All applications have one primitive in common: the intent. Decentralized intent-completion mechanisms are application-specific and no one has yet proposed one that is generalized and able of completing any intent.
The goal of this article is to understand the main architectural differences between Taiga and prior work such as Zexe and Verizexe, and the realm of posibilites, solutions and challenges that this new paradigm brings.
Anoma is the first ever intent-centric architecture, introducing a new paradigm for building infrastructure layers and a new operating system for decentralized applications. The Anoma Foundation is thrilled to announce the completion of the 3rd round for Anoma – raising a total of USD 25M.
A primer on the concept of arithmetic circuits. We will take a look at what arithmetic circuits are, what they are used for, what tools are there for working with them, including the tools we develop here at Anoma, and what we can do with the circuits using these tools.
A quick overview of the proving system and show how to write a circuit that computes a small part of a common hash function that benefits greatly from the inclusion of lookups alongside arithmetic gates.
Heterogeneous Paxos exploits the high intersection between validator sets of different blockchain to create a heterogeneous consensus protocol for atomic multi-chain transactions & extends the capabilities of IBC to allow for arbitrary communication between chains within an atomic transaction
Ferveo includes a custom-designed distributed key generator & custom-designed threshold decryption scheme intended to meet the performance & security requirements of the underlying consensus mechanism.
Recursive zero-knowledge proofs are new cryptographic primitives relevant to the Anoma blockchain use case. In this article, we investigate the possible alternatives for verifying blockchain circuits efficiently. Our main interest is in estimating the efficiency of pairing-based constructions.
ZEXE is a ledger-based system that allows for the running of multiple applications atop the same ledger in a way that transactions reveal no information about the particular computations which are performed.
Introducing side-channel analysis/attacks (SCA) and counter-measures and to provide directions that can help security assessments take them into consideration. Side-channels are relevant to cryptographic implementations, and as such they introduce a class of attack vectors in the blockchain context.