2020
DOI: 10.48550/arxiv.2002.01847
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Zendoo: a zk-SNARK Verifiable Cross-Chain Transfer Protocol Enabling Decoupled and Decentralized Sidechains

Abstract: Sidechains are an appealing innovation devised to enable blockchain scalability and extensibility. The basic idea is simple yet powerful: construct a parallel chain -sidechain -with desired features, and provide a way to transfer coins between the mainchain and the sidechain.In this paper, we introduce Zendoo, a construction for Bitcoin-like blockchain systems that allows the creation and communication with sidechains of different types without knowing their internal structure. We consider a parent-child relat… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…zkSNARKs have been extensively explored in the literature [4], [7]- [22]. Also zkSNARKs have been used in many applications, for example in authentication systems [23], construction of various types of cryptographic protocols [24], privacy preserving crypto-currencies [25], smart contracts [26]- [28], miscellaneous applications in Blockchain technology [29]- [32], verifiable outsourcing of the computation [33], [34], and many other areas [35]. In addition, various toolboxes have been created to implement zkSNARKs, e.g., [36]- [39].…”
Section: Introductionmentioning
confidence: 99%
“…zkSNARKs have been extensively explored in the literature [4], [7]- [22]. Also zkSNARKs have been used in many applications, for example in authentication systems [23], construction of various types of cryptographic protocols [24], privacy preserving crypto-currencies [25], smart contracts [26]- [28], miscellaneous applications in Blockchain technology [29]- [32], verifiable outsourcing of the computation [33], [34], and many other areas [35]. In addition, various toolboxes have been created to implement zkSNARKs, e.g., [36]- [39].…”
Section: Introductionmentioning
confidence: 99%
“…In the dynamic setting, skipchains [80,139,116], i.e., double-linked skiplists which enable sub-linear crawling of identity chains, can reduce costs from linear to logarithmic (to the number of configurations). Recently, a number for light client protocols that leverage the compression properties of zero-knowledge proof systems have been proposed [83,81,165]. Verification of State Evolution.…”
mentioning
confidence: 99%