Damus
Max · 4d
Bullet proofs is ancient zero knowledge tech. There was an insane amount of improvement with generalized zk proof systems, recursive proofs, reduced trust assumptions, more efficient circuit construct...
waxwing profile picture
Meh, that's mostly a mischaracterization I think. Bulletproofs as originally conceived was a valuable addition to the mix; it didn't have succinct verification so it couldn't *directly* compete with Groth16 and other pairing based schemes but it did have: no trusted setup and no assumptions outside of ECDLP. The other option was STARKs but the proof sizes were large. The verification scaling being bad was addressed in HALO and HALO2 with some rather clever tweaks, keeping the no-trusted-setup property while getting succinct verification. So nowadays it's a general class of algorithms see "folding schemes", "inner product arguments" and those can be flavours of zkSNARK; bulletproofs literally purely as originally written, yes, is rarely used, although perhaps occasionally still finds a use - an example is Curve Trees, which you mention. But it's also a paradigm which continues to be used in more sophisticated forms. Perhaps a confusion here is you were thinking about 'bulletproofs for confidential transactions via range proofs' (still used in Monero) as opposed to 'bulletproofs as a general ZKP system' (which was in the original paper).
21❤️3📝1🖤1
YORDL · 1d
Lot of good stuff for my notes here. Tried zapping but doesn't appear to be going through (sorry!)
Max · 1d
As always a lot of great insight, Thanks!
The Bitcoin Libertarian - En Español · 1d
"vos sos un maximalista auténtico, si Bitcoin no tiene nada que aprender de nada, entonces ni siquiera tiene que ser el mejor, es suficiente ser el que vos creés que es, ¡mira el precio que subió, esto es pura magia!"