Posted by halseth
Feb 18, 2025/21:43 UTC
The discussion revolves around an innovative method focused on enhancing the efficiency of signature verification processes by utilizing a blinded key. This strategy allows for the offloading of intensive Elliptic Curve (EC) operations from the Zero Knowledge (ZK) environment, thereby addressing performance bottlenecks associated with these computations. The conversation is detailed in a GitHub issue, which can be explored further through this link. It is noted that after implementing this new approach, the SHA-512 hashing required for verifying the utreexo proof has become the primary factor affecting runtime performance.
In light of the above, there's an exploration into potential solutions for mitigating the impact of SHA-512 hashing on performance. Two possibilities are suggested: firstly, the adoption of the poseidon2
hash function as an alternative to SHA-512, and secondly, leveraging the Risc0 precompile specifically designed for SHA-512 hashing. The latter option is mentioned in the context of the existing implementation, which currently utilizes the bitcoin_hashes::Sha512
library. This shift in hashing methodology poses questions regarding the feasibility and ease of integration of these alternatives into the existing system, aiming to optimize the verification process while maintaining or improving upon current security and performance standards.
TLDR
We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.
We'd love to hear your feedback on this project?
Give Feedback