Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Codaprotocol review #12

Open
gpestana opened this issue Oct 21, 2018 · 0 comments
Open

Codaprotocol review #12

gpestana opened this issue Oct 21, 2018 · 0 comments
Labels

Comments

@gpestana
Copy link
Owner

gpestana commented Oct 21, 2018

Codaprotocol uses recursive composition of zk-SNARKs to securely represent a state of a linked-list. A linked-list is represented by a set of states and links between those states. The recursive composition of zk-SNARKs is used to generate a cryptographic signature of a the linked-list with fixed size for arbitrary number of list nodes.

blockchain

Codaprotocol can be used to create and maintain "succinct blockchains". Succinct blockchains are blockchains that for verifying the current state requires a constant amount of space and time (about 20kb and 10ms to verify balance). In the context of a blockchain, the codaprotocol allow for light clients to verify transactions without having to rely on third parties.

questions

Q.INF: what pieces of information are needed for verifying that a certain transaction is part of the blockchain?

Q.EFF: how efficiently is it to recursively traverse the blockchain? (use case: get all transactions from a particular user)

Q.MIN: although the transaction verification is short in time and space, do the miners still need to maintain the whole set of transactions?

Q.POW: is the proof of work for adding new transactions the same as in bitcoin and ehtereum?

Q.SCAL: if answers to Q.EFF and Q.POW, how is codaprotocol helping to mitigate the scalability problems of blockchains, apart from reducing time and space for transaction verification (helpful for light clients only, not for transaction throughput)?

Q.TM: what is the threat model?

literature

white paper

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant