English
Back
Completed
2023/02/02 → 2023/08/08, 09:00

Hacker Dōjō|Project Research: Halo2

200USDT
  • Research
  • Halo2
  • Details
  • Activities
Hunter’s Guide
How to earn crypto as a bounty hunter?
View Guide ↗
Payment network
Funder
Hacker Dōjō
Organization
contact
Hacker Dōjo
@hackerdojo
Send Mail
participants
 
Single-winner bounty
details

This bounty requires pre-communication before the task. Please contact Hacker Dojo @DoraDojo0 via Telegram to make sure you're eligible for the bounty. Continue reading to learn the sign-up process.

Bounty type: Topic study and interpretation

Language requirements: English

Applicant requirements: From an academic background of computer science/cryptography or other relevant majors.

How to finish the bounty task:

  1. Read the provided references to understand the key concepts and fundamentals. You're welcome to read more references that are not listed here.
  2. Do live workshop and interpret the following contents:
    1. The fundamentals of Halo2, including proof systems, PLONKish Arithmetization, chips and gadgets.
    2. The practices of Halo2, including developer tools and lookup tables.
    3. Future development of Halo2.
  3. Provide your manuscript after the live lecture. The deliverable should be text/picture/link.

References/Reading Materials:

https://trapdoor-tech.github.io/halo2-book-chinese/index.html

You are welcome to search for relevant data/studies on your own apart from the provided reading materials; If other studies were referenced in the research results, please indicate the source.

Sign-up

  1. Please click Participate on the left side on this page for registration ;
  2. Before starting the task, bounty hunters(applicants) will be asked to enter a simple screening via Telegram. Please contact @DoraDojo0 via Telegram before your study.
  3. The hunter approved will be granted the right to claim Bounty by starting the study;
  4. When the progress of the task is confirmed to be ready for the live workshop, Dōjo team will schedule a live sharing session for you to showcase your research results;
  5. Bounty in crpto will be issued after completing the live session and manuscript. Please claim the rewards on this page. (Hunter Rewards Claiming Guide: https://dorahacks.io/blog/guides/bounty-hunter/)

What is Dora Dōjō?

Dora Dōjō is an open source community for Frontier Web3 knowledge contributors and learners built by hackers. Dōjō organizes regular open-source knowledge sessions via Livestream/Twitter Space/blog posts, the topics including interpretation of Web3 cutting-edge technology papers, workshops, seminars with crypto tech leaders and so on. Welcome to discuss and learn in the Dora Dōjō community: https://community.dorahacks.io/c/buidl-dorahacks-io/6

The topics currently shared by Dōjō including:

  • Narwhal Mempool Protocol and Tusk Consensus Protocol
  • Bullshark Consensus Protocol
  • Modular chain
  • Cryptography (symmetric encryption algorithms, hash functions, group and public key encryption, digital signatures and KZG commitments, zero-knowledge proofs)
  • Move Prover
  • Aptos Consensus

By joining Dōjō, hackers can suggest personal learning expectations, or take the initiative to propose topics that they are skilled at and have Dōjō team organize sharing sessions. At the same time, the Dora Dōjō Web3 Research Program offers subjects regularly for hackers to study and share their insights. Contributors will be rewarded in the form of a bounty.

Contact:

Telegram: @DoraDojo0

WeChat: @HackerDojo0

E-mail: hackerdojo0@gmail.com

Activities
  • The bounty was completed on 2023/07/10 15:59

  • BizzyB submitted a solution on 2023/02/27 18:57
    Description
    Concepts 1.1. Proof systems 1.2. PLONKish Arithmetization 1.3. Chips 1.4. Gadgets 2. User Documentation 2.1. Developer tools 2.2. A simple example 2.3. Lookup tables 2.4. Gadgets 2.5. Tips and tricks 2.6. WASM Guide 3. Developer Documentation 3.1. Feature development 4. Design 4.1. Proving system 4.1.1. Lookup argument 4.1.2. Permutation argument 4.1.3. Circuit commitments 4.1.4. Vanishing argument 4.1.5. Multipoint opening argument 4.1.6. Inner product argument 4.1.7. Comparison to other work 4.2. Protocol Description 4.3. Implementation 4.3.1. Proofs 4.3.2. Fields 4.3.3. Selector combining 4.4. Gadgets 4.4.1. Elliptic curve cryptography 4.4.1.1. Witnessing points 4.4.1.2. Incomplete and complete addition 4.4.1.3. Fixed-base scalar multiplication 4.4.1.4. Variable-base scalar multiplication 4.4.2. Sinsemilla 4.4.2.1. MerkleCRH 4.4.3. Decomposition 4.4.4. SHA-256 4.4.4.1. 16-bit table chip 5. Background Material 5.1. Fields 5.2. Polynomials 5.3. Cryptographic groups 5.4. Elliptic curves 5.5. Polynomial commitment using inner product argument 5.6. Recursion The halo2 Book halo2 Crates.io Documentation Minimum Supported Rust Version Requires Rust 1.60 or higher. Minimum supported Rust version can be changed in the future, but it will be done with a minor version bump. Controlling parallelism halo2 currently uses rayon for parallel computation. The RAYON_NUM_THREADS environment variable can be used to set the number of threads. You can disable rayon by disabling the "multicore" feature. Warning! Halo2 will lose access to parallelism if you disable the "multicore" feature. This will significantly degrade performance. License Licensed under either of Apache License, Version 2.0, (LICENSE-APACHE or http://www.apache.org/licenses/LICENSE-2.0) MIT license (LICENSE-MIT or http://opensource.org/licenses/MIT) at your option. Contribution Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions. Email - victoriachensky@gmail.com

  • BizzyB submitted a solution on 2023/02/25 23:08

  • BizzyB submitted a solution on 2023/02/25 22:36
    Description
    I have all the required Fundamentals Telegram - @godofcult

  • The bounty was created on 2023/02/02 17:18