Articles about Privacy - Section 4

a16z: A detailed explanation of the working principle of Cicada, a ZK-based on-chain voting project

In this article, we conducted research on the current state of voting privacy and provided a high-level introduction...

Vitalik: Three Transformations Ethereum Needs to Complete – L2, Wallets, Privacy

Original Title: The Three Transitions Original Author: vitalik Source: vitalik.eth Translation: MarsBit, MK Special t...

Zero Knowledge Machine Learning (zkML): Privacy and Technology Coexist in the Era of Artificial Intelligence

zkML essentially integrates ZK technology into AI software to overcome its limitations in privacy protection, data au...

Key factors for the future large-scale adoption of DID and specific investment directions

Whether DID can reduce the threshold for first-time use and become the core layer for verification service providers ...

Bitcoin’s new generation of multi-signature scheme MuSig2: providing better security, efficiency, and privacy features

MuSig2 is a promising development in the world of Bitcoin. Compared to its predecessor, MuSig1, it offers improved se...

Viewing the privacy of the cryptocurrency era from the "room N incident": most cryptocurrencies in the market are not truly anonymous

Source: LongHash Editor's Note: The original title was "Privacy and Regulation in the Era of Cryptocurrency...

How to choose the cryptography technology? Revisiting the Security Model of Engineering Capability Boundaries

Author: Li Haoxuan Source: Weizhong Bank Blockchain Unbreakable cryptographic algorithms are also afraid of physical ...

How to choose the cryptography technology? Preliminary Study on Security Model of Theoretical Capability Boundary

Author: Li Haoxuan Source: Weizhong Bank Blockchain After the system changes, why does the privacy data leak frequent...

Find your business way

Globalization of Business, We can all achieve our own Success.

Advertising with us