Skip to main content

Article

๐Ÿ“„๏ธ Completely Recursive SNARK Circuit - The Savior of "Play to Earn"

In the "play to earn" concept, players hope to earn profits while enjoying the game. However, GameFi is constrained by high GAS costs and an underdeveloped blockchain gaming ecosystem, leading to challenges in achieving player acceptance due to issues in security and transparency. This pushes GameFi towards an extreme of constantly optimizing economic models and profit mechanisms, which shortens the earning cycle and may ultimately result in a crash. In the new cycle, the widespread adoption of L2, cross-chain gaming engines, and ZK technology will bring on-chain privacy and more complex on-chain gaming mechanisms to users. This addresses issues of performance, privacy, and trust, shifting focus from Ponzi schemes to more trustworthy and intricate on-chain games. Application-layer ZK technology enables game developers to easily create on-chain strategic games tailored for interactive privacy scenarios, bringing new possibilities to complex and trustworthy (on-chain) gaming scenarios. Salus will discuss in this article how new application-layer ZK technology assists in innovative gaming scenario development.

๐Ÿ“„๏ธ zkConvex - A Large-Scale Anonymous Electronic Voting Scheme Based on zk-SNARKs

A large-scale anonymous electronic voting scheme based on zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Argument of Knowledge) offers unique value and significance in ensuring the anonymity, security, and reliability of voting. zk-SNARKs is a cryptographic technology that enables one party (the prover) to prove to another party (the verifier) that a statement is true, without revealing any information other than the truth of the statement itself. Applying zk-SNARKs to electronic voting brings several key advantages:

๐Ÿ“„๏ธ Analysis of a New Zero-Knowledge Proof Vulnerability: Missing Polynomial Normalization after Arithmetic Operations

ZEROBASE(formerly Salus) has added a new type of ZK vulnerability to the zk-bug-tracker library of 0xPARC, Missing Polynomial Normalization after Arithmetic Operations. This vulnerability has been reviewed by Kyle Charbonnet, the Ethereum Foundationโ€™s PSE security team leader. This vulnerability can break assumptions and lead to erroneous computations, or cause denial of service attacks through rust panic. To better understand this vulnerability, we will illustrate with a specific example in the Zendoo library. Everyone, please stay vigilant about this vulnerability.

๐Ÿ“„๏ธ Zero-Knowledge Proof Vulnerability Analysis and Security Auditing

Abstract: Zero-Knowledge Proof (ZKP) technology marks a revolutionary advancement in the field of cryptography, enabling the verification of certain information ownership without revealing any specific details. This technology, with its paradoxical yet powerful characteristics, provides a solid foundation for a wide range of applications, especially in enhancing the privacy and security of blockchain technology and other cryptographic systems. As ZKP technology increasingly becomes a part of the blockchain infrastructure, its importance for security and completeness becomes more pronounced. However, the complexity of ZKP implementation and the rapid iteration of the technology introduce various vulnerabilities, challenging the privacy and security it aims to offer.