- 126
- 104 037
Ingonyama
เข้าร่วมเมื่อ 30 ต.ค. 2022
Ingonyama is a next-generation semiconductor company, focusing on Zero-Knowledge Proof hardware acceleration. Using a broad, multidisciplinary approach and a deep understanding of the ZK landscape, we focus on finding and solving computational bottlenecks in ZKPs. Our goal is to radically improve the performance of Zero-Knowledge (ZK) Provers by designing hardware optimized for ZK computation.
10x Faster Sumcheck over Binary Tower Fields
Presenting work by Suyash Bagad and Yuval Domb of Ingonyama in collaboration with Justin Thaler
With thanks to Polyhedra for hosting the Sumcheck Builders Seminars.
With thanks to Polyhedra for hosting the Sumcheck Builders Seminars.
มุมมอง: 56
วีดีโอ
Accelerating Zero-Knowledge Proofs Computation with GPUs, by Giuseppe of Zircuit
มุมมอง 48วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Unifying ZK: A Comprehensive DSL Framework for Tomorrow, by Jon Stephens of Veridise
มุมมอง 25วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Thoughts and Ideas on ZK Tooling, by Vitalik Buterin
มุมมอง 60วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Staking on Starknet, by Noam Nisan of Starkware
มุมมอง 31วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Orbital Trusted Party, by Matej Yangwao of Spacecoin
มุมมอง 12วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Rarimo’s ZK passport registry: what it is and why it’s making people angry, by KItty of Rarimo
มุมมอง 17วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Mass adoption with private and asynchronous blockchains, by Bobbin Threadbare of Polygon Miden
มุมมอง 15วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
The Protocol Labs v10, by Niki Gokani of Protocol Labs
มุมมอง 16วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Coordination Layer For Ethereum, by Zerokpunk of Orbiter Finance
มุมมอง 12วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
How to accelerate EVM Proof Generation by Alisa Cherniaeva of =nil; Foundation
มุมมอง 16วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
ZK Chains: Powering Verifiable Applications for the Private, Provable Web by Evan Shapiro of Mina
มุมมอง 78วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Optimizing proof generation for the Aztec Provernet through Kalypso, by Roshan Raghupathy of Marlin
มุมมอง 7วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Design Trade-offs for zkvms for Proof Aggregation, by Diego Kingston of LambdaClass
มุมมอง 18วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
Foundational ZK Proving for Verifiable Compute, by Ismael H-R of Lagrange
มุมมอง 15วันที่ผ่านมา
Talk presented at ZK Accelerate Bangkok, hosted by Ingonyama
A Journey to the Becoming a Faster ZK backend library, by Ryan Kim of Kroma
มุมมอง 26วันที่ผ่านมา
A Journey to the Becoming a Faster ZK backend library, by Ryan Kim of Kroma
All apps are rollups, all rollups are apps, by Sylve Chevet of Hylé
มุมมอง 22วันที่ผ่านมา
All apps are rollups, all rollups are apps, by Sylve Chevet of Hylé
Advancing ZK Technology: zkVerify’s Modular Blockchain Approach, by Zain Cheng of Horizen Labs
มุมมอง 33วันที่ผ่านมา
Advancing ZK Technology: zkVerify’s Modular Blockchain Approach, by Zain Cheng of Horizen Labs
Scaling your ZK Infra for Next Billion Users, by Pranav Mehrotrah and Kunal Limaye of Google
มุมมอง 14วันที่ผ่านมา
Scaling your ZK Infra for Next Billion Users, by Pranav Mehrotrah and Kunal Limaye of Google
How to Start Proving on Gevulot Firestarter? by Norbert Vadas of Gevulot
มุมมอง 13วันที่ผ่านมา
How to Start Proving on Gevulot Firestarter? by Norbert Vadas of Gevulot
Towards ZK-friendly Machine Learning, by Alan of brevis
มุมมอง 25วันที่ผ่านมา
Towards ZK-friendly Machine Learning, by Alan of brevis
Hitchhiker's Guide to the Proof Aggregation, by Garvit Goel of Electron
มุมมอง 28วันที่ผ่านมา
Hitchhiker's Guide to the Proof Aggregation, by Garvit Goel of Electron
Zero-Knowledge in a Nutshell, by Lisa Akselrod of Aztec
มุมมอง 25วันที่ผ่านมา
Zero-Knowledge in a Nutshell, by Lisa Akselrod of Aztec
Programmable Cryptography panel from EthCC Brussels 2024, hosted by Encode Club
มุมมอง 924 หลายเดือนก่อน
Programmable Cryptography panel from EthCC Brussels 2024, hosted by Encode Club
CUDA Mini Course #4, presented by Hadar Sackstein, Algorithms Engineer at Ingonyama. Final session.
มุมมอง 1234 หลายเดือนก่อน
CUDA Mini Course #4, presented by Hadar Sackstein, Algorithms Engineer at Ingonyama. Final session.
You're doing a fantastic job! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
I really appreciate your efforts! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
Thanks for the analysis! Could you help me with something unrelated: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). What's the best way to send them to Binance?
You're doing a fantastic job! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
Thanks for the breakdown! I need some advice: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?
here before the vans
Damn
Nice! Would love to see more of these.
Informative video with really interactive animation(shows the work you put in). Need to work on the sound engineering though, the cadence of the talking does not match the music and clashes with your voice, it's kinda distracting.
the music is very distracting
3:38 I know the example is a simplification but it seems like peggy is trusting victor to shuffle the cards. because if she is the one shuffling the cards and handing them to victor then, victor is trusting that that peggy is not just handing him 1 to 9 cards that don't necessarily come from the row.
There was a question at the end of the talk about the point at which the PCIe bandwidth becomes the limiting factor. Here's a quick back of the envelope. PCIe can push approx 12,000,000,000 bytes/sec. A scalar is 32-bytes (256-bits). So we can push 375M scalars over a second. It takes us 7 cycles to process a scalar (7 windows per CU and 1 cycle per window on each CU). So that would mean the PCIe would only become the limiter at 7*375MHz = 2.6 GHz, which is far beyond the capabilities of the card. In other words, the PCIe bandwidth is not an issue.
Its not a proof, its a probabilistic claim
I really don't get why everyone is so hot on this, it's literally useless. By definition it serves no purpose, what's the point of proving something that can't be reviled, the idea of proving something is to assert if it's true or false. And if we prove that something that we don't know, is either true or false is by definition meaningless because we have no idea what we are proving. Not to mention that this form of verification is really heavy in terms of computations for something trivial, for example we are trying to prove that we are the user that wants to gain access to a certain machine, with zkps we need to have constant open connection so both can attest to the claim and eventually agree that me the anonymous person has access to the account. And since no sound system that uses authentication can make any sense without some sort of account identifier after authenticating it means that after the handshake we already know the id of the person authenticating, allowing for tracking through session ids to build profiles. There are so much better solutions than this, that are completely decentralized without the use of computation, for example EVM signatures, we take a statement, we sign it and anyone can prove that it was done by us. It seems like the latest crypto buzz word to defraud investors, big words no meaning and lack of any practical (key word) implementation.
Link to slides here please. I cannot access X :)
Massively helpful. Thanks for sharing your knowledge Hadar 🙏
🥳
🙏🙏🙏
This is amazing, thank you Hadar 🔥
This is a great video. Good run down of sumcheck.
Xuy
nice ingfo
Did I miss that or Peggy didn't prove that each cell contains the same number for each color and this way can craft proofs very widely?
nice
Nice
nice information
hi Alidneder
good
Good porzit
Thanks for having me!
I don't understand why web3 devs aren't talking about ZAMA yet:)
wouldn't it be better said, as, obfuscated conditional proofs, rather than zero knowledge, as you are giving some understanding away but not enough to discern the information your trying to obfuscate.
Love the Sudoku solution
Superb quality video! Deserves way more views. You have done an amazing job covering in a short video key ideas of a complex subject. The amount of work that went into this video is huge, but the result is worth it.
Ok
This panel got heated :D
gm nice presentation :)
i'm not convinced ... you can easily argue that a giraffe is really just a horse with a long neck but i'm not convinced ... because zero knowledge can't transmit knowledge
zkintro.com/articles/friendly-introduction-to-zero-knowledge
0 knowledge proof means that you can sometimes check whether a solution is correct without actually knowing the solution. some properties of it can be enough and to not get the actual solution, it can be encrypted by someone. in the sudoku example, V managed to test P's solution without knowing what the solution actually is. he just knew that if and only if what P gave to him was a solution, then there had to be 3 properties(the rules of sudoku). P then suffles the card (which encodes information) but doesn't change whether the properties are satisfied or not. This convinces T that P does indeed know of a solution but that encoding step makes it impossible for him to know what it is exactly. so 0 knowledge proofs doesn't transmit the solution itself but it does transmit the fact that a solution has been found. This is obviously extremely useful for a lot of reasons in real life situations.
Do you have a paper?
🤩
The music is not helping. Please avoid adding music to these videos
Go Robert!
Wow very good video
The ZKP Sudoku solution protocol is really cool, but, I'm not yet convinced that it 100% guarantees that Peggy found a correct solution. It seems that there is a very high likelihood that Peggy found a correct solution given that all the shuffled columns, rows and boxes contain each number from 1 to 9, but is there not the possibility that after shuffling, all the rows, columns and boxes seem correct, yet Peggy gave a bogus solution. Maybe I've not thought about it hard enough, but I don't see why there's not a (really) small chance that Peggy can give an incorrect solution yet after Victor shuffles and checks, the 'solution' appears correct. EDIT: Sorry I seem to have commented too early, at 7.03 you begin to talk about how there is a low probability of accepting a false positive! Nonetheless, my question still remains, is it possible to construct a non-solution which becomes a solution after some random shuffling?
You can be convinced by considering Victor doesn't care about knowing the solution, so the only thing that changes is that he will not mix. Victor can verify now that all rows, columns and boxes are right by judge flipping the tiles directly on the board, and now you're convinced she has a (the) solution. By doing the operation in the video, you DON'T change the content in each row, column and box. So if Victor checks directly on the board, then flips back the tiles, divide them by rows, columns and boxes, mix them and check again, each pile will have the SAME content, just not in the same order. Voilà !
in the sudoku proof victor verifies that all the starting digits are in there correct place (as those cards are flipped over) that every row has all the digits from 1 to 9 exactly once(using the first layer of cards), that every column has every digit from one to 9 exactly once(using the second set of cards), and that every 3*3 block has every digit from 1 to 9 exactly once (using the third set of cards. these are all the restrictions that the game of sudoku places on the player.
The sudoku example only works assuming Victor is not interested to know the solution. Because before he shuffles the piles, they contain the solution. I know it's a toy example but I wish it demonstrated how real privacy could be accomplished.
Peggy can watch the piles to assure that Victor shuffles before peeking.
or peggy could have shuffled the piles while victor watched
absolutely, victor also could have deployed 3 camera drones watching peggy at all times so he can find out exactly which cards she put where, such a trivial way he could have found out the solution.
But you can quite easily construct a fake proof for the sudoku with what you described if you can put non-matching numbers in the same place. Proving that numbers match would require knowledge either inspecting and watching it be placed, or inspecting certain tiles. It is only valid because you can check the other numbers under the known numbers. But that wasn’t made explicit
His first example fails. Peggy touches the stacks of cards during the setup. No, not allowed. Then Victor touches the cards before they are shuffled. No, not allowed. An infallible and honest intermediary is required for these tasks, however the idea that a computer is an "honest intermediary" cannot be proven since computers are hacked or infected constantly and no software can be proven to be bug-free.
the sets of 3 cards are placed in tamper evident envelopes and have enough security detailing (provided by victor and verified by Peggy to ensure that all cards of a particular number are the same) to make replacement impossible. Peggy lays out the unopened envelopes in the pattern then invites victor back into the room. She opens the envelopes corresponding to the starting numbers and he verifies they are in the right place. she then does the row column 3*3 block thing with victor watching and shuffles the cards (this part requires victor not to see but a small scannable chip on every card would make it easy to detect if Peggy had a card concealed somewhere to substitute in). It is also important to note that the point of the example at the start was to give an example of how the proof is structured and so it does not have to be completely watertight to do its intended function.
There is a much simpler way of doing this - if you know the sudoku solution then hash it and ask someone else to hash their solution and see if the hashes match.
That would require for the other person to have the solution, it would not be very useful. And also it is not really zero knowledge, the other party could (with a lot of time) check all the possible entries to the hash ang get the solution that way
one of the properties of zero knowledge proofs is that they can be checked by someone who does not have the information you are proving. If the proof you were going for was 'I have enough money in my bank to pay for this' then you could not get someone else to independently verify without giving up your banking details
Okay, you don't want me to know any details of any of your proofs, but want me to know you have proved them. Great, you can prove it with a zero knowledge proof. Now, how do knowledge proofs work, again?
I thought your whole explanation was just going to be: trust me it's possible haha