David Wong

cryptologie.net

cryptography, security, and random thoughts

Hey! I'm David, cofounder of zkSecurity, research advisor at Archetype, and author of the Real-World Cryptography book. I was previously a cryptography architect of Mina at O(1) Labs, the security lead for Libra/Diem at Facebook, and a security engineer at the Cryptography Services of NCC Group. Welcome to my blog about cryptography, security, and other related topics.

← back to all posts

Intuitions Behind the Range Proofs of Bulletproof

blog

In this video I quickly go over the amazing post from the dalek implementation of bulletproof, which itself goes over the range proof protocol of Bulletproofs: Short Proofs for Confidential Transactions and More.

Note that if you don’t know what bulletproof or IPA are, you can check my previous writing on the subject.

To summarize, the way I see the rangeproof protocol built on top of bulletproof/IPA is that you’re proving execution of a circuit with:

  • input A := a (hiding) commitment aL to the bits of v, and an intermediary value aR=aL1
  • expected output := something based on V, the (hiding) commitment to v

if you can prove the execution of that circuit (which essentially checks that aL values are bits, and that they are the correct bit decomposition of v) correctly, then you convinced the verifier that v is n-bit. The computation is compressed in that inner product l(x),r(x)=t(x) where:

  • l(x),r(x) are intermediary values in our circuit, computed from aL and aR respectively to embody the circuit logic (unlike other intermediary values, these can be computed by the verifier directly)
  • t(x) is an intermediary value that contains the expected output, so we need to prove how it connects with the expected output

the proof that the inner product l(x),r(x)=t(x) itself is delegated to the IPA proof system, so most of the complexity there is to understand how the intermediary variables are calculated and how they connect (the blinding is what makes it more complicated)

← back to all posts blog • 2025-09-19
currently reading:
Intuitions Behind the Range Proofs of Bulletproof
09-19 blog
📖 my book
Real-World Cryptography is available from Manning Publications.
A practical guide to applied cryptography for developers and security professionals.
🎙️ my podcast
Two And A Half Coins on Spotify.
Discussing cryptocurrencies, databases, banking, and distributed systems.
📺 my youtube
Cryptography videos on YouTube.
Video explanations of cryptographic concepts and security topics.