Questions tagged [cryptocurrency]
A cryptocurrency is a digital currency powered by cryptography. This tag is applicable only to Q&As about the CRYPTOGRAPHIC MECHANISMS used by a currency, not for questions about economy, usage, or acquisition of any particular currency. The latter kinds are unwelcome. Please note that Stackexchange has dedicated websites for Bitcoin, Ethereum, Monero, etc.
286
questions
2
votes
1
answer
141
views
0
votes
0
answers
6
views
Bitcoin Generation [migrated]
In a blockchain network with number of parties, how are the number of bitcoins held by each party decided in the initial stage?
Example: If there are 4 parties A,B,C,D who decides/generates the ...
2
votes
1
answer
65
views
Efficient NOT in set proof?
I am looking for a solution for a very specific problem, I have one, but I am not statisfied with it and it feels there must be a much more efficient way to do this.
I have a hashed value of 256 bits. ...
0
votes
0
answers
30
views
i want to verify the following p2pkh transaction
I know to veify the p2pkh transaction we have to place the unlocking script and locking script in a stack and than evalute the stack. In such cases the the scriptpubkey_asm is of the form <OP_DUP ...
1
vote
1
answer
81
views
How should I map E'(Fp6) --> E'(Fp) starting from Bitcoin public key coordinates(x,y)?
Let $p$ be the prime number 115792089237316195423570985008687907853269984665640564039457584007908834671663
and let $E$ and $E'$ be the curve equations
$$E(\mathbb ...
0
votes
1
answer
62
views
3
votes
1
answer
727
views
Is AES a group?
The question I'm wondering is whether the AES cipher is a closed cipher (which is equivalent to AES being a group). And this question interests me due to the lack of understanding of whether it is ...
4
votes
1
answer
2k
views
In Bitcoin, given half the 52-character private key in WIF format, is it possible to reconstruct the whole private key?
Given the following two preconditions:
It is almost impossible to reconstruct a bitcoin private key if an attacker only has one half of the private key as well as the public key.
It is almost ...
-1
votes
2
answers
235
views
If it is proved that P=NP, what happens to crypto? [duplicate]
If various PKC is shown to be not NP=Hard, what happens to crypto? More importantly, what happens to crypto wallets?
If it is shown that P=NP for many currently assumed to be hard problems, but ...
2
votes
1
answer
139
views
In NIZK, what is the difference between "transparent“ and “without trusted setup”?
When I study a zk-SNARK scheme, the scheme claims to be transparent. Does this mean that this scheme does not require a trusted setup? Furthermore, if a NIZK scheme includes a Common Reference String (...
0
votes
0
answers
59
views
Interacting with Zksync sometimes returns an "invalid value for value.blockHash" error
I've been sometimes getting this error while interacting with zksync "invalid value.blockHash" and have been unable to find information about it elsewhere. What's curious to me is that it ...
-1
votes
2
answers
307
views
Formula for deriving the x-coordinate using the y-coordinate (decompressing a compress public key)
According to my understanding a public key is made up of x and y coordinate and a compress public key is made up of the y-coordinate since it's possible to directly calculate the uncompress public key ...
1
vote
1
answer
199
views
1
vote
0
answers
40
views
How can the validity of signatures in layer-2 transactions be proven in zk-rollup?
I have many questions about the details of using zk-SNARK technology in zk-rollup:
How can the validity of signatures in layer-2 transactions be proven in zk-rollup?
In zk-rollup, is a single large ...
1
vote
1
answer
174
views
What is the probability of decrypting AES-128-ECB if some of the information is available?
There is a JSON array like this:
...