Cryptography & Security Verifiable Extraction in The Graph In this article we discuss the methodology that Semiotic Labs uses to verify that blockchain data extracted from some source matches the history of the chain.
Cryptography & Security Homomorphic Signatures for Payment Channels This post discusses design and optimization of verifiable micropayments over a state channel, a feature of Semiotic Labs’ GraphTally library for The Graph. The Graph is a decentralized data services protocol, allowing customers to index and access all blockchain data.
Cryptography & Security PSI with FHE Private Set Intersection is a cryptographic technique that allows two parties to identify information they share without leaking any other information. This can be used in secure contact tracing during epidemics or in privacy-preserving human genome testing.
Cryptography & Security Introduction to the Sum-Check Protocol It's expensive to run transactions on the Ethereum EVM. Verifiable computing (VC) lets us outsource computing away from the EVM. Today, a popular and exciting form of VC algorithm is the SNARK. Various families of SNARKs use the sum-check protocol, which is a simple VC algorithm.