PinnedPriti KumariBulletproofing Hyperledger Fabric Production Network: Optimized Node SnapshotsRegularly capturing snapshots of nodes in a Hyperledger Fabric network is considered a best practice to uphold data integrity and…May 6, 2023May 6, 2023
PinnedPriti KumariUnveiling the Power of Merkle Trees: A Closer Look at Blockchain’s Secret WeaponMerkle Trees in Bitcoin use Double-SHA256 Cryptographic Hash AlgorithmApr 24, 20231Apr 24, 20231
PinnedPriti Kumari4 Powerful Multi-party Signature/Group Signature/Threshold Signature Schemes in Blockchain Part 2BLS Signatures — Ethereum, Solana and AlgorandApr 12, 2023Apr 12, 2023
PinnedPriti KumariinCoinmonksSecuring Your Digital Assets: Best Practices for Managing Private Keys in BlockchainIf a user’s private key is lost, stolen, or compromised, it could result in a permanent loss of their digital assets.Mar 29, 2023Mar 29, 2023
PinnedPriti KumariinBlock Magnates4 powerful Multi-party Signature/Group Signature/Threshold Signature Schemes in BlockchainShamir’s Secret Sharing — Cardano BLS Signatures — Ethereum, Solana, Algorand MuSig — Bitcoin, Litecoin Schnorr Signatures — PolkadotMar 26, 2023Mar 26, 2023
Priti KumariThe Working Guide to Post-QuantumBefore delving into the intricacies of implementation of post-quantum cryptography, it’s paramount to stay abreast of the latest…Feb 23Feb 23
Priti KumariHalo2 Takes Zero-Knowledge Proofs to New Heights in ZcashIn May 2022, Zcash implemented the Orchard shielded payment protocol as part of Network Upgrade 5 (NU5), incorporating the Halo 2…Jun 12, 2023Jun 12, 2023
Priti KumariZero Knowledge Proof: How Blockchain’s Transparency Can Coexist with PrivacyZero Knowledge Proofs and the Power of Privacy in BlockchainApr 28, 2023Apr 28, 2023
Priti KumariIn a Merkle tree, the width refers to the number of leaf nodes in the tree, while the height refers…The height of a Merkle tree depends on the number of leaf nodes in the tree. The height of the tree is equal to the logarithm base 2 of the…Apr 25, 2023Apr 25, 2023