? Now another question arises: What if someone else peeks at Xiao Ming’s answer and rushes to answer it? Why are blocks safe to broadcast? consensus algorithm summary How to punish miners with false information in […]
Use go language to build blockchain Part2. Proof of workload
English source address Introduction In the previous article, we built a very simple data structure, which is the essence of the blockchain database. And we can add blocks through the chain relationship between them: each block is linked to the previous A block. Alas, our blockchain implementation has a major flaw: adding blocks to the […]
GPU server fool-proof installation of Anaconda, pytorch, tensorflow
1. Download Anaconda installation package, official website address, Tsinghua source address. After downloading from the official website to the local, you can upload the installation package to the server through file transfer, and use the Tsinghua source address to directly use wget to download the required version, for example: wget https://mirrors.tuna.tsinghua.edu.cn/anaconda/archive/Anaconda3-2022.05-Linux-x86_64.sh 2. Install Anaconda bash […]
Hungarian algorithm-related proof: why there is no need to consider the matching method of the original point; why only the left point needs to be traversed; why the vis array is not zeroed when backtracking
Hungarian Algorithm Related Proof ? This article will explain the reasons for the following questions when readers have mastered the Hungarian algorithm, so as to help readers better understand the rationality of the Hungarian algorithm: Why do you not need to consider the matching method/connection method of the original point when searching whether the current […]
learn_C_deep_9 (understand the meaning of return from the assembly point of view, various application scenarios of const, basic understanding and experimental proof of volatile)
Directory return keyword const keyword const modified read-only variables – – – cannot be modified directly! Can const-decorated variables be part of an array definition? const can only be initialized directly when it is defined, and cannot be assigned twice. Why? const modified pointer volatile keyword return keyword I don’t know if all of us […]
Use zero-knowledge proof to realize the three-coloring problem (qt) of the map, a simple experiment
I used to deal with it casually, upload it to see if it can help others. 1. Experimental requirements Use zero-knowledge proof to realize the three-coloring problem of the map (coloring a map with three colors to ensure that any two adjacent areas are of different colors). Assuming that the answer to the three-color problem […]