Still learning how should I report my updates, but i hope this is a good explanation of what i have been focusing on the week 0 and week 1.

My topic for the cohort will probably be around Verkle Tries. Still not sure if i will focus more on the lower-level cryptography behind Verkle Tries or the high-level implementation of Verkle Tries.

I'm invloved in the implemenetation of Verkle Tries in Java:
https://github.com/Quadratic-Labs/VerkleTries_Besu

and last week i did a hackathon project in order to understand more low-level cryptography behind verkle tries:

https://github.com/lambdaclass/lambdaworks/pull/513

It is an implementation of bandersnatch curve using lambdaworks cryptographic library.

Goal was to understand why this specific curve is chosen to be used in Verkle Tries. Or why this curve is performant for Pedersen commitment + IPA used as a polynomial commitement scheme in Verkle Tries.

Possible next steps of research and implementation:

  • implement GLV endomorphism for bandersnatch eliptic curve
  • continue Java verkle tries implementation (for Besu)
  • learn about halo2-lib and think about in-circuit verkle tries (or start with eliptic curve at first)
Select a repo