PANews reported on November 11th that ZCash research expert c-node published an article on the X platform stating, "MPC, tFHE, and TEEs can build privacy applications that are impossible to achieve using ZK, but their privacy strength is relatively weak. It is recommended to prioritize pure ZK for applications such as payments, transfers, and voting." Vitalik Buterin responded, "ZK itself cannot provide anti-coercion capabilities; in scenarios such as voting, it still needs to be combined with trusted parties, MPC, FHE, or TEEs to achieve this feature. We can improve system security through a ZK+FHE layered architecture, so that even if FHE is compromised, all privacy attributes except anti-coercion can be retained. I suspect a similar situation applies to almost all other cryptographic application scenarios besides zero-knowledge proofs."PANews reported on November 11th that ZCash research expert c-node published an article on the X platform stating, "MPC, tFHE, and TEEs can build privacy applications that are impossible to achieve using ZK, but their privacy strength is relatively weak. It is recommended to prioritize pure ZK for applications such as payments, transfers, and voting." Vitalik Buterin responded, "ZK itself cannot provide anti-coercion capabilities; in scenarios such as voting, it still needs to be combined with trusted parties, MPC, FHE, or TEEs to achieve this feature. We can improve system security through a ZK+FHE layered architecture, so that even if FHE is compromised, all privacy attributes except anti-coercion can be retained. I suspect a similar situation applies to almost all other cryptographic application scenarios besides zero-knowledge proofs."

Vitalik: ZK itself cannot provide anti-coercion protection and must be used in conjunction with trusted parties, MPC, FHE, or TEE.

2025/11/11 10:53

PANews reported on November 11th that ZCash research expert c-node published an article on the X platform stating, "MPC, tFHE, and TEEs can build privacy applications that are impossible to achieve using ZK, but their privacy strength is relatively weak. It is recommended to prioritize pure ZK for applications such as payments, transfers, and voting." Vitalik Buterin responded, "ZK itself cannot provide anti-coercion capabilities; in scenarios such as voting, it still needs to be combined with trusted parties, MPC, FHE, or TEEs to achieve this feature. We can improve system security through a ZK+FHE layered architecture, so that even if FHE is compromised, all privacy attributes except anti-coercion can be retained. I suspect a similar situation applies to almost all other cryptographic application scenarios besides zero-knowledge proofs."

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like