Episode Details

Episode 334: ZK Research Update with Joe Bonneau
7/31/2024
Zero Knowledge β†—

Key Insights

Bullish:

  • 🟒 $ZK Technology - Exploring the potential of zero-knowledge technology in various applications, including privacy, blockchain, and network security.
    • β€œI hope that this space doesn't become, like, so completely focused on building efficient roll up servers, which is a great application that I think everyone wants to see have better performance blockchains. But, you know, like, the original conception of 0 knowledge was about privacy. Right?” - Joe (0:00)
    • β€œI'm definitely excited by that vision of the future that, you know, zk is a common building block in a lot of applications, not just in the blockchain space and that, you know, it's something that we have good support for. Not just hardware, but of course, good good tooling and good software support and everything.” - Joe (0:00)
    • β€œSo instead, what you can do and what we did in this research project is to actually prove, you know, my browser is sending out a packet. This packet complies with the local network use policy. For example, it's not going to some domain that's on this, on this block list.” - Joe (0:00)
    • β€œSo you don't even have to implement or deploy a full verifier on chain. You just need a naysayer proof verifier, and you save money in 2 ways. The main savings actually just come from the simple fact that most of the time, this verifier never runs, just like with an optimistic system.” - Joe (0:00)
    • β€œThe key observation is that it's often much easier to tell that something is wrong than that it's right. If a proof is right, every aspect of it has to be right. But if it's wrong, it can be wrong for any one thing. So you just need a hint. This is the part that's wrong, and then, you know, you're you're done quite quickly.” - Joe (0:00)
    • β€œSo the original paper, I believe, was 2022. And the follow-up was this year, 2024. So, I mean, we used Spartan in in zombie, which Spartan in zombie. Yeah. Sounds so cool.” - Joe (0:00)
    • β€œWith colleagues at NYU, we wrote a paper showing that you can do this. The, performance is actually pretty good. And if you use GROS16 with, like, the smallest proofs, the proofs are so small, you can actually embed them in a legacy certificate.” - Joe (0:00)πŸ”’
    • β€œSo it's a really elegant formulation. There were a lot of interesting problems to solve that I don't think we thought about too much before we started this work.” - Joe (0:00)πŸ”’
    • β€œThe last thing I'll say too is that there's kind of an interesting connection, and we showed this a little bit in this cicada paper that voting has a really similar property that you want people's votes to be private while the vote is happening so that you're you know, people aren't voting in reaction to other people.” - Joe (0:00)πŸ”’
    • β€œThere's been new protocols using ZK that make these systems usually more succinct much faster, but also potentially privacy preserving. So you can have a public log that lists all the users and their public keys in a system.” - Joe (0:00)πŸ”’

πŸ”’ More quotes available for premium users