-
fundiswithsifu[mHow is RingCt compared to zk stark? Advantage, disadvantage, difference
-
Reuben[m]Zkstark can support global anonymity sets and pretty fast verification. The underlying crypto is quantum resistant but need to examine the other components too. It's a lot more complex though but the main stickler is that proof sizes are like 50kB currently
-
Reuben[m]RingCT has lower theoretical anonymity but good performance characteristics for a pretty well understood design. Needs to change in the long run though
-
Reuben[m]I'm not sure if a full circuit has been designed for use in a tx privacy setting as a complete privacy protocol though but I may be wrong
-
Reuben[m]I can't quite remember if proving times have been improved too
-
slave_blockerhello
-
slave_blockeri still did not get it, im here reading the design.md of randomx, and it is saying that while mining executes 8 chained programs, the verification takes only 1 program?
-
slave_blockershould verification not be exactly the same as proving?
-
fundiswithsifu[m<Reuben[m]> "Zkstark can support global..." <- Zkstark 50kB
-
fundiswithsifu[mWhat is size for ring ct?
-
fundiswithsifu[mHope we can make transition easily when ringCt is insufficient
-
sech1slave_blocker it doesn't say anything like this about verification
-
slave_blockerok thanks
-
slave_blockermy mistake
-
slave_blockeranother question :
-
slave_blockerThe program executed by the VM has the form of a loop consisting of 256 random instructions.
-
slave_blocker?
-
slave_blockerif i look at :
-
slave_blocker
-
slave_blockeri see 8 programs ...
-
slave_blockeror does every program have a loop (or more) inside it?
-
sech1each of 8 programs has this loop
-
slave_blockeris the loop identical in each program? What is the max iteration count?
-
fundiswithsifu[mDo monero lab plan to use zk stark on monero?
-
hyczk starks are still computationally impractical
-
fundiswithsifu[mThen how do monero plan to be quantum resistant?
-
Reuben[m]There's an open research task for that already
-
Reuben[m]
-
slave_blockeri heard that zcash had found a way, with halo arc to circumvent the "trusted setup"? Is this correct?
-
fr33_yourself[m]<moneromooo> "So close to nobody will buy..." <- Couldn't Russians use Tor to connect to onion nodes and process transactions while staying connected to the "larger" chain/network?