1.
Orochi Network
❱
1.1.
Orand V1
1.2.
Orochi Network SDK
1.3.
Orand Contract Integration
1.4.
Orand Code Integration
1.5.
API Reference
2.
Verifiable Random Function (VRF)
❱
2.1.
Overview of VRF
❱
2.1.1.
Introduction to VRF
2.1.2.
VRF Algorithms
2.1.3.
VRF Security Properties
2.1.4.
History of VRF
2.2.
VRF Based on Elliptic Curve (ECVRF)
❱
2.2.1.
Why using ECVRF
2.2.2.
ECVRF Construction
2.2.3.
ECVRF Auxiliary Function
2.2.4.
Implementation
3.
Distributed Key Generation (DKG)
❱
3.1.
Overview of DKG
❱
3.1.1.
DKG Properties
3.1.2.
DKG Application
3.2.
Verifiable Secret Sharing (VSS)
❱
3.2.1.
Introduction
3.2.2.
Syntax and Properties
3.2.3.
Pedersen's Construction
3.3.
Construction
❱
3.3.1.
Why Gennaro et al's Construction?
3.3.2.
Gennaro et al's Construction
4.
Isogeny Based Crypto
❱
4.1.
Overview of Supersingular Isogeny Graph
❱
4.1.1.
Elliptic Curves
4.1.2.
Isogenies
4.1.3.
Supersingular Elliptic Curves
4.1.4.
Supersingular Isogeny Graph (Pizer Graphs)
4.1.5.
Applications of Pizer Graphs
5.
KZG Polynomial Commitment Scheme
❱
5.1.
Polynomial Commitment Scheme - Definition
❱
5.1.1.
Syntax
5.1.2.
Security Requirements
5.2.
Technical Overview
❱
5.2.1.
Commitment to Polynomial Without Hiding Property
5.2.2.
Correct Evaluation from the Commitment
5.2.3.
Dealing with Hiding
6.
PlonK
❱
6.1.
PlonK's Arithmetization
❱
6.1.1.
Circuit Specification
6.1.2.
Breaking Circuit
6.1.3.
Gate Constraints
6.1.4.
Copy Constraints
7.
Halo 2 for Dummies
❱
7.1.
PLONKish Arithemetization
❱
7.1.1.
A Simple Arithmetic Circuit
7.1.2.
Transforming to PLONKish Arithmetization
7.2.
A Simple Halo 2 Program
Bibliography
Light
Rust
Coal
Navy
Ayu
Orochi Network's Cookbook
VRF Security Properties