TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Zero Knowledge virtual machine step by step

2 点作者 frizzy将近 2 年前

1 comment

sharemywin将近 2 年前
From the article:<p>Here are some more examples that illustrate this position:<p>(1) Revenue-based lending: verify an organization’s revenue stream, without knowing the specific transaction details or channels.<p>(2) Regulatory surveillance: verify that an organization is adhering to regulation without requiring access to the details of its activities.<p>(3) KYC&#x2F;AML verification without privacy violation: verify age and citizenship of individuals without requiring them to supply their name or any other personally identifiable information.<p>(4) Contract verification: verify that an organization has entered into a valuable contract with a counterparty without disclosing who the counterparty is.<p>(5) Vice clause verification: verify that an organization has not been trading with unethical organizations, without having access to the list of organization’s trading counterparties.