Devcon Archive logo
Devcon Forum Blog
  • Watch
  • Event
    Event: background logo
    • Devcon 7
    • Devcon 6
    • Devcon 5
    • Devcon 4
    • Devcon 3
    • Devcon 2
    • Devcon 1
    • Devcon 0
  • Categories
    Categories: background logo
    • Cryptoeconomics
    • Devcon
    • Developer Experience
    • Coordination
    • Core Protocol
    • Layer 2s
    • Real World Ethereum
    • Cypherpunk & Privacy
    • Security
    • Applied Cryptography
    • Usability
  • Playlists

Suggested

Loading results..

View all

About Devcon —

Devcon is the Ethereum conference for developers, researchers, thinkers, and makers.

An intensive introduction for new Ethereum explorers, a global family reunion for those already a part of our ecosystem, and a source of energy and creativity for all.

  • Watch
  • Devcon
  • Forum
  • Blog

Get in touch

devcon@ethereum.org

Subscribe to our newsletter

Crafted with passion ❤️ at the Ethereum Foundation

© 2025 — Ethereum Foundation. All Rights Reserved.

devcon 7 / tlsnotary applying mpc and interactive zk to prove web2 data

  • YouTube
TLSNotary: Applying MPC and interactive ZK to prove web2 data preview
  • Details

TLSNotary: Applying MPC and interactive ZK to prove web2 data

Duration: 00:00:00

Speaker: sinu

Type: Lightning Talk

Expertise: Intermediate

Event: Devcon

Date: Nov 2024

Diving into TLSNotary, a protocol which leverages multi-party computation and interactive ZK to prove the authenticity and provenance of any data on the web to another party. Summary: 1. What it is and what it can do 2. High-level overview of how it works 3. Details on the underlying MPC and ZK protocols that we use 4. How to use it

Categories

IdentityZKPMPCoracleIdentityMPCZKP
  • Related
Unlock Web2 Data with TLSNotary: Hands-On Workshop preview
Devcon
Workshop
1:25:23

Unlock Web2 Data with TLSNotary: Hands-On Workshop

Join our hands-on workshop to master **TLSNotary**! Dive into multi-party-TLS and learn to prove and verify online data authenticity to a third-party verifier while ensuring privacy. We’ll start with small examples in Rust and build up to custom browser extensions in TypeScript to collect and verify private user data. Bring your laptop, bring a friend, and learn together. Get ready to unlock and compose Web2 data in innovative ways.

Keynote: The Universal Cryptographic Adapter preview
Devcon
Talk
19:46

Keynote: The Universal Cryptographic Adapter

The "secret" third affordance of Zero-Knowledge proof after 1) Privacy and 2) Succinctness is Interoperability. ZK enables us to continuously refactor data, aggregate it from different sources, and transforming it without loosing its integrity. Starting with the Zupass project, and now with the broader adoption of the POD and GPC format, 0xPARC has been exploring using ZK for data sovereignty and creating more interoperable data ecosystem. We will cover our learnings and progress in this talk.

Anon-Aadhaar Protocol using Halo2 and Noir preview
Devcon
Lightning Talk
10:26

Anon-Aadhaar Protocol using Halo2 and Noir

We will introduce the Anon-Aadhaar protocol which is an anonymity layer on top of a social security like Scheme (Aadhaar card) for Indian citizens using Zero-knowledge proofs. This can be used for getting many basic services in India like electricity, banking, etc. We will describe the implementation results of the protocol using Halo2 and Noir. We will also provide a comparative analysis of benchmarks using different backends like Circom, Halo2 and Noir.

Keynote: Programmable Cryptography and Ethereum preview
Devcon
Talk
25:17

Keynote: Programmable Cryptography and Ethereum

Programmable Cryptography is a "second generation" of cryptographic primitives - primitives that allow arbitrary programs to be executed "inside of" or "on top of" cryptographic objects. Programmable cryptography provides three key affordances that complement and amplify the affordances of Ethereum--verifiability, confidentiality, and non-interactivity. We'll discuss how these technologies can reshape the Internet over the next 50 years.

How To Hallucinate A Server preview
Devcon
Talk
22:46

How To Hallucinate A Server

A Hallucinated Server is a virtual server whose execution is cryptographically simulated by users, using "multiplayer" privacy technologies like multi-party computation or fully homomorphic encryption. Today, thanks to recent advancements in MPC and FHE, we have the technology to build the first fully Turing-complete hallucinated servers. We discuss the underlying technologies, and how we've used them to build several proof-of-concept applications.

The Blind Man's Elephant: a product vision towards private identities preview
Devcon
Lightning Talk
11:46

The Blind Man's Elephant: a product vision towards private identities

A short talk introducing the concepts of key properties we want to achieve in private ZK identities. Sparkling concepts like SSI and DIDs and why blockchains are the best way to ensure that. Finally it concludes with simple ZK and data-structure constructions and different alternatives that are seeking to provide this characteristics. In short, this is a lightning overview of the space, it's desired features and different approaches to achieve them.

MPC Tooling or How to create MPC apps preview
Devcon
Lightning Talk
08:09

MPC Tooling or How to create MPC apps

Let's get into the state of the art of MPC development: we'll discuss different MPC schemes, current MPC tooling & how you can create MPC apps today. We'll cover the tech stack from a frontend level (e.g. MPC compilers) to a backend - and of course how we can combine them.

Programmable Cryptography and the future of the Internet preview
Devcon
Talk
25:25

Programmable Cryptography and the future of the Internet

You rarely hear of issues at the networking layer of the Internet: networking companies are running utilities business: they are fungible and can be swapped if distrusted. Most of the value captured on the Internet -- and also most abuse -- happen at the Compute and Data layer of the Web. Ethereum gave us a glimpse of a fundamentally different architecture for Compute and Data than Client/Server architecture.We think the Internet is 1/3 complete, and that programmable cryptography can finish it.

Leveraging High-Performance Computing for Efficient STARK Provers preview
Devcon
Talk
27:30

Leveraging High-Performance Computing for Efficient STARK Provers

Zero-Knowledge Proof (ZKP) protocols' applicability hinges on the prover's ability to efficiently generate proofs. This talk explores the computational aspects affecting ZKP performance, specifically focusing on STARK provers. We will analyze performance across high-performance and standard computing architectures and interpret results by examining key workload characteristics. From this understanding, we can project ZKP capabilities in future scenarios.

STARK proofs ELI5 preview
Devcon
Lightning Talk
08:16

STARK proofs ELI5

Let's face it, ZK proofs are intimidating. But they don't have to be! ZK proofs are complex not because of the depth math they use, but because of the large number of fields of mathematics they leverage features from. In this talk, we'll break down STARK proofs into simple blocks and colorful analogies so that you get a good high level overview of how they work