Mhoc Yar

470 posts

Mhoc Yar banner
Mhoc Yar

Mhoc Yar

@FHEweb

This hobbyist is deep into DAG consensus and horizontal scaling. Interest in Threshold crypto and ZK proofs. FHE dreamer

Katılım Temmuz 2021
1.4K Takip Edilen113 Takipçiler
Mhoc Yar retweetledi
Uri Klarman ⚔️
Uri Klarman ⚔️@uriklarman·
imo you're missing Censorship Resistance point we're NOT trying to protect users from their Tx ignored by evil leader we're protecting MMs from their stale quotes being taken advantage of and we solved it with propAMMs, whose updates pay x100 more (per CU) so ordering in-protocol by fee/CU solves it, except we have leaders who *intentionally* ignores these higher-paying updates THAT is why CR is important - bc it takes away from validators the ability to order & exclude Tx - leading to predictable execution x.com/uriklarman/sta…
English
1
1
4
323
Mhoc Yar retweetledi
Albert Garreta | Nethermind
Introducing Zinc+, where we tackle the problem of arithmetizing and proving computations unfriendly to finite fields. Examples: classic hashes, hash + signature, lattice ops., etc. We prove 7 SHA-256 compressions followed by the ECDSA MSM with:
Albert Garreta | Nethermind tweet media
English
12
31
154
16.7K
Mhoc Yar retweetledi
JP Aumasson
JP Aumasson@veorq·
Asked Opus 4.7 to check the proofs in 20 crypto papers (10 Eurocrypt, 10 recent ePrint): it reported gaps/errors in 19. I verified a few simple issues but couldn't investigate the rest, and some are likely false positives. Most results probably hold, one EC paper is shaky. DM me for details and Opus reports.
English
16
13
91
15.3K
Mhoc Yar retweetledi
Warp
Warp@warpdotdev·
Warp is now open-source.
English
414
962
7.8K
2.8M
Mhoc Yar retweetledi
OtterSec
OtterSec@osec_io·
We found the same Fiat-Shamir bug in six independent zkVMs. The result: an attacker can bypass the cryptography entirely and prove mathematically impossible statements (like minting $1M out of thin air). Full breakdown ↓
OtterSec tweet media
English
34
139
869
117.7K
Mhoc Yar retweetledi
zkSecurity
zkSecurity@zksecurityXYZ·
Both protocols used Circom + snarkjs, the most common stack for Groth16 deployments. The bug? They skipped Phase 2 of the trusted setup: the circuit-specific contribution step. Without it, the verification key's γ and δ parameters are both set to the same value: the G2 gens
English
1
2
32
3.6K
Mhoc Yar retweetledi
ZK Hack
ZK Hack@__zkhack__·
- OOPS: One-time Oblivious Polynomial Signatures - Argo MAC: Garbling With Elliptic Curve MACs - The Billion Dollar Merkle Tree - Aborting Random Oracles: How to Build Them, How to Use Them - Private Proofs of When and Where - Round-Optimal Pairing-Free Blind Signatures - BABE: Verifying Proofs On Bitcoin Made 1000x Cheaper - Jindo: Practical Lattice-Based Polynomial Commitment for Zero-Knowledge Arguments - A SNARK for (Non-)Subsequences With Text-Sub-Linear Proving Time - Policy-based Access Tokens: Privacy-Preserving Verification for Digital Identity - zkRNN: Zero-Knowledge Proofs for Recurrent Neural Network Inference - Formalizing Privacy In Decentralized Identity: A Provably Secure Framework With Minimal Disclosure - Lether: Practical Post-Quantum Account-Based Private Blockchain Payments - HYPERSHIELD: Protecting the Hypercube MPC-in-the-Head Framework Against Differential Probing Adversaries Without Masking - Designated-Verifier Dynamic zk-SNARKs with Applications to Dynamic Proofs of Index - Structured Matrix Constraint Systems for Architecture-Hiding Succinct Zero-Knowledge Proofs for Neural Networks
English
1
1
7
521
Mhoc Yar retweetledi
patrickogrady.xyz
patrickogrady.xyz@_patrickogrady·
Today, I’m excited to (finally) welcome Minimmit to the @commonwarexyz Library. Implemented independently by both @GTE_XYZ and @vex_0x, Minimmit clobbers our benchmarks: [USA]: 51ms blocks (-40%) | 87ms final p75 (-35%) [Global]: 142ms blocks (-30%) | 269ms final p75 (-15%)
patrickogrady.xyz tweet mediapatrickogrady.xyz tweet mediapatrickogrady.xyz tweet mediapatrickogrady.xyz tweet media
English
21
30
211
60.1K
Mhoc Yar retweetledi
Ziyi Guan
Ziyi Guan@ziyiguan99·
We have identified a bug in the proof and currently do not know how to fix it. We leave the eprint as is with more info on what the bug is, because we think some ideas can still be useful.
Ziyi Guan@ziyiguan99

Happy to share new work with Eylon! We construct the first SNARG for NP from sub-exponential LWE, via a PCP + LWE vector commitment where Fiat–Shamir in Micali is securely instantiated with correlation-intractable hashing. eprint.iacr.org/2025/2328 😉

English
13
13
101
19.4K
Mhoc Yar retweetledi
Giacomo Fenzi
Giacomo Fenzi@GiacomoFenzi·
Super exciting work from Ziyi and Eylon! They construct the first SNARG for NP in the *plain* model (no random oracle) using *only* (subexponential) LWE! Perhaps most surprisingly, the SNARG is one (very clever) instantiation of the classical Killian-Micali construction!
Ziyi Guan@ziyiguan99

Happy to share new work with Eylon! We construct the first SNARG for NP from sub-exponential LWE, via a PCP + LWE vector commitment where Fiat–Shamir in Micali is securely instantiated with correlation-intractable hashing. eprint.iacr.org/2025/2328 😉

English
1
2
22
1.4K
Mhoc Yar retweetledi
Justin Thaler
Justin Thaler@SuccinctJT·
1/ Quantum computing predictions lately range from "public key cryptography will be broken in 2 years" to "it's a century away." Both are wrong. My latest post explains what publicly known progress actually supports — and what blockchains should do about it. Thread below 🧵
Justin Thaler tweet media
English
76
89
446
100K
Mhoc Yar retweetledi
Nico
Nico@nico_mnbl·
wrote a thing about the recent proximity things. Let's see if we can explain proximity gaps without getting lost in moon math! Find it on the @zksecurityXYZ blog, link below
Nico tweet media
English
1
11
61
5.4K
Mhoc Yar retweetledi
toly 🇺🇸
toly 🇺🇸@toly·
The mcp batch frame, let’s say 20ms, would mean that everyone within a 10ms lightcone gets the same fair auction outcome. So the mcp region can be deployed near the signal source, like Binance or CB or CME, and the users can collocate in that region anywhere within 10ms. So no one has a structured advantage because 10ms is fixable over a weekend.
English
2
1
14
1.5K
Mhoc Yar retweetledi
Nico
Nico@nico_mnbl·
proximity gap result: the distance between my understanding and the latest findings is increasing exponentially
English
5
11
95
5.2K
Mhoc Yar retweetledi
Ron Rothblum
Ron Rothblum@ronrothblum·
Worried that teams are apparently using systems with 80 (conjectured) bits of security in production, to secure potentially billions of dollars... Really hope the community settles on at least 100 bits, as also proposed by @SuccinctJT back in 2022 a16zcrypto.com/posts/article/…
English
10
2
27
7.9K
Mhoc Yar retweetledi
Daniel J. Bernstein
Daniel J. Bernstein@hashbreaker·
Further degradation of lattice security levels: eprint.iacr.org/2025/1910 A few bits demonstrated experimentally; ~10 bits at cryptographic sizes? Next step would be to work out the impact of collision searches and HGJ-style techniques (see Section 4.3 of #hybrid" target="_blank" rel="nofollow noopener">cr.yp.to/papers.html#hy…).
English
4
17
62
9.6K