透過您的圖書館登入
IP:216.73.216.100
  • 學位論文

Zcash 以及 zk-SNARKs 的潛在改良

Zcash and Potential improvement of zk-SNARKs

指導教授 : 陳君明 康明軒

摘要


Zcash 宣稱它擁有最好的匿名性。為了達成這個目的,它使用 zk- SNARKs,一種零知識證明的技術。在過去,已經有很多關於如何實 作 zk-SNARKs 的研究。Zcash 公司最後選用 Pinocchio Protocol 來實 現它。然而 zk-SNARKs 本身太過複雜,使得對於剛接觸的人很難了 解。因此在這篇論文裡,我們重新研讀 zk-SNARKs,並參照 Zcash 官 網的方法更完整的介紹,把不足的部分也補上。在這個過程中我們也 提出了潛在改良,儘管需要一些代價。我們同時也介紹了 Zcash 的架 構,用新的方式敘述 Decentralized Anonymous Payment Scheme,並 把其中重要的實作給解釋清楚。

關鍵字

Zcash zk-SNARKs Pinocchio Protocol

並列摘要


Zcash company claims that it has the best anonymous among all the cryptocurrencies. It adopts the zk-SNARKs, a kind of zero-knowledge technology. The implementation of zk-SNARKs has been extensively studied before. Zcash company adopts the Pinocchio Protocol to imple- ment zk-SNARKs. However, zk-SNARKs is so complicated such that it is hard to comprehend for people studying first time. In this the- sis, we study zk-SNARKs again and refer to Zcash website. Moreover, we explain zk-SNARKs more details and make up a deficiency. In this process, we also propose potential improvement although it needs some sacrifices. At the same time, we present the structure of Zcash and and describe Decentralized Anonymous Payment Scheme in a new way. And exhaustively illustrate the important implementations in reality.

並列關鍵字

Zcash zk-SNARKs Pinocchio Protocol

參考文獻


[1] László Babai, Lance Fortnow, Leonid A Levin, and Mario Szegedy. Check- ing computations in polylogarithmic time. In Proceedings of the twenty-third annual ACM symposium on Theory of computing, pages 21–32. ACM, 1991.
[2] Eli Ben-Sasson, Alessandro Chiesa, Daniel Genkin, Eran Tromer, and Madars Virza. Snarks for c: Verifying program executions succinctly and in zero knowl- edge. In Advances in Cryptology–CRYPTO 2013, pages 90–108. Springer, 2013.
[3] Eli Ben-Sasson, Alessandro Chiesa, Matthew Green, Eran Tromer, and Madars Virza. Secure sampling of public parameters for succinct zero knowledge proofs. In Security and Privacy (SP), 2015 IEEE Symposium on, pages 287–304. IEEE, 2015.
[4] Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. Scalable, transparent, and post-quantum secure computational integrity. Cryptol. ePrint Arch., Tech. Rep, 46:2018, 2018.
[5] Daniel J Bernstein. Curve25519: new diffie-hellman speed records. In In- ternational Workshop on Public Key Cryptography, pages 207–228. Springer, 2006.

延伸閱讀