
Cryptography & Security
Verifiable Extraction in The Graph
In this article we discuss the methodology that Semiotic Labs uses to verify that blockchain data extracted from some source matches the history of the chain.
Novel cryptographic primitives and verification systems that enable scalable, trustless applications. These tools support signature aggregation, message validation, and efficient on-chain proofs.
Cryptography & Security
In this article we discuss the methodology that Semiotic Labs uses to verify that blockchain data extracted from some source matches the history of the chain.
Cryptography & Security
This post discusses design and optimization of verifiable micropayments over a state channel, a feature of Semiotic Labs’ GraphTally library for The Graph. The Graph is a decentralized data services protocol, allowing customers to index and access all blockchain data.
Cryptography & Security
Private Set Intersection is a cryptographic technique that allows two parties to identify information they share without leaking any other information. This can be used in secure contact tracing during epidemics or in privacy-preserving human genome testing.
Cryptography & Security
It's expensive to run transactions on the Ethereum EVM. Verifiable computing (VC) lets us outsource computing away from the EVM. Today, a popular and exciting form of VC algorithm is the SNARK. Various families of SNARKs use the sum-check protocol, which is a simple VC algorithm.