or
or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up
Syntax | Example | Reference | |
---|---|---|---|
# Header | Header | 基本排版 | |
- Unordered List |
|
||
1. Ordered List |
|
||
- [ ] Todo List |
|
||
> Blockquote | Blockquote |
||
**Bold font** | Bold font | ||
*Italics font* | Italics font | ||
~~Strikethrough~~ | |||
19^th^ | 19th | ||
H~2~O | H2O | ||
++Inserted text++ | Inserted text | ||
==Marked text== | Marked text | ||
[link text](https:// "title") | Link | ||
 | Image | ||
`Code` | Code |
在筆記中貼入程式碼 | |
```javascript var i = 0; ``` |
|
||
:smile: | ![]() |
Emoji list | |
{%youtube youtube_id %} | Externals | ||
$L^aT_eX$ | LaTeX | ||
:::info This is a alert area. ::: |
This is a alert area. |
On a scale of 0-10, how likely is it that you would recommend HackMD to your friends, family or business associates?
Please give us some advice and help us improve HackMD.
Do you want to remove this version name and description?
Syncing
xxxxxxxxxx
ZkpComRef: Deployment Case Studies
Please read the editorial disclaimer.
Index
Collaboration Instructions
Context. This page was prepared for a breakout session during the ZKProof 4th workshop. The goal of this document is to receive concurrent/collaborative suggestions of content that may be useful for the "ZKProof Community Reference" (ZkpComRef).
Goal. We will create a new section in ZkpComRef that containing brief case studies describing real-world deployment of ZK proof system, and lessons learned from them.
Content. Each "case study" should briefly describe a real-world deployment of a ZKP system, in about 2 pages. The aim is to enable a reader to gain insight on what it takes to actually implement a ZKP system that resolves a real-world application need. Each case study covers an application context, implementation choices, and lessons learned.
Expectations. This material is collected for inclusion into ZkpComRef, subject to review and editing by the ZKProof editors. It is licensed under CC-BY 4.0 International License. After inclusion in the ZkpComRef, it may be updated as part of the usual ZkpComRef editorial process.
Contributions. To contribute a new case study, duplicate the template below, fill in the details, and send an email to "editors at zkproof dot com" to confirm your contribution.
Guidelines:
Rules. All interaction/contributions must abide to the ZKProof Charter, IP Policy and Code of Conduct.
Case study TEMPLATE
Do not edit or delete this template; instead, copy-paste its content inside one of the available suggestion placeholders below, and then edit it there.
Replace all italicized text, about ¼ page per item.
Contributors: [fill in]
1. Application context
Application
Contextualize the application and the privacy needs/goals for this deployment.
ZK statement
_What's to prove? Describe the statement (relation, instance, witness) being proven in ZK. _
Requirements
What are the implementation requirements imposed/favored by the application? Examples: proof size, verification time, proving time, privacy/integrity requirements (statistical/computational? bit-level? postquantum?), setup requirements, integration with existing codebase/language.
2. Implementation
Backend
Which cryptographic backend (scheme and software) were chosen, and why? Why are the backend’s native constraint system representation and resulting complexity suitable for the application (e.g., uniformity, special structure, arithmetic vs boolean)?
Frontend
What decisions were made on how to generate/express the constraint system using a library, compiler, gadgets, API, etc. Mention the relevant tools.
Setup
Does the system require a trusted setup, such as a Structured Reference String (SRS) or a Uniform Reference String (URS)? If so, how was it generated (e.g., an MPC ceremony)?
3. Lessons learned
Quantitative evaluation
Constraint system size, proving/verification time, proof size, instance size, proving/verification key size, SRS size( (if any), MPC ceremony time, etc. Report helpful concrete benchmarks.
Challenges faced
What hurdles were encountered and should be planned for, or avoided?
Possible improvements
In retrospect, what can be done better or given subsequent progress? Are there new schemes/backends/frontends that should be considered if someone builds a similar application from scratch? Or were there issues in the MPC ceremony?
Case study 1: FILL IN
[Content here]
Case study 2: FILL IN
[Content here]
Case study 3: FILL IN
[Content here]