if snowblossom ever consider adding privacy, zk stark seems to be a very good option
2020-12-04 13:59:05
there has been talk of adding a privacy layer, thank you for the tip
Rotonen
2020-12-04 13:59:14
and //cc @Fireduck
Rotonen
2020-12-04 13:59:47
https://crypto.stackexchange.com/questions/56327/what-are-zk-starks The zk-STARK is a proof zero-knowledge proof system that, in contrast to the zk-SNARK, no longer relies on a trusted setup where the "toxic waste" parameters are initialized. What are, in layman's...
Rotonen
https://docs.ethhub.io/ethereum-roadmap/layer-2-scaling/zk-starks/ ZK-STARKs are a layer 2 scaling and privacy solution for Ethereum.
according to this page " Differences between ZK-SNARKs and ZK-STARKs
1. ZK-SNARKs require a trusted setup phase whereas ZK-STARKs use publicly verifiable randomness to create trustlessly verifiable computation systems.
2. ZK-STARKs are more scalable in terms of computational speed and size when compared to ZK-SNARKs.
3. ZK-SNARKs are vulnerable to attacks from quantum computers due to the cryptography they use. ZK-STARKs are currently quantum-resistant.
"
and i just learned about this today : https://en.wikipedia.org/wiki/Steganography Steganography ( (listen) STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video. The word steganography comes from Greek steganographia, which combines the words steganós (στεγανός), meaning "covered or concealed", and -graphia (γραφή) meaning "writing".The first recorded use of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise on cryptography and steganography, disguised as a book on magic. Generally, the hidden messages appear to be (or to be part of) something else: images, articles, shopping lists, or some other cover text. For example, the hidden message may be in invisible ink between the visible lines of a private letter. Some implementations of steganography that lack a shared secret are forms of security through obscurity, and key-dependent steganographic schemes adhere to Kerckhoffs's principle.The advantage of steganography over cryptography alone is that the intended secret message does not attract attention to itself as an object of scrutiny. Plainly visible encrypted messages, no matter how unbreakable they are, arouse interest and may in themselves be incriminating in countries in which encryption is illegal.Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size. For example, a sender might start with an innocuous image file and adjust the color of every hundredth pixel to correspond to a letter in the alphabet. The change is so subtle that someone who is not specifically looking for it is unlikely to notice the change.
maybe useful for snowblossom too
The advantage of steganography over https://en.wikipedia.org/wiki/Cryptography
Whereas cryptography is the practice of protecting the contents of a message alone, steganography is concerned both with concealing the fact that a secret message is being sent and its contents.
2020-12-04 17:18:56
@r I've been playing with visual cryptography lately. :) it's fun.
Clueless
2020-12-04 17:38:28
@r that snark page looks like a good resource. I haven't added any privacy layer because I don't understand the math on those things yet.
Fireduck
i see,
@Clueless it seems to me that's more secure as described in the wiki.
zk-Stark seems really promising. prepared for quantum computers, and solve scalability and at the same time. snowblossom also try to solve this.