1. 1. Orochi Network
    ❱
    1. 1.1. Orand V1
    2. 1.2. Orochi Network SDK
    3. 1.3. Orand Contract Integration
    4. 1.4. Orand Code Integration
    5. 1.5. API Reference
  2. 2. Verifiable Random Function (VRF)
    ❱
    1. 2.1. Overview of VRF
      ❱
      1. 2.1.1. Introduction to VRF
      2. 2.1.2. VRF Algorithms
      3. 2.1.3. VRF Security Properties
      4. 2.1.4. History of VRF
    2. 2.2. VRF Based on Elliptic Curve (ECVRF)
      ❱
      1. 2.2.1. Why using ECVRF
      2. 2.2.2. ECVRF Construction
      3. 2.2.3. ECVRF Auxiliary Function
      4. 2.2.4. Implementation
  3. 3. Distributed Key Generation (DKG)
    ❱
    1. 3.1. Overview of DKG
      ❱
      1. 3.1.1. DKG Properties
      2. 3.1.2. DKG Application
    2. 3.2. Verifiable Secret Sharing (VSS)
      ❱
      1. 3.2.1. Introduction
      2. 3.2.2. Syntax and Properties
      3. 3.2.3. Pedersen's Construction
    3. 3.3. Construction
      ❱
      1. 3.3.1. Why Gennaro et al's Construction?
      2. 3.3.2. Gennaro et al's Construction
  4. 4. Isogeny Based Crypto
    ❱
    1. 4.1. Overview of Supersingular Isogeny Graph
      ❱
      1. 4.1.1. Elliptic Curves
      2. 4.1.2. Isogenies
      3. 4.1.3. Supersingular Elliptic Curves
      4. 4.1.4. Supersingular Isogeny Graph (Pizer Graphs)
      5. 4.1.5. Applications of Pizer Graphs
  5. 5. KZG Polynomial Commitment Scheme
    ❱
    1. 5.1. Polynomial Commitment Scheme - Definition
      ❱
      1. 5.1.1. Syntax
      2. 5.1.2. Security Requirements
    2. 5.2. Technical Overview
      ❱
      1. 5.2.1. Commitment to Polynomial Without Hiding Property
      2. 5.2.2. Correct Evaluation from the Commitment
      3. 5.2.3. Dealing with Hiding
  6. 6. PlonK
    ❱
    1. 6.1. PlonK's Arithmetization
      ❱
      1. 6.1.1. Circuit Specification
      2. 6.1.2. Breaking Circuit
      3. 6.1.3. Gate Constraints
      4. 6.1.4. Copy Constraints
  7. 7. Halo 2 for Dummies
    ❱
    1. 7.1. PLONKish Arithemetization
      ❱
      1. 7.1.1. A Simple Arithmetic Circuit
      2. 7.1.2. Transforming to PLONKish Arithmetization
    2. 7.2. A Simple Halo 2 Program
  8. Bibliography

Orochi Network's Cookbook

VRF Security Properties