Become a Patreon

Knowledge Protocol. Daily curated links from the space of blockchain, bitcoin, tokens, cryptocurrencies and protocols. No news, no bullshit, deep knowledge only.


2/ 3
Understanding event logs on the Ethereum blockchain

"Most transactions have an event log, but those event logs can be hard to read."

2/ 3
Sparse Merkle trees: a visual introduction

"A sparse Merkle tree is like a standard Merkle tree, except the contained data is indexed, and each data block is placed at the leaf that corresponds to that block’s index."

2/ 3
CacheOut: Leaking Data on Intel CPUs via Cache Evictions

"In this work we present CacheOut, a new microarchitectural attack that is capable of bypassing Intel’s buffer overwrite countermeasures."

2/ 3
Cheon’s attack and its effect on the security of big trusted setups

"Thanks to Ariel Gabizon and Zac Williamson for collaborating on the post, and the authors of Marlin 9 for highlighting the attack and its importance."

2/ 3
Building a Disaster-resilient Storage Layer for Next Generation Networks: The Role of Redundancy

"Our proof-of-concept improves Swarm's resilience to failures by balancing repairs and storage, with a slightly added latency."

2/ 3
Reinforcement Learning

"In this post we describe the use of reinforcement learning (RL) agents as a tool of signal detection of fairness, the idea that dishonest parties have no advantage over honest ones in distributed protocols."

2/ 3
Recursive Zero-Knowledge Proofs: A Comprehensive Primer

"Most of the discussion will be at a relatively high and intuitive level; it is assumed only that the reader has a basic familiarity with zero-knowledge proof systems, group theory, and computational complexity up to understanding the class of problems known as NP."

2/ 3
Simple Explanations of Arithmetic Circuits and Zero-Knowledge Proof

"In a zero-knowledge proof, a prover wants to convince a verifier that some public statement is true. However, the proof of this statement holds sensitive details that can’t be shared."

2/ 3
Understanding validator effective balance

"A key requirement of any blockchain is its ability to secure its chain. A secure chain is one in which transactions are verifiable and immutable i.e. by referring to the blockchain someone can obtain the details of a transaction that took place, and be sure the details are not faked and the transaction cannot be altered retrospectively."

2/ 3
Blockchain and the evolution of institutional technologies: Implications for innovation policy

"For the past century economists have proposed a suite of theories relating to industrial dynamics, technological change and innovation. There has been an implication in these models that the institutional environment is stable. However, a new class of institutional technologies—most notably blockchain technology—lower the cost of institutional entrepreneurship along these margins, propelling a process of institutional evolution."

2/ 3
Platform Tokenization: Financing, Governance, and Moral Hazard

"The paper shows that platform tokenization can alleviate underprovision of non-contractible entrepreneurial effort."

2/ 3
Blockchain-Based Corporate Governance

"Corporations and other forms of business organizations can be supplemented with blockchain-based agency constructs. Blockchain-based decentralized autonomous organizations (DAOs) expand the definition of the firm. On-chain DAO governance enables dynamic regulatory features that facilitate unprecedented decentralized regulatory solutions."

2/ 3
Decentralized identity : granting privacy with proxy re-encryption

"As common encryption techniques reach their limits when applied to complex decentralized identity schemes, proxy re-encryption may emerge as a suitable solution."

2/ 3
Here's Google "Quantum Supremacy" paper it pulled from NASA's website

"Google’s ‘Sycamore’ quantum computer was able to achieve “quantum supremacy” — solving a complex problem that would otherwise be impossible for a classical computer to solve in its lifetime — in just three minutes and 20 seconds, compared to the estimated 10,000 years it would take the world’s most advanced classical computer, Summit."

2/ 3
Scalable Byzantine Reliable Broadcast (Extended Version)

"Existing broadcast protocols for this setting scale poorly, as they typically build on quorum systems with strong intersection guarantees, which results in linear per-process communication and computation complexity."

2/ 3
PING and REJECT: The Impact of Side-Channels on Zcash Privacy

"We present two types of active side-channel attacks against private (a.k.a. shielded) transactions in Zcash. The attacks, called PING and REJECT, exploit differences in behavior between the payee of a particular shielded transaction and the remaining Zcash clients. By monitoring peer-to-peer traffic and injecting its own messages, an active attacker can remotely observe these differences due to fault and timing side-channels."

2/ 3
Embedded supervision: how to build regulation into blockchain finance

"How might blockchain-based financial markets be regulated and supervised? This paper argues that asset tokenisation and underlying distributed ledger technology (DLT) open up new ways of supervising financial risks. It then puts the case for "embedded supervision", ie a framework that allows compliance with regulatory goals to be automatically monitored by reading the market's ledger, thus reducing the need for firms to actively collect, verify and deliver data."

1/ 3
Why Do Public Blockchains Need Formal and Effective Internal Governance Mechanisms?

"With the birth and rise of cryptocurrencies following the success of Bitcoin and the popularity of 'Initial Coin Offerings,' public awareness of blockchain technologies has substantially increased in recent years. Many blockchain advocates claim that these software artefacts enable radically new forms of decentralised governance by relying upon computational trust created via cryptographic proof, obviating the need for reliance on conventional trusted third-party intermediaries."

Subscribe to our newsletter - get a weekly round-up right to your inbox.