The game proceeds in rounds, each of which consists of a private action round and a public voting round. The game end condition is checked after each of these inner rounds.
7/31/2023March 07, 2022 This puzzle was called "There's something in the AIR", and was based around a STARK Prover and Verifier built with Winterfell that used a broken AIR. There were two possible solutions that exploited two different sets of missing constraints within the AIR. The puzzle involves the following: private key: 4 field elements (priv_key) public key: hash(priv_key, [0, 0, 0, 0]) access set: a merkle tree whose leaves are the public keys in the set. Membership in the access set can be verified by computing the merkle root of the access set from a member's public key and the corresponding merkle path. topic: a string representing the topic on which members of the access set can vote
3/7/2022by grjte This puzzle, built by Aleo, marks the halfway point of the incredibly fun learning experience that is ZK Hack. If you haven't had a chance to participate yet, I highly recommend jumping in, even if you are completely new to zero knowledge and cryptography. Speaking as someone who hadn't explored either one prior to ZK Hack, the background resources, events, and puzzle challenges provide a fantastic bootcamp. Onwards to the puzzle! The Setup You can get access the puzzle repo here. The puzzle description describes the setup for a new "zero-knowledge inner-product proof" and challenges us to recover the prover's secret $\vec{a}$. Here it is for reference:
12/8/2021by grjte Another week, another fun ZK Hack puzzle to solve! This week's puzzle comes from the team at Anoma. The puzzle repo with the description is here. For this puzzle, there were a few resources that I found particularly helpful for learning about the roots of unity (aka the evaluation domain): PLONK By Hand Part 1 and Part 2 Vitalik's article on PLONK
12/8/2021or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up