Kosei Akama
Kosei Akama
# Background In Groth16, the verification process incurs a linear latency increase due to the computation of the multi-scalar multiplication (MSM). When there are many public inputs, this computation becomes...
### Problem: Malicious Trusted Setup As is widely known, Trusted Setup has certain drawbacks in zk-SNARKs. These cryptographic protocols rely on the assumption that the entities conducting the Trusted Setup,...
Hello, My name is Kosei Akama, and I am a master's student at Keio University. I am writing to inquire about plans to adopt TPM-supported elliptic curves in the BBS...