A First Look at Collaborative Noir
Collaborative SNARKs bring together ZK and MPC allowing multiple parties to compute on private data without revealing it. With coCircom, we took the first step by combining MPC with Circom circuits, making private computation accessible to developers using ZK. We started with coC…
Hashing it out: coSNARKs at TACEO
During a recent workshop about programmable cryptography, we noted a few questions about co-SNARKS; what are the main use cases, do we have some benchmarks, how technical does one have to be to play around, and what tools available now… Click through to answer all these and more.
Max Pick Challenge – Part 2
Dive into the technical details of the Max Pick Challenge, how we used coSNARKs to compute on private shared state, and what we learned during the process. Also find out who won the challenge and what's next for coCircom!
Max Pick Challenge – Part 1
TACEO presents the Max Pick Challenge, a unique on-chain guessing game, based on Collaborative SNARKs ("co-SNARKs", leveraging Multi Party Computation + Zero Knowledge) with the chance to win up to $1,000.
The Encryption Trifecta
Imagine a world where your data is not only encrypted at rest (AES) and in transit (TLS) but also during computation. Welcome to the future of blockchain technology with Compute Layer Security (CLS). In this blog post, we dive into the groundbreaking vision of making encrypted co…
Unlocking the Future with ProgCrypto
At Devconnect 2023, a revolutionary concept was spotlighted during the ProgCrypto event: Programmable Cryptography. This two-day gathering of researchers, developers, and community members focused on the future of cryptography and its potential to reshape digital interactions. Vi…
Private Proof Markets using MPC
As much as we like to talk about Zero Knowledge, especially zk-friendly hash functions, we also enjoy to talk about other privacy-enhancing technologies (PETs). ZK is for sure the standout PETs performer in web3 today, with homomorphic encryption (HE) taking a little bit of spotl…
Poseidon{2} for Noir
It has been some time since our last blog post (3 months already, time flies) - so it is way overdue to continue our loose series of blog posts about zk-friendly hashing. In case you missed the other two posts, feel free to read about how to choose your zk-friendly hash function …
How to choose your ZK-friendly hash function?
In our last blog post we investigated the usefulness of hash functions for zero-knowledge use cases. Thereby, we stumbled upon many ZK-friendly designs, each with advantages, disadvantages, and optimizations for different performance metrics. With MiMC1, GMiMC2, Poseidon3, Poseid…
Bringing AI power to Ethereum with Accessible zkML
We at TACEO are thrilled to finally announce our as-of-yet largest project in the zkSpace in cooperation with =nil; foundation – a pipeline for proving ML models to L1. Why does the industry need provable ML There's no question that ML is coming into the realm of decentralized ap…
What’s the deal with hash functions in Zero Knowledge?
When exposed to the ZK space, it usually takes little time to stumble upon some alien hash functions for the average crypto engineer - most likely Poseidon1. So, for the curious, in this blog post, we want to shed some light on the history of efficient hash functions in ZK and wh…