Skip to main content

Questions tagged [blockchain]

0 votes
2 answers
216 views

Is there any respected mathematician who can correctly transform the double SHA proof-of-work (used in Bitcoin mining) into a satisfiability (SAT) problem, ensuring that the CNF conversion is done ...
user avatar
0 votes
2 answers
243 views

Can we make linkedin using blockchain, which may not be completely valid as the users registration can not be on-chain but we can verify job postings from companies, and users cant fake their ...
nUlL's user avatar
  • 21
1 vote
1 answer
115 views

Suppose that I create a statement commitment at a time for a someone. In which, I have already stated it at a specified timestamp, but I will confess it in the future. To concinve her that I ever said ...
Muhammad Ikhwan Perwira's user avatar
2 votes
1 answer
196 views

I am not aware of modern cryptographic protocols, hence my next questions may be too stupid for experts. If so, I am sorry in advance. Instead, I am an academic researcher in (fast secure ...
Dimitri Koshelev's user avatar
0 votes
1 answer
306 views

I am looking for open research problems in cryptography that would be suitable for a capstone project. My focus is on practical implementations or theoretical advancements in areas like: Zero-...
Nerses Asaturyan's user avatar
1 vote
0 answers
83 views

Would it be feasible to create a blockchain-based system where data hashes are stored in the blockchain, replicated across all nodes, and protected by a self-destruct mechanism? In this system, if a ...
cawani_'s user avatar
  • 11
2 votes
0 answers
40 views

If I understood correctly, private blockchains are either managed/validated by a centralized trusted party or a few validators. All in all, a 51% attack should be possible due to the small network ...
user13182493's user avatar
0 votes
1 answer
53 views

The concept involves the first round of SHAKE256 generating a hash of dynamic length (ranging from 256 to 512 bits). The length is determined based on certain parameters, such as a combination of ...
blockchainman's user avatar
1 vote
1 answer
126 views

In non-Turing complete languages like Clarity (used for writing smart contracts on the Stacks blockchain), loops and recursion are intentionally excluded to ensure predictability and prevent non-...
Nerses Asaturyan's user avatar
3 votes
0 answers
112 views

I've come across this paper that benchmarks the efficiency of zk-SNARKs, zk-STARKs and Bulletproofs. The table on page 8 states that the verification time for zk-SNARKs is linear in the size of the ...
Niko Wolf's user avatar
  • 111
0 votes
0 answers
61 views

What is the significance of the account in blockchain network? You can't derive public key from it, only thing you can do is to say that JoeBloggsAccountName is very likely derived from a certain ...
vladimir_1969_2's user avatar
0 votes
1 answer
87 views

I am not sure this question is really for this forum. But to be honest, I could not think of a better one. This question is about blockchains in general. As far as I know, there is no site for general ...
unsafe_where_true's user avatar
0 votes
1 answer
72 views

In systems where computations are performed in remote or potentially untrusted environments(e.g. Ethereum NaaS providers such as Infura), how can we gain confidence in the accuracy of the results? ...
MShakeG's user avatar
  • 101
1 vote
0 answers
70 views

I have many questions about the details of using zk-SNARK technology in zk-rollup: How can the validity of signatures in layer-2 transactions be proven in zk-rollup? In zk-rollup, is a single large ...
user109993's user avatar

15 30 50 per page