π° A collection of awesome knowledge about Web 3.0
Throughout this list you'll find emojis next to resources, here's what each of them indicates:
π Scientific paper
π Course, long series or complete series
π£ Collection of valuable resources
π« A programming library
π Documentation
π» Official Website
π Specific, written tutorial
πΉ Video tutorial
π« Stellar resource, not from this earth
π Search
π‘ Utility
π° Grant
β Decentralized Institution
π° News
- Web 3.0 Definitions
- Cryptography
- Constraint Systems and Arithmetization
- Zero Knowledge
- Decentralized Finance
- Decentralized Key Management
- Decentralized Identity
- Side Chain Committees
- Decentralized Data Management
- Secure Computation
- Privacy-preserving Computation
- Decentralized Computation
- Systematizations of Knowledge (SoK)
- Application Development
- Programming
- Research
- Companies
- Blockchain Projects
- News
- π£ Blockchain Roadmap - Everything you need to know
- π Blockchains, crypto, & web3: Connections, models, more, all episodes
- π Web5: The Decentralized Web Platform
- π What is Web5, Jack Dorseyβs latest idea?
- π Web3 is Self-Certifying
- π Decentralized Identity: Passport to Web3
- π« A Graduate Course in Applied Cryptography (Dan Boneh)
- π£ Crypto Stackexchange
- π Cryptopals - Collection of challenges on basic cryptography
- π Notes on Cryptography and Computer Security
- πΉ π« ZK Hack - ZK Whiteboard sessions
- π David Crypto Blog
- πΉ Finite Fields in Cryptography: Why and How
- explained-from-first-principles: Number theory
- introduction to mathematical cryptography
- π Explaining BLS12β381 β¦ The βZero Knowledge Proofβ Curve
- π Elliptic Curve Cryptography: a gentle introduction
- π BLS12-381 for the rest of us
- Elliptic Curve Cryptography (ECC)
- A survey of elliptic curves for proof systems
- The animated elliptic curve
- An Illustrated Guide to Elliptic Curve Cryptography Validation
- π Explaining BLS12β381 β¦ The βZero Knowledge Proofβ Curve
- πΉ 6 4 Constructing compression functions 8 min
- πΉ SHA-256 | COMPLETE Step-By-Step Explanation (W/ Example)
- Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
- Notes for Lecture 27
- Penumbra Value Commitments
- Efficient Functional Commitments: How to Commit to a Private Function
- Polynomial Commitment with a One-to-Many Prover and Applications
- Commit-Chains: Secure, Scalable Off-Chain Payments
- πΉ Lecture 10 Premiere: Privacy on the Blockchain
- π Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
- π An Expressive (Zero-Knowledge) Set Accumulator
- π Some ways to use ZK-SNARKs for privacy
- π Accelerating Penumbra's Merkle Tree by up to 4,000,000x
- Universally Composable Security: A New Paradigm for Cryptographic Protocols
- Security and Composition of Multiparty Cryptographic Protocols
- Security and Composition of Cryptographic Protocols: A tutorial
- iUC: Flexible Universal Composability Made Simple
- Obtaining Universally Composable Security: Towards the Bare Bones of Trust
- Security and composition of cryptographic protocols: a tutorial (part I)
- π Mithril: Stake-based Threshold Multisignatures
- π Threshold Cryptography as a Service (in the Multiserver and YOSO Models)
- πΉ Fast Multiparty Threshold ECDSA with Fast Trustless Setup
Arithmetization is a preliminary process that derives an alternative circuit representation that allows for a more efficient proof computation. In general, the "backend" of a SNARK considers pre-processing and formatting of an arithmetic or boolean circuit. The "frontend" of a SNARK describes the actual proof algorithm, which leverages the intermediate description emitted from the backend to efficiently prove & verify that a prover knows a specific witness that satisfies the circuit at hand. Most proof algorithms make use of pairings, where a specific elliptic curve is leveraged to homomorphically compute circuit satisfiability without disclosing the witness of the prover in plain.
Important for pairing based SNARKs, such as Groth16.
- π R1CS & QAP Overview
- R1CS & QAP Implementation Example
- Paper on DIZK that includes a good description of Groth16, R1CS and QAP
- π PLONK Arithmetization
- π Halo2
- πΉ ZK HACK mini - Introduction to Plonky2
Important for zkEVM execution of SNARKS.
- π« Proofs, Arguments and Zero-Knowledge (Justin Thaler)
- π£ ZK Research
- π£ ingopedia: A curated list of ZK resources and links.
- πΉ CESC ZKP Workshop
- π BLS12-381 For The Rest Of Us
- π zkSNARKs in a nutshell
- π A Brief Dive Into zk-SNARKs and the ZoKrates Toolbox on the Ethereum Blockchain
- π Quadratic Arithmetic Programs: from Zero to Hero
- π Zk-SNARKs: Under the Hood
- π An approximate introduction to how zk-SNARKs are possible
- π Demystifying Zero Knowledge Proofs
- π What are zk-SNARKs?
- π Zero-Knowledge Proofs: STARKs vs SNARKs
- π Non-Interactive Zero-Knowledge Proofs for Composite Statements
- π Delendum.xyz: ZK in Identity
- π£ Awesome-PLONK
- π Polynomial IOP PLONK - Introduction Dan Boneh
- PlonK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
Todo: Separate the below list and filter universal, trusted transparent setup, etc.
- Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
- SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
- Many-out-of-many Proofs
- Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
- Proof of Replication
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- ZoKrates - Scalable Privacy-Preserving Off-Chain Computations
- LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
- πΉ Youtube: Discrete Log based Zero-Knowledge Proofs - Dan Boneh, Stanford
- ZKProof Community Reference
- π Lecture 5: Proofs of Knowledge, Schnorrβs protocol, NIZK
- π Doubly-efficient zkSNARKs without trusted setup
- π zkStudyClub: PCD without zkSNARK with Pratyush Mishra (UC Berkeley) & Benedikt BΓΌnz (Stanford)
- π Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
- π Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
- π Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
- π Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers
- π Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority*
- π A Gentle Introduction to Yaoβs Garbled Circuits
- πΉ MPC-Mike Rosulek-Lecture 2: Advanced Techniques and Optimizations for Garbled Circuits
- πΉ MPC-Mike Rosulek-Lecture 1-3: Overview of Secure Computation and Yao's Protocol
- π Introduction Vector Oblivious Linear Evaluation (Peter Scholl)
- π Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits
- π Mac'N'Cheese Carsten Baum
- π QuickSilver Kang Yang
- π AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication*
- tbDEX: A Liquidity Protocol v0.1
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
- Marvel DC: A Blockchain-Based Decentralized and Incentive-Compatible Distributed Computing Protocol
- Towards Efficient Data Valuation Based on the Shapley Value
- AuthSC: Mind the Gap between Web and Smart Contracts
- π A Formal Treatment of Hardware Wallets
- π On the Usability of Authenticity Checks for Hardware Security Tokens
- π Whatβs in Your Wallet? Privacy and Security Issues in Web 3.0
- π£ Kantara Identity
- π£ Blockchain and Identity
- π Where to use a blockchain in non-financial applications?
- π iden3 Blog
- π Anonymous Credential Part 2: Selective Disclosure and CL Signature
- π The BBS Signature Scheme
- π tutorial anoncreds
- π Zero Knowledge in DiDs and Social Networks
- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes
- Group Signatures: Authentication with Privacy
Todo: separate into on-chain and off-chain credential systems.
- π Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies
- π Decentralized Trust Management
- π NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging
- π Compact Certificates of Collective Knowledge
- π CA Authorization Smart Contract Architecture
- π On Enforcing the Digital Immunity of a Large Humanitarian Organization
- π Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management β A Consolidated Proposal for Terminology
- π Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
- π Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
- π Towards Self-sovereign, Decentralized Personal Data Sharing and Identity Management
- π Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts
- π Anonymous Credentials Light
- π SCPKI: A Smart Contract-based PKI and Identity System
- π Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
- π With a Little Help from My Friends: Constructing Practical Anonymous Credentials
- π Towards Smart Contract-based Verification of Anonymous Credentials
- π Exploring Web3 From the View of Blockchain
- π zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
- π Decentralized Anonymous Credentials
- π A note on anonymous credentials using BLS signatures
- π Zero-knowledge credentials with deferred revocation checks
- π Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
- π Anonymous credentials 2.0
- π An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- π A Truly Self-Sovereign Identity System
- π SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
- π ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi
Reputation and recommendation-based trust systems connected to blockchain verification.
- π Portal: Time-Bound and Replay-Resistant Zero-Knowledge Proofs for Single Sign-On
- π Privacy-Preserving Reputation Systems based on Blockchain and other Cryptographic Building Blocks: A Survey
- π A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation
- π Reflections on trusting distributed trust
- π Janus: Fast Privacy-Preserving Data Provenance For TLS
- π ORIGO: Proving Provenance of Sensitive Data with Constant Communication
- π Zero-Knowledge Middleboxes
- π Zombie: Middleboxes that Donβt Snoop
- π Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability
- π Blind Certificate Authorities
- π Chainlink 2.0: Next Steps in the Evolution of Decentralized Oracle Networks
- π Chainlink Off-chain Reporting Protocol
- π Town Crier: An Authenticated Data Feed for Smart Contracts
- π DECO: Liberating Web Data Using Decentralized Oracles for TLS
- π PECO: methods to enhance the privacy of DECO protocol
- π Practical Decentralized Oracle Contracts for Cryptocurrencies
- π Discreet Log Contracts
- πΉ Youtube: Fan Zhang- "Connection Blockchains to the Real World"
- π How DECO Enables Undercollateralized DeFi Lending: A Proof of Concept With Teller
- π Cryptoeconomic Security for Data Availability Committees
- π Balance: Dynamic Adjustment of Cryptocurrency Deposits
- π CALYPSO: Private Data Management for Decentralized Ledgers
- π Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams
- π Witness Encryption and its Applications
- π LedgerView: Access-Control Views on Hyperledger Fabric
- π WAVE: A Decentralized Authorization Framework with Transitive Delegation
- π Decentralizing Privacy: Using Blockchain to Protect Personal Data
- π Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives
- π Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- π A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
- π Abuse Resistant Law Enforcement Access Systems
- π TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control
- π Interactive Authentication
- π Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
- π OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
- π Building a Secure Data Market on Blockchain, Youtube
- π Zeph: Cryptographic Enforcement of End-to-End Data Privacy
- π A Demonstration of Sterling: A Privacy-Preserving Data Marketplace
- π Towards Building a Responsible Data Economy (Dawn Song, UC Berkeley), Youtube
- π Federated Authorization over Access to Personal Data for Decentralized Identity Management
- π FileBounty: Fair Data Exchange
- π Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
- π Towards Blockchain-based Auditable Storage and Sharing of IoT Data
- π Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
- π NFTs for Art and Collectables: Primer and Outlook
- π IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3)
- π Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks
- π Secure Untrusted Data Repository (SUNDR)
- π DORY: An Encrypted Search System with Distributed Trust
- π Verifiable Set Operations over Outsourced Databases
- π When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach
- π vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
- π Can a Public Blockchain Keep a Secret?
- π CHURP: Dynamic-Committee Proactive Secret Sharing
- π Storing and Retrieving Secrets on a Blockchain
- π Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
- π Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
- π Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
- π COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
- π Smart Contract With Secret Parameters
The privacy tropic in the context of decentralized data management incorporates (i) asset attestation, delegation, transfer, etc. (ii) private information retrieval, (iii) oblivious random access machines (ORAMs), and (iv) confidential access control policies.
- π (i) Espresso CAP Specification: Configurable Asset Privacy
- π (i) Decentralized Cross-Blockchain Asset Transfers
- π (ii) Heterogeneous Private Information Retrieval
- π (ii) Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach
- π (iii) MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
- π (iii) A Tale of Two Trees: One Writes, and Other Reads
- π (iv) Ciphertext policy Attribute based Encryption with anonymous access policy
- πΉ MPC-Mike Rosulek-Lecture 3: Oblivious Transfer and Extension
- π£ A curated list of multi party computation resources and links.
- π MP-SPDZ: A Versatile Framework for Multi-Party Computation
- π Faster Secure Two-Party Computation in the Single-Execution Setting
- π Computing on Encrypted Data
- π Publicly Auditable MPC-as-a-Service with succinct verification and universal setup
- π Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
- π Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
- π MPC-TP: Fully Linear PCPs and their Cryptographic Applications - Niv Gilboa
- π Founding Secure Computation on Blockchains
- π YOSO: You Only Speak Once Secure MPC with Stateless Ephemeral Roles
- πΉ Paillier homomorphic encryption and a share conversion protocol - Federico Mazzone
- πEfficient Threshold FHE with Application to Real-Time Systems
- CHORUS: a Programming Framework for Building Scalable Differential Privacy Mechanisms
- Non-Interactive Differentially Anonymous Router
- Differential Privacy for Directional Data
- GUPT: Privacy Preserving Data Analysis Made Easy
- The Algorithmic Foundations of Differential Privacy
- The Composition Theorem for Differential Privacy
- Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
- Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
- Lightweight techniques for private heavy hitters
- Some Remarks and Ideas About Monetization of Sensitive Data
- On the Tradeoff Between Privacy and Utility in Data Publishing
- Empirical privacy and empirical utility of anonymized data
- Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure
- Secure Multi-party Differential Privacy
- Secure Multiparty Computation for Privacy-Preserving Data Mining
- Differential Privacy Under Fire
- Private Record Matching Using Differential Privacy
- Detecting Violations of Differential Privacy
- Verifiable Differential Privacy
- DPGen: Automated Program Synthesis for Differential Privacy
- LightDP: Towards Automating Differential Privacy Proofs
- Ξ΅ktelo: A Framework for Defining Differentially-Private Computations
- Approximate Span Liftings
- Differentially Private Bayesian Programming
- SAC: A System for Big Data Lineage Tracking
- Capturing and Querying Fine-grained Provenance of Preprocessing Pipelines in Data Science
- Data quality: βGarbage in β garbage outβ
Todo: Separate blockchain coordinated computation into off-chain computation and smart contract execution.
- π On-Chain Fully Homomorphic Encryption: smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
- π zkay: Specifying and Enforcing Data Privacy in Smart Contracts
- π Zapper: Smart Contracts with Data and Identity Privacy
- π VERI-ZEXE: Decentralized Private Computation with Universal Setup
- π Zexe: Enabling Decentralized Private Computation
- πΉ Zexe Youtube
- π BUILDING PRACTICAL SYSTEMS THAT COMPUTE ON ENCRYPTED DATA
- π Arbitrum: Scalable, private smart contracts
- π CLOAK: Enabling Confidential Smart Contract with Multi-party Transactions
- π Scalable and Privacy-preserving Off-chain Computations
- π Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
- π HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication
- π Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
- π Enigma: Decentralized Computation Platform with Guaranteed Privacy
- π Decentralized Privacy-preserving Timed Execution in Blockchain-based Smart Contract Platforms
- π ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
- π Piranha: A GPU Platform for Secure Computation
- π Pesca: A Privacy-Enhancing Smart-Contract Architecture
- π Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
- π Auditable, Available and Resilient Private Computation on the Blockchain via MPC
- π Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning
- π A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
- Blockchain Enabled Privacy Audit Logs
- Blockchain Enabled Privacy Audit Logs
- PRIVGUARD: Privacy Regulation Compliance Made Easier
- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
- User Centricity: A Taxonomy and Open Issues
- Dawn Song (Berkeley)- "Data Sovereignty and Decentralized Data Science"
- User-Managed Access to Web Resources
- Federated Authorization over Access to Personal Data for Decentralized Identity Management
- Bringing Privacy Control back to Citizens
- Metaverse for Social Good: A University Campus Prototype
- Personal Data: The Emergence of a New Asset Class
- Property Rights By Armen A. Alchian
- User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
- Decentralized Society: Finding Web3βs Soul
- Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
- PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution
- Towards Contractual Agreements for Revocation of Online Data
- π SoK: Off The Chain Transactions
- π Formalizing Anonymous Blacklisting Systems
- π SoK: Privacy-Preserving Computing in the Blockchain Era
- π SoK: A Taxonomy of Cryptocurrency Wallets
- π SoK: Off The Chain Transactions
- π SoK: Certified Robustness for Deep Neural Networks
- π SoK: Computer-Aided Cryptography
- π SoK: Blockchain Light Clients
- π SoK: General Purpose Compilers for Secure Multi-Party Computation
- π SoK: TEE-assisted Confidential Smart Contract
- π SoK: Differential Privacy as a Causal Property
- π SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- π SoK: Delegation and Revocation, the Missing Links in the Webβs Chain of Trust
- π SoK: Oracles from the Ground Truth to Market Manipulation
- π SoK: Benchmarking Flaws in Systems Security
- π SoK: Communication Across Distributed Ledgers
- π roadmap.sh
- π A collection of (mostly) technical things every software developer should know about
- π« openzeppelin-contracts: OpenZeppelin Contracts is a library for secure smart contract development.
- π How To Use AccessControl.sol
- π Role Based Access Control for the Ethereum Blockchain
- π« Creating Zero knowledge Proofs with ZoKrates
- π« Ethereum Contract Development with Go
- π How To Script An Automatic Token Airdrop for 40k subscribers
- π Fantastic Zero-Knowledge Proofs
- π Scaling Relic Protocol with zk-SNARKs
- π« Arbitrum: The most secure L2
- π« Arbitrum Developer Quickstart
- π« libocr consists of a Go library and a set of Solidity smart contracts that implement the Chainlink Offchain Reporting Protocol
- π This demonstrates how a smart contract on NEAR can access off-chain data via Chainlink's oracle solution.
- π Sign-In with Ethereum
- π« ethr-did-resolver: DID resolver for Ethereum Addresses with support for key management
- π« Golang SSI Framework
- π NFT3 | The First Unified Virtual Identity Network for Web3
- π The essential web3 toolkit for sharing and funding anything.
- π Identity protocol for open applications
- π Polygon DID Implementation
- π Introducing Polygon ID, Zero-Knowledge Identity for Web3
- π Claim your passport
- π decentralized-identity / snark-credentials
- π spruceID: Your Keys, Your Data, π« github
- π iden3: Prove your access rights, not your identity
- π« emmy: Library for zero-knowledge proof based applications (like anonymous credentials
This section is about running blockchain nodes and scaling of backend services.
- π« Ranger - A Rust library for listening to P2P traffic without a full node
- π« Go Ethereum Development
- π« Learn Kubernetes
- π« Welcome to the IPFS docs
- π« go ethereum client
- π« ether.js: Complete Ethereum library and wallet implementation in JavaScript
- π« Explore the worldβs leading design portfolios
- π Encrypted Data Vaults 0.1
- π Decentralized Identifier Resolution (DID Resolution) v0.2
- π A Primer for Decentralized Identifiers
- π Verifiable Credentials Data Model v1.1
- π 3ID DID Method Specification
- π« ERC1238: Non-transferrable Non-Fungible Tokens (NTT)
- π« EIP-721: Non-Fungible Token Standard
- π« ERC-725 - Ethereum Identity Standard
- π« ERC-735: Claim Holder #735
- π« EIP-1155: Multi Token Standard
- π« EIP-1462: Base Security Token
- π« EIP-1056: Ethereum Lightweight Identity
- π« Ethereum Improvement Proposals
- π Blockchain Identity
- π« Regular Expressions 101
- π« curl-to-Go
- π« RELIC
- π« ark-crypto-primitives
- π Starkware STARK 101
- π zkSync is a user-centric zk rollup platform from Matter Labs (opens new window). It is a scaling solution for Ethereum, already live on Ethereum mainnet.
- π« zkSNARK implementation in JavaScript & WASM
- π« ZoKrates
- π« arkworks is a Rust ecosystem for zkSNARK programming
- π« gnark is a fast zk-SNARK library that offers a high-level API to design circuits
- π« mimblewimble
- π« Go-snark-study
- π ZK from Scratch
- π circom and snarkjs
- π« zkSnark circuit compiler
- π« zkSNARK implementation in JavaScript & WASM
- π« Circom circuits used by the iden3 core protocol.
- π zkrp package
- π« Ethereum implementation of the Coconut smart contract library
- π« MerkleTree compatible with circomlib/sm
- πΉ IDEN3: Scalable distributed identity infrastructure using zero-knowledge proofs to guarantee privacy
- π Iden3 Documentation: Iden3 Docs
- π« Circom and SnarkJS
- π zkDocs
- π Create your first zero-knowledge snark circuit using circom and snarkjs
- π ZKPβ PlonK Algorithm Introduction
- π« Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs
- π« Winterfell πΊ: A STARK prover and verifier for arbitrary computations
- π« Caigo: Golang Library for StarkNet/Cairo
- π MPC-SoK Frameworks
- π« dpss python
- π Robust MPC-based confidentiality layer for blockchains
- π Anonymous Zether: A private payment system for Ethereum-based blockchains, with no trusted setup.
- π« emp-toolkit
- π ABY Developer Guide
- π» The Confidential Computing Platform for Collaborative Analytics and AI
- π Zether: Towards Privacy in a Smart Contract World
- π« A collection of Bristol format circuit files
- π 'Bristol Fashion' MPC Circuits
- π Rust by Example
- π Rust Crypto Engineering Course
- π Rust Crypto Engineering Study Group
- πΉ Rust Crypto Engineering Study Group
- πΉ Blockchain Lecture (Arthur Gervais)
- π Asecuritysite.com
- π Mhadi Zamani: Resources
- π Mhadi Zamani: Crypto
- π Decentralized Systems Lab
- π CS294/194-196: Special Topics on Science and Technology of Decentralization and Decentralized Intelligence
- π ZK-STARK Theory & Implementation
- π Proofs, Arguments, and Zero-Knowledge, π PDF, πΉ Youtube
- π CSN09112 Module, π« Example file encryption using scrypt and NaCl for the gocrypto book
- π ECE/CS 598 AM: Cryptography with Ideal Functionalities
- π EinfΓΌhrung in die Kryptographie von Christof Paar
- π Decentralized Systems Lab
- π Zero-Knowledge Proofs
- π Lecture slides Blockchain-based Systems Engineering
- π Iden3 Documentation: Publications
- π Onur Mutlu: Digital Design and Computer Architecture Spring 2020 (252-0028-00L)
- π Onur Mutlu: Lecture Video Playlist on YouTube
- π Andrew Miller: ECE498AC/CS498AM: Applied Cryptography, Fall 2019
- π Decentralized Systems Lab: Courses
- π Christine Parlour, Dawn Song: CS294-177/CS194-177/PHDBA 297T.1/MFE 230T.3: Decentralized Finance
- π Intuitive Advanced Cryptography
- π A Graduate Course in Applied Cryptography
- πΉ IC3 Initiative for Cryptocurrencies and Contracts
- πΉ DeFi MOOC
- πΉ CryptoClear
- πΉ UC Model Youtube: MACS Frontier
- πΉ Zero Knowledge
- πΉ Grand Amphi ThΓ©atre
- πΉ ZK Whiteboard Sessions
Name | Blockchain Security | Consensus Algorithms | Decentralized Finance | MPC / ZK Research |
---|---|---|---|---|
Dan Boneh | β | β | ||
Silvio Micali | β | β | β | |
Vitalik Buterin | β | β | β | β |
Andrew Miller | β | β | ||
Dawn Song | β | β | ||
Arthur Gervais | β | β | ||
Bryan Ford | β | |||
Benedikt BΓΌnz | β | |||
Raluca Ada Popa | β | |||
Pratyush Mishra | β | |||
Joseph Bonneau | β | |||
Paul Grubbs | β | |||
Ariel Gabizon | β | |||
Shafi Goldwasser | β | |||
Justin Thaler | ||||
Xiao Wang | β | |||
Eli Ben-Sasson | β | |||
Alessandro Chiesa | β |
- π£ Cryptography Conferences
- π£ Security and Privacy Conference Deadlines
- π£ Security Conference Ranking
βοΈ CESC: Crypto Economics Security ConferenceβοΈ ICBC: IEEE International Conference on Blockchain and CryptocurrencyβοΈ CAAW: 1st International Workshop on Cryptoasset AnalyticsβοΈ IEEE-SecurityβοΈ Usenix Security SymposiumβοΈ EurocryptβοΈ CryptoβοΈ S&P: IEEE Symposium on Security and PrivacyβοΈ NDSS SymposiumβοΈ CCS (sigsag): ACM Conference on Computer and Communications Security
- π° Gitcoin Grants
- π° Andreessen Horowitz (a16z) Seeds
- π° Y Combinator Funding
- π° EWOR
- π° Moonrock Capital
- π Scientific Methods in Computer Science, second_link
- πΉ How to Write a Great Research Paper (7 Excellent Tips)
- π Benchmarking Crimes: An Emerging Threat in Systems Security
- π Hyperledger CL Credentials
- π Hyperledger BBS+ Credentials, π PDF Title: Anonymous credentials 2.0
- π» Veramo, π« docs, π« specs
- π» SpruceID, π« docs, π« cryptoscript
- π» iden3, π« docs
- π» Mattr, π« docs, π learn
- π» Trinsic, π« docs
- π» Lukso, π« docs
- π» Ceramic, π« docs
- π» Ocean Protocol, π« docs
- π» Secret Network, π« docs
- π» Oasis Labs, π« docs
- π» iExec, π« docs
- π» Sia
- π» Kepler, π« docs
- π» Storj, π paper
- π» Filecoin, π paper
- π» Gitcoin Passport
- π» Sismo
- (optional) π» brightID, π« docs
- (optional) π» civic, π« docs
- (optional) π» Decentralized Identity Foundation, π« docs
- (optional) π» ShoCard, π« docs
- (optional) π» Phala, π« docs
- (optional) π» iDX, π« docs
- (optional) π» Serto, π« docs
- π» Smart contracts + provable storage = FVM
- π Decentralized Web Node
- π« Decentralized Web Node (DWN) SDK
- π» (airdrop) POAP - The bookmarks of your life
- π» Atlan: The new way for data-driven teams to discover, understand, trust, and collaborate on data assets
- π» Promethium: Fast Data Discovery and Governance
- π» Steem: Powering Communities and Opportunities
- π» Affinidi: Changing data ownership for good
- π» GET protocol: Ticketing is the start of something bigger
- π» SISMO: The key primitive for web3 identities
- π» Proof of Interest
- π» MystenLabs: Enigneering asset ownership
- π» Decentralized naming and certificate authority
- π« An ACME-based certificate authority, written in Go
- π» ENS
- π Ethereum Name Service: the Good, the Bad, and the Ugly
- π Asecuritysite: DNSSEC
- π» The industry leading Web3 API
- π» The Worldβs Most Powerful Blockchain Development Suite
- π Sign-in with Ethereum RFP
- π Ceramic Protocol Specification
- π» (web2) Okta
- πΉ (web2) Youtube: OAuth 2.0 & OpenID Connect (OIDC): Technical Overview
- π» Asset management for a DeFi world
- π» Institutional crypto-capital network
- πΉ Data DAO part 1 DataDAO introduction
- β Ethereum
- β Algorand
- β Avalanche
- β Tezos
- β Cardano
- β Internet Computer
- β Polkadot
- π» Ceramic
- πΉ Bankless
- π° rekt
- π° IC3 Newsletter.
- π° YCombinator: Hacker News
- π° Web 5: TBD
- π° Tezos News
- πΉ Grand Amphi ThΓ©atre
- π« A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
- π Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- π Twisted Polynomials and Forgery Attacks on GCM
- π GCM Security Bounds Reconsidered
- π Message Franking via Committing Authenticated Encryption
- π Fast Message Franking: From Invisible Salamanders to Encryptment
- π Beyond Birthday Bound Secure MAC in Faulty Nonce Model
- π Partitioning Oracle Attacks
- Implementing and Proving the TLS 1.3 Record Layer
- π‘ The Illustrated TLS 1.3 Connection
- ROSEN: RObust and SElective Non-repudiation (for TLS), link2
- Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services
- π TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing
- Identity Management in IoT Networks Using Blockchain and Smart Contracts
- Smart Contract-Based Access Control for the Internet of Things
- PPCA: Privacy-Preserving Conditional Actions for IoT Environments Using Smart Contracts
- LegIoT: Ledgered Trust Management Platform for IoT
- A Minimalist Approach to Formalizing Analog Sensor Security
- SmartDID: A Novel Privacy-preserving Identity based on Blockchain for IoT
- INVITED Things, Trouble, Trust: On Building Trust in IoT Systems
- Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain
- π Experiences Deploying Multi-Vantage-Point Domain Validation at Letβs Encrypt
- π Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE
- π CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
- π TeSC: TLS/SSL-Certificate Endorsed Smart Contracts
- π One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet
- π Designing for Tussle in Encrypted DNS