Skip to main content

Questions tagged [cryptocurrency]

A cryptocurrency is a digital currency powered by cryptography. This tag is applicable only to Q&As about the CRYPTOGRAPHIC MECHANISMS used by a currency, not for questions about economy, usage, or acquisition of any particular currency. The latter kinds are unwelcome. Please note that Stackexchange has dedicated websites for Bitcoin, Ethereum, Monero, etc.

2 votes
1 answer
141 views

How to convert $y^2 = x^3 +7$ over $F_p$ to $y^2 = x^3 + 12$ over $F_p$

...
mazedat's user avatar
  • 21
0 votes
0 answers
6 views

Bitcoin Generation [migrated]

In a blockchain network with number of parties, how are the number of bitcoins held by each party decided in the initial stage? Example: If there are 4 parties A,B,C,D who decides/generates the ...
Crypto_researcher's user avatar
2 votes
1 answer
65 views

Efficient NOT in set proof?

I am looking for a solution for a very specific problem, I have one, but I am not statisfied with it and it feels there must be a much more efficient way to do this. I have a hashed value of 256 bits. ...
ovanwijk's user avatar
  • 155
0 votes
0 answers
30 views

i want to verify the following p2pkh transaction

I know to veify the p2pkh transaction we have to place the unlocking script and locking script in a stack and than evalute the stack. In such cases the the scriptpubkey_asm is of the form <OP_DUP ...
Code's user avatar
  • 1
1 vote
1 answer
81 views

How should I map E'(Fp6) --> E'(Fp) starting from Bitcoin public key coordinates(x,y)?

Let $p$ be the prime number 115792089237316195423570985008687907853269984665640564039457584007908834671663 and let $E$ and $E'$ be the curve equations $$E(\mathbb ...
bnsage123's user avatar
0 votes
1 answer
62 views

Can I construct a incomplete Merkle Tree without denting its security?

...
Chirag Parmar's user avatar
3 votes
1 answer
727 views

Is AES a group?

The question I'm wondering is whether the AES cipher is a closed cipher (which is equivalent to AES being a group). And this question interests me due to the lack of understanding of whether it is ...
Ss1996's user avatar
  • 53
4 votes
1 answer
2k views

In Bitcoin, given half the 52-character private key in WIF format, is it possible to reconstruct the whole private key?

Given the following two preconditions: It is almost impossible to reconstruct a bitcoin private key if an attacker only has one half of the private key as well as the public key. It is almost ...
Ohumeronen's user avatar
-1 votes
2 answers
235 views

If it is proved that P=NP, what happens to crypto? [duplicate]

If various PKC is shown to be not NP=Hard, what happens to crypto? More importantly, what happens to crypto wallets? If it is shown that P=NP for many currently assumed to be hard problems, but ...
Zekchelovek's user avatar
2 votes
1 answer
139 views

In NIZK, what is the difference between "transparent“ and “without trusted setup”?

When I study a zk-SNARK scheme, the scheme claims to be transparent. Does this mean that this scheme does not require a trusted setup? Furthermore, if a NIZK scheme includes a Common Reference String (...
user109993's user avatar
0 votes
0 answers
59 views

Interacting with Zksync sometimes returns an "invalid value for value.blockHash" error

I've been sometimes getting this error while interacting with zksync "invalid value.blockHash" and have been unable to find information about it elsewhere. What's curious to me is that it ...
Javier Cabrera's user avatar
-1 votes
2 answers
307 views

Formula for deriving the x-coordinate using the y-coordinate (decompressing a compress public key)

According to my understanding a public key is made up of x and y coordinate and a compress public key is made up of the y-coordinate since it's possible to directly calculate the uncompress public key ...
Aviril Smith's user avatar
1 vote
1 answer
199 views

Deriving of the y-coordinate on secp256k1 elliptic curve

...
Aviril Smith's user avatar
1 vote
0 answers
40 views

How can the validity of signatures in layer-2 transactions be proven in zk-rollup?

I have many questions about the details of using zk-SNARK technology in zk-rollup: How can the validity of signatures in layer-2 transactions be proven in zk-rollup? In zk-rollup, is a single large ...
user109993's user avatar
1 vote
1 answer
174 views

What is the probability of decrypting AES-128-ECB if some of the information is available?

There is a JSON array like this: ...
accountnujen's user avatar

15 30 50 per page
1
2 3 4 5
20