devcon 7 / programmable cryptography from a software engineering lens
Duration: 00:00:00
Speaker: Aayush Gupta, Ahmad, arnaucube, Justin Glibert, Kevin Kwok
Type: Workshop
Expertise: Intermediate
Event: Devcon
Date: Nov 2024
Categories
Keynote: The Universal Cryptographic Adapter
The "secret" third affordance of Zero-Knowledge proof after 1) Privacy and 2) Succinctness is Interoperability. ZK enables us to continuously refactor data, aggregate it from different sources, and transforming it without loosing its integrity. Starting with the Zupass project, and now with the broader adoption of the POD and GPC format, 0xPARC has been exploring using ZK for data sovereignty and creating more interoperable data ecosystem. We will cover our learnings and progress in this talk.
[CLS] Programmable Cryptography
The Programmable Cryptography CLS hosts a series of talks exploring how advanced cryptography can reshape digital infrastructure beyond blockchain and trust infrastructure. SCHEDULE: 10:00–10:20 AM, Justin Glibert / 10:20–10:45 AM, Vitalik Buterin / 10:45–11:10 AM, Albert Ni / 11:10–11:35 AM, Barry Whitehat / 11:35 AM–12:00 PM gubsheep
Programmable Cryptography and the future of the Internet
You rarely hear of issues at the networking layer of the Internet: networking companies are running utilities business: they are fungible and can be swapped if distrusted. Most of the value captured on the Internet -- and also most abuse -- happen at the Compute and Data layer of the Web. Ethereum gave us a glimpse of a fundamentally different architecture for Compute and Data than Client/Server architecture.We think the Internet is 1/3 complete, and that programmable cryptography can finish it.
Non-interactive, Unique Nullifiers: The Key to The Next Era of ZK
ZK app systems are being held back because there isn't an anonymous way to prove that you aren't double claiming/double posting. In this talk, we explore the variety of nullifiers and present a new signature scheme that would enable things like zk airdrops or other zk systems that require uniqueness.
A Deep Dive into ZK Proofs of PODs
Provable Object Data (POD) is a format any app to easily sign data and make ZK proofs without manual circuit writing or trusted setup. Proofs are described in a simple configuration language, then compiled to a family of General Purpose Circuits (GPCs). POD tech is used in Zupass and available as open-source libraries. We’ll dive into the cryptography behind PODs, and what makes them suited to ZK proofs. We’ll also cover the modular design which makes GPC circuits highly configurable.
Developing and using a modular folding schemes library
We will present Sonobe, a modular folding-schemes library. It currently features implementations of Nova, CycleFold, Hypernova and ProtoGalaxy schemes and is compatible with a wide range of R1CS arithmetization libraries. we will briefly discuss what folding schemes are and how they fit into IVC-style proof systems. Next, we will explain how Sonobe was built and what features it supports. Finally, we will cover what has been built with Sonobe and how developers can start using it today.
ZK Email: Fast Proofs and Production-Ready Account Recovery
We discuss progress that ZK Email has made in making new proofs really easily, as well as interesting new on-chain directions for email-triggered transactions. We'll go over proof registries, email-based multisig signers, and email guardians for account recovery in production.
zkemail: Decentralized ID Verification on Chain Without Servers
We demo zk-email, a new primitive that lets you verify emails trustlessly. We demo a simple trustless Twitter badge on chain, and show how almost any data in web2 can be turned into trustless badges or zk badges on a blockchain. Launching with Personae Labs!
Indistinguishability Obfuscation (iO)
There has been a lot of recent progress and interest in iO (Indistinguishability Obfuscation). This session will cover topics from the basics to theory and attempts at practical implementations—plus ways of breaking these attempts.
Multi-Party Fully Homomorphic Encryption (MP-FHE) in Practice
In this session, we will break down the FHE game Frogzone, which required advancements at every layer of the cryptographic software stack: cryptography libraries and tooling, circuits, software infrastructure, and even DevOps. We will also cover additional use cases for FHE at a technical level.