Zero Knowledge cover image

ProtoStar with Benedikt Bünz and Binyi Chen

Zero Knowledge

00:00

The Homomorphic Aditiveness of the Vivy C Scheme

I want to ask you about security assumptions made on some of these different protocols or constructs. How should we think about that in this case? Like, is there a ranking or like, yeah, how do you kind of place protostar? I think for, if I understand correctly, so basically, almost all the IVs scheme are from some like heuristic security assumptions. So what we have assumed is that after we instantiate a random Oracle or the hash in the circuit is still secure. From a theoretical perspective it's really weird because we rely on these heuristic assumptions and we don't know how to prove them.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app