One of the biggest breakthroughs that zkash had was when they moved to sapling was switching it to a peterson hash which is interesting because that construction is actually not really symmetric creep to anymore. One clear requirement that you have there is of course a security of a hash function so you must not be able to find the collision or worse not pre-image faster than for example two to the 128 operations if you declare a security level of 128 bits. The second requirement that came into application was clearly sexiness in circuits so that your hash function must be short enough but even this is not really well defined.
In this week’s episode, Anna and Kobi Gurkan speak with Dmitry Khovratovich, researcher at the Ethereum Foundation, Dusk Network, and ABDK Consulting and JP Aumasson CSO at Taurus. This episode compares symmetric and asymmetric cryptography as well as a deep dive into hash functions. They explore what hash functions are used for, the process of developing and improving hash functions, and what it means for a hash function to be zk friendly.
Here are some additional links for this episode:
- Dmitry Khovratovich Twitter
- Ethereum Foundation
- Dusk Network
- ABDK Consulting
- JP Aumasson Twitter
- JP Aumasson Website
- Taurus Twitter
- Taurus Website
- ZK8: New Directions in ZK hashing - Dmitry Khovratovich - Ethereum Foundation
- ZK8: On ZK hashes - JP Aumasson - Taurus
- ZK7: Security of ZKP projects: same but different - JP Aumasson - Taurus
- Serious Cryptography - JP Aumasson, 2017
- Too Much Crypto - JP Aumasson, 2019
- Crypto Dictionary - JP Aumasson
- Scalable, transparent, and post-quantum secure computational integrity - Ben-Sasson, Bentov, Horesh, Riabzev, 2018, page 71
- NIST National Institute of Standards and Technology
- BLAKE2
- Poseidon Network
- SHA-3
- Reinforced Concrete - Maharramov, 2021
- Nova - Recursive Zero-Knowledge Arguments from Folding Schemes - Kothapalli, Setty, Tzialla, 2021
- ZK8: Fantastic Beasts: unfolding ZK hardware - Omer Shlomovits - Ingonyama
Find the Aleo repo here github.com/aleohq.
Today's episode is sponsored by Anoma.
Anoma is a set of protocols that enable self sovereign coordination.
Anoma's first fractal instance Namada is planned for later in 2022, and it focuses on enabling shielded transfers for any assets, with a few second transaction latency and near zero fees.
Visit anoma.net for more information.
If you like what we do: