Latest news about Bitcoin and all cryptocurrencies. Your daily crypto news habit.
The Electric Coin Company has announced Halo, a proposed cryptographic solution to the trusted setup flaw in Zcash.
Electric Coin Company (ECC), which launched and supports the development of privacy-coin Zcash recently published a paper called: Halo: Recursive Proof Composition without a Trusted Setup.
On Sept. 10, ECC announced in a blog post that engineer and cryptographer Sean Bowe had discovered a way of âcreating practical, scalable and trustless cryptographic provingâ techniques, which claims to end a 10-year-long pursuit by the cryptography communities. He called the solution Halo.
Halo takes away the need for a âtrusted setupâ
The strategy of Halo reportedly holds the potential of compressing limitless amounts of computation, creating auditable distributed systems, building highly scalable blockchains and protecting privacy. The article reads:
âThe concept is a proof that verifies the correctness of another instance of itself, allowing any amount of computational effort and data to produce a short proof that can be checked quickly.
Seanâs discovery involves ânested amortizationâ â repeatedly collapsing multiple instances of hard problems together over cycles of elliptic curves so that computational proofs can be used to reason about themselves efficiently, which eliminates the need for a trusted setup.â
In cryptography, a trusted setup is when a set of initial parameters are created that at a later stage will be destroyed. It is called a trusted setup because one must trust the person who created the parameters to destroy them rather than keep them for future illicit gains.
The Electrical Coin Company points out that trusted setups are difficult to coordinate, could present a systemic risk and always have to be repeated for each major protocol upgrade. According to ECC, the removal of trusted setups should present a substantial improvement in safety for upgradeable protocols.
The authors of the paper, Sean Bowe, Daira Hopwood and Jack Grigg, claimed that they obtained the first practical example of recursive proof composition without a trusted setup, using only ordinary cycles of elliptic curves. They added:
âOur primary contribution is a novel technique for amortizing away expensive verification procedures from within the proof verification cycle so that we could obtain recursion using a composition of existing protocols and techniques. We devise a technique for amortizing the cost of verifying multiple inner product arguments which may be of independent interestâ
Disclaimer
The views and opinions expressed in this article are solely those of the authors and do not reflect the views of Bitcoin Insider. Every investment and trading move involves risk - this is especially true for cryptocurrencies given their volatility. We strongly advise our readers to conduct their own research when making a decision.