Wenhao Wang (@wanggary142857) 's Twitter Profile
Wenhao Wang

@wanggary142857

ID: 1500236233645060096

calendar_today05-03-2022 22:26:32

14 Tweet

72 Followers

56 Following

Daniel Escudero (@deescuderoo) 's Twitter Profile Photo

New paper in Eprint (eprint.iacr.org/2024/370). We show that fully secure MPC with two-thirds honest majority (t<n/3) is possible over *any modulus* with communication O(n|C|). Prior works required an extra factor of log(n) to be able to use Shamir secret-sharing [1/2]

Ben Livshits (@convoluted_code) 's Twitter Profile Photo

Our early work on Mechanism Design for ZK-Rollup Prover Markets is now public; please attend a talk at ZKSummit today arxiv.org/abs/2404.06495

Fan Zhang (@0xfanzhang) 's Twitter Profile Photo

Excited to share some early results on ZK Rollup prover market fee mechanisms. A prover market is where ZK provers sell proof capacity, and users pay to get transactions proven (potentially coordinated by sequencers). EIP-1559 is a nice TFM for L1, but it does not work here

Excited to share some early results on ZK Rollup prover market fee mechanisms. A prover market is where ZK provers sell proof capacity, and users pay to get transactions proven (potentially coordinated by sequencers). EIP-1559 is a nice TFM for L1, but it does not work here
Matter Labs (∎, ∆) (@the_matter_labs) 's Twitter Profile Photo

This paper, written by researchers from Matter Labs (∎, ∆), Yale University, Hebrew University, and Imperial College London, explores Prooφ, a mechanism design for prover fee markets on ZK-rollups. Fee markets for provers competing to generate ZKPs differ from transaction fee mechanisms such as EIP-1559.

Ben Livshits (@convoluted_code) 's Twitter Profile Photo

The Research team I have created and lead is no longer part  of Matter labs. It’s one of the most capable and productive teams working on rollup-related problems and blockchain-related research, more broadly. matter-labs.io/research/

Aden (@adendrinweb3) 's Twitter Profile Photo

1/ Privacy Tech Overview: ZK, FHE, MPC, and TEEs A structured look at four key privacy-preserving technologies, based on insights from our "Study Room 003: Demystifying the privacy tech family" event. Big thanks to researcher speakers Hang Yin from Phala , Liam

1/ Privacy Tech Overview: ZK, FHE, MPC, and TEEs
A structured look at four key privacy-preserving technologies, based on insights from our "Study Room 003: Demystifying the privacy tech family" event.

Big thanks to researcher speakers <a href="/bgmshana/">Hang Yin</a> from <a href="/PhalaNetwork/">Phala</a> , <a href="/xliamren/">Liam</a>
Sen Yang (@syang2ng) 's Twitter Profile Photo

Many sophisticated MEV bot contracts use control flow obfuscation techniques to protect their logic. However, this also causes existing tools to struggle with analyzing obfuscated smart contracts, leaving critical vulnerabilities hidden. Excited to share our solution: SKANF (1/n)

Fan Zhang (@0xfanzhang) 's Twitter Profile Photo

During the weekend I finished building a little app I call "zkLabeler" (zklabeler.netlify.app). It's a zkTLS powered labeler for BlueSky. It's a cool application of zkTLS, and a fun learning experience of BlueSky's take on decentralization.

During the weekend I finished building a little app I call "zkLabeler"  (zklabeler.netlify.app). It's a zkTLS powered labeler for BlueSky. It's a cool application of zkTLS, and a fun learning experience of BlueSky's take on decentralization.
a16z crypto (@a16zcrypto) 's Twitter Profile Photo

Can cryptography solve the problem of MEV? One approach is an encrypted mempool, where users broadcast encrypted transactions that are only revealed after they are sequenced. Hence, a consensus protocol would have to commit to a transaction ordering blindly, seemingly

Can cryptography solve the problem of MEV? 

One approach is an encrypted mempool, where users broadcast encrypted transactions that are only revealed after they are sequenced. 

Hence, a consensus protocol would have to commit to a transaction ordering blindly, seemingly