Questions tagged [blockchain]
The blockchain tag has no summary.
18 questions
0
votes
2
answers
216
views
How to correctly convert Bitcoin’s double SHA-256 proof-of-work into a CNF satisfiability (SAT) problem? [closed]
Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
0
votes
2
answers
243
views
Can we make linkedin using blockchain
Can we make linkedin using blockchain, which may not be completely valid as the users registration can not be on-chain but we can verify job postings from companies, and users cant fake their ...
1
vote
1
answer
115
views
Can I use Bitcoin blockchain's timestamp as the witness of a statement?
Suppose that I create a statement commitment at a time for a someone.
In which, I have already stated it at a specified timestamp, but I will confess it in the future.
To concinve her that I ever said ...
2
votes
1
answer
196
views
The state of the art in zero-knowledge proofs
I am not aware of modern cryptographic protocols, hence my next questions may be too stupid for experts. If so, I am sorry in advance. Instead, I am an academic researcher in (fast secure ...
0
votes
1
answer
306
views
Open Problems in Cryptography for a Capstone Project
I am looking for open research problems in cryptography that would be suitable for a capstone project. My focus is on practical implementations or theoretical advancements in areas like:
Zero-...
1
vote
0
answers
83
views
Could a Blockchain-Based System with Self-Replicating and Self-Destructing Nodes Work?
Would it be feasible to create a blockchain-based system where data hashes are stored in the blockchain, replicated across all nodes, and protected by a self-destruct mechanism? In this system, if a ...
2
votes
0
answers
40
views
Advantages of a private block chain vs. a database, signatures and Merkle Damgard / similar Constructions
If I understood correctly, private blockchains are either managed/validated by a centralized trusted party or a few validators. All in all, a 51% attack should be possible due to the small network ...
0
votes
1
answer
53
views
Dynamic Hash Size in SHAKE256: Pros, Cons, and Security of the Structure [closed]
The concept involves the first round of SHAKE256 generating a hash of dynamic length (ranging from 256 to 512 bits). The length is determined based on certain parameters, such as a combination of ...
1
vote
1
answer
126
views
How do non-Turing complete languages like Clarity support sha256 hashing, which internally relies on loops?
In non-Turing complete languages like Clarity (used for writing smart contracts on the Stacks blockchain), loops and recursion are intentionally excluded to ensure predictability and prevent non-...
3
votes
0
answers
112
views
Linear Verification time for zk-SNARKs?
I've come across this paper that benchmarks the efficiency of zk-SNARKs, zk-STARKs and Bulletproofs.
The table on page 8 states that the verification time for zk-SNARKs is linear in the size of the ...
0
votes
0
answers
61
views
Significance of The Account
What is the significance of the account in blockchain network? You can't derive public key from it, only thing you can do is to say that JoeBloggsAccountName is very likely derived from a certain ...
0
votes
1
answer
87
views
What is the reason to use blocks in the first place? [closed]
I am not sure this question is really for this forum. But to be honest, I could not think of a better one.
This question is about blockchains in general. As far as I know, there is no site for general ...
0
votes
1
answer
72
views
Can Cryptographic Proofs Directly Attest to Function Call Results?
In systems where computations are performed in remote or potentially untrusted environments(e.g. Ethereum NaaS providers such as Infura), how can we gain confidence in the accuracy of the results? ...
0
votes
1
answer
125
views
1
vote
0
answers
70
views
How can the validity of signatures in layer-2 transactions be proven in zk-rollup?
I have many questions about the details of using zk-SNARK technology in zk-rollup:
How can the validity of signatures in layer-2 transactions be proven in zk-rollup?
In zk-rollup, is a single large ...