📢 #Gate Square Writing Contest Phase 3# is officially kicks off!
🎮 This round focuses on: Yooldo Games (ESPORTS)
✍️ Share your unique insights and join promotional interactions. To be eligible for any reward, you must also participate in Gate’s Phase 286 Launchpool, CandyDrop, or Alpha activities!
💡 Content creation + airdrop participation = double points. You could be the grand prize winner!
💰Total prize pool: 4,464 $ESPORTS
🏆 First Prize (1 winner): 964 tokens
🥈 Second Prize (5 winners): 400 tokens each
🥉 Third Prize (10 winners): 150 tokens each
🚀 How to participate:
1️⃣ Publish an
The ZK Summit 2024 focuses on hardware optimization and Decentralization proof networks, looking forward to a 1000-fold efficiency improvement.
Zero Knowledge Summit 2024: On-site Report
On April 10, 2024, the 11th Zero Knowledge Summit was held in Athens. The summit gathered around 500 participants and featured four speeches. Below is a summary of the key points from the summit, covering the latest developments in zero-knowledge hardware, SNARK performance, and proof network design.
ZK Hardware Development
The hardware support for zero-knowledge proofs has always been a focal point of industry attention. At this summit, several experts discussed the current status and future of ZK hardware:
A researcher provided a comprehensive overview of the ZK hardware field, involving multiple companies that use generic hardware, manufacture custom hardware, and operate decentralized proof networks. He predicts that combining hardware-optimized SNARK verification systems with other upcoming optimizations could achieve a 1000-fold increase in computational efficiency, which would have a significant impact on the future development of Ethereum. He also mentioned that a certain organization plans to hold a formal verification competition for provers and verifiers, with prizes reaching up to 20 million dollars.
The co-founder of a hardware company introduced their SNARK verification system under development, which is based on binary tower fields and the sumcheck protocol. He pointed out that in certain applications, the performance of the hash function Groestl is significantly better than that of Keccak, a finding that could influence future system design choices.
Decentralized Proof of Stake Network
Several experts discussed the future development direction of decentralized prover networks:
The co-founder of a certain company introduced their upcoming proof-of-stake network. She analyzed different network design mechanisms and suggested that competition-based or mining-based models might not be effective. She proposed that the design goals should be, in order: minimal cost, maximum latency, and resistance to censorship. She predicted that auction models are most likely to become mainstream, potentially resembling the current block-building process in the future.
A PhD student introduced a new paper on the economics of proof networks. He pointed out that bilateral auctions are susceptible to collusion and proposed an alternative mechanism called Proo-phi, which introduces new matching transactions and proof mechanisms.
The technical director of a certain company discussed the proof market supporting Multi-Party Computation (MPC), particularly how to achieve trustless large provers while protecting the privacy of small clients. He explored how to select combinations of proof systems to optimize the linear computation costs in MPC.
ZK Credential Innovation
The meeting also discussed various schemes for constructing zero-knowledge credentials based on the existing identity system:
ZK email address ownership proof based on email DKIM signature, applicable in scenarios such as anonymous remittance and reporting.
Utilize OpenID Connect for interactions with traditional web2 identities to enable applications such as remittances to social media accounts.
Build anonymous credentials from existing e-passports, allowing users to prove specific information without disclosing detailed personal information.
These innovative solutions demonstrate the broad application prospects of zero-knowledge proof technology in authentication and privacy protection.