In DK you have some hidden information that's committed to and the first step is always to de-commit that information. So what happens in the middle is actually very decoupled from the original image commitment which is used to preserve privacy. And one thing that might not be obvious is in DK the performance hit from hashing is significant. In DK there are even the custom tailored hashes for ZK take a substantial amount of the proving time. It can be like 20 times more expensive than the actual transformation itself.
This week, Anna Rose and Tarun Chitra dive back into the topic of ZK ML with guests Yi Sun, co-founder of Axiom, and Daniel Kang, Assistant Professor of computer science at UIUC. They discuss Yi and Daniel’s previous academic work and what led them to get interested in ZK topics and specifically ZK ML. They then dive into a discussion about 2 recent papers which examine the use of ZK within Machine Learning architectures.
Here are some additional links for this episode:
Apply for ZK Hack Lisbon here: ZK Hack application
Aleo is a new Layer-1 blockchain that achieves the programmability of Ethereum, the privacy of Zcash, and the scalability of a rollup.
Interested in building private applications? Check out Aleo’s programming language called Leo by visiting http://developer.aleo.org.
You can also participate in Aleo’s incentivized testnet3 by downloading and running a snarkOS node. No sign-up is necessary to participate.
For questions, join their Discord at aleo.org/discord.
If you like what we do: