Logo
    SNARK Research Overview
    🩳

    SNARK Research Overview

    Projects related to the construction and applications of SNARKs.

    • Universal Setup and cheaper prover time in SNARKs
    • Goal
    • Expected Completion
    • Timeline
    • People
    • Witness Authenticated Key Agreement
    • Goal
    • Expected Completion
    • Timeline
    • People
    • Threshold Signatures with Weights
    • Goal
    • Expected Completion
    • Timeline
    • People

    Universal Setup and cheaper prover time in SNARKs

    Current proofs in the Filecoin protocol use the Groth16 SNARK in the trusted setup. This requires writing the computation being proven as a circuit and then feed it into the SNARK process. The main limiting factors in this approach are the size of the structured common reference string CRS (which is linear in the size of the circuit) and proving time (which is quasilinear in the size of the circuit).

    Goal

    To reduce proving time and reference string size.

    Steps: Evaluate various approaches to determine the concrete improvements in the context of Filecoin Proofs.

    Expected Completion

    End of Q1 or early Q2.

    Timeline

    March 15/30, 2022: most of implementation done

    March 30/April 15, 2022: evaluation of testing results

    People

    Rosario Gennaro (DRI), Matteo Campanelli, Nicolas Gailly, Justin Thaler (Advisor)

    Witness Authenticated Key Agreement

    WAKE Witness Authenticated Key Agreement allows a sender to establish a session key with a recipient who must guarantee that he knows a particular piece of secret information (a “witness” to a specific condition ... which can be formalized as an instance of an NP language). There are countless applications in decentralized systems, since this protocol allows to establish confidential communication channels based on what people “know” or “hold”, not just about who “they are”.

    WAKE does not need a centralized trusted authority that issues secret keys or certificates. This makes this tool particularly interesting for decentralized applications, where parties can dynamically and flexibly confidentially connect with other parties based on common policies. Decoupling authentication and the notion of identity also allows for more flexible deniable and anonymous authentication. Examples include: Dark Pools Transactions, Chat with the same wallet, Retrieval Markets, Decentralized Anonymous Routing, etc.

    Goal

    Academic Paper. Proof of concept implementation.

    Expected Completion

    End of Q1 or early Q2.

    Timeline

    February 15, 2022: submit paper

    March 15, 2022: polish implementation.

    People

    Rosario Gennaro (DRI), Matteo Campanelli, Luca Nizzardo, Kelsey Melissaris (student)

    Threshold Signatures with Weights

    Assume you have a "power table" P=[p1,p2,...,pn] where pi is the "power" associated with user i. The goal is to generate a distributed signature scheme where the n parties share the power to sign messages in a way that is "proportional" to their power. In other words there is a "power threshold" p such that a collection of parties can sign if their total power is larger than p. This is a very natural problem and yet no simple solution is known. It is possible to use SNARKS to build this type of signatures (to encode a proof that the power threshold has been reached). Applications include DAO Voting, Anchoring Proof of Stake Chains to Proof of Work ones, etc.

    Goal

    Academic Paper. Proof of concept implementation. Blog Post.

    Expected Completion

    End of Q1 or early Q2.

    Timeline

    March 30, 2022.

    People

    Rosario Gennaro (DRI), Nicolas Gailly.

    CryptoNet is a Protocol Labs initiative.