Zero Knowledge cover image

ProtoStar with Benedikt Bünz and Binyi Chen

Zero Knowledge

00:00

The Homomorphic Aditiveness of the Vivy C Scheme

I want to ask you about security assumptions made on some of these different protocols or constructs. How should we think about that in this case? Like, is there a ranking or like, yeah, how do you kind of place protostar? I think for, if I understand correctly, so basically, almost all the IVs scheme are from some like heuristic security assumptions. So what we have assumed is that after we instantiate a random Oracle or the hash in the circuit is still secure. From a theoretical perspective it's really weird because we rely on these heuristic assumptions and we don't know how to prove them.

Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner
Get the app