ZK

CoSnarks in Action at Devcon7

It's a wrap! Devcon7 flew by and with everyone back in the TACEO office we take some time to recap on the week full of events, talks, and making cryptographic connections. And allowing you to make cryptographic connections in a secure and privacy preserving manner was our main fo…

Enter Stage Left: Private Shared State

We’ve come a long way with blockchains, but let’s be real—until now, we’ve mostly had two types of data states. There’s public state like on Ethereum, where everything’s out in the open for everyone to see. It’s fantastic for transparency and trust, and it’s why Ethereum has beco…

A First Look at Collaborative Noir

Collaborative SNARKs bring together ZK and MPC allowing multiple parties to compute on private data without revealing it. With coCircom, we took the first step by combining MPC with Circom circuits, making private computation accessible to developers using ZK. We started with coC…

CoSNARKs in Action: Private Proof Delegation

The ZK stack has finally matured to a point where zero-knowledge applications are moving from theory to reality. Today, we have ZK apps like ZKP2P for web proofs, ZK email for secure email verification, and Rarimo for identity verification, enabling users to prove statements with…

Hashing it out: coSNARKs at TACEO

During a recent workshop about programmable cryptography, we noted a few questions about co-SNARKS; what are the main use cases, do we have some benchmarks, how technical does one have to be to play around, and what tools available now… Click through to answer all these and more.

Max Pick Challenge – Part 2

Dive into the technical details of the Max Pick Challenge, how we used coSNARKs to compute on private shared state, and what we learned during the process. Also find out who won the challenge and what's next for coCircom!

Max Pick Challenge – Part 1

TACEO presents the Max Pick Challenge, a unique on-chain guessing game, based on Collaborative SNARKs ("co-SNARKs", leveraging Multi Party Computation + Zero Knowledge) with the chance to win up to $1,000.

The Encryption Trifecta

Imagine a world where your data is not only encrypted at rest (AES) and in transit (TLS) but also during computation. Welcome to the future of blockchain technology with Compute Layer Security (CLS). In this blog post, we dive into the groundbreaking vision of making encrypted co…

Unlocking the Future with ProgCrypto

At Devconnect 2023, a revolutionary concept was spotlighted during the ProgCrypto event: Programmable Cryptography. This two-day gathering of researchers, developers, and community members focused on the future of cryptography and its potential to reshape digital interactions. Vi…

Private Proof Markets using MPC

As much as we like to talk about Zero Knowledge, especially zk-friendly hash functions, we also enjoy to talk about other privacy-enhancing technologies (PETs). ZK is for sure the standout PETs performer in web3 today, with homomorphic encryption (HE) taking a little bit of spotl…

Poseidon{2} for Noir

It has been some time since our last blog post (3 months already, time flies) - so it is way overdue to continue our loose series of blog posts about zk-friendly hashing. In case you missed the other two posts, feel free to read about how to choose your zk-friendly hash function …

How to choose your ZK-friendly hash function?

In our last blog post we investigated the usefulness of hash functions for zero-knowledge use cases. Thereby, we stumbled upon many ZK-friendly designs, each with advantages, disadvantages, and optimizations for different performance metrics. With MiMC1, GMiMC2, Poseidon3, Poseid…

Bringing AI power to Ethereum with Accessible zkML

We at TACEO are thrilled to finally announce our as-of-yet largest project in the zkSpace in cooperation with =nil; foundation – a pipeline for proving ML models to L1. Why does the industry need provable ML There's no question that ML is coming into the realm of decentralized ap…

What’s the deal with hash functions in Zero Knowledge?

When exposed to the ZK space, it usually takes little time to stumble upon some alien hash functions for the average crypto engineer - most likely Poseidon1. So, for the curious, in this blog post, we want to shed some light on the history of efficient hash functions in ZK and wh…