[HTML][HTML] SoK: Privacy-preserving smart contract

H Qi, M Xu, D Yu, X Cheng - High-Confidence Computing, 2024 - Elsevier
The privacy concern in smart contract applications continues to grow, leading to the
proposal of various schemes aimed at developing comprehensive and universally …

Do You Need a Zero Knowledge Proof?

J Ernstberger, S Chaliasos, L Zhou… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Zero-Knowledge Proofs (ZKPs), a cryptographic tool known for decades, have
gained significant attention in recent years due to advancements that have made them …

SoK: What don't we know? Understanding Security Vulnerabilities in SNARKs

S Chaliasos, J Ernstberger, D Theodore… - arXiv preprint arXiv …, 2024 - arxiv.org
Zero-knowledge proofs (ZKPs) have evolved from being a theoretical concept providing
privacy and verifiability to having practical, real-world implementations, with SNARKs …

How to Prove Statements Obliviously?

S Garg, A Goel, M Wang - Cryptology ePrint Archive, 2023 - eprint.iacr.org
Cryptographic applications often require proving statements about hidden secrets satisfying
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …

Zero-knowledge proof vulnerability analysis and security auditing

X Tang, L Shi, X Wang, K Charbonnet… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Zero-Knowledge Proof (ZKP) technology marks a revolutionary advancement in the
field of cryptography, enabling the verification of certain information ownership without …

Snarktor: A Decentralized Protocol for Scaling SNARKs Verification in Blockchains

A Garoffolo, D Kaidalov, R Oliynykov - Cryptology ePrint Archive, 2024 - eprint.iacr.org
The use of zero-knowledge Succinct Non-Interactive Arguments of Knowledge (zk-SNARK)
and similar types of proofs has become increasingly popular as a solution for improving …

ZEBRA: SNARK-based Anonymous Credentials for Practical, Private and Accountable On-chain Access Control

D Rathee, GV Policharla, T Xie, R Cottone… - Cryptology ePrint …, 2022 - eprint.iacr.org
Restricting access to certified users is not only desirable for many blockchain applications, it
is also legally mandated for decentralized finance (DeFi) applications to counter malicious …

Conan: Distributed Proofs of Compliance for Anonymous Data Collection

M Zhou, E Shi, G Fanti - Cryptology ePrint Archive, 2023 - eprint.iacr.org
We consider how to design an anonymous data collection protocol that enforces compliance
rules. Imagine that each client contributes multiple data items (eg, votes, location crumbs, or …

Confidential and Verifiable Machine Learning Delegations on the Cloud

W Wu, S Homsi, Y Zhang - Cryptology ePrint Archive, 2024 - eprint.iacr.org
With the growing adoption of cloud computing, the ability to store data and delegate
computations to powerful and affordable cloud servers have become advantageous for both …

Scalable Collaborative zk-SNARK and Its Application to Efficient Proof Outsourcing

X Liu, Z Zhou, Y Wang, J He, B Zhang, X Yang… - Cryptology ePrint …, 2024 - eprint.iacr.org
Abstract Collaborative zk-SNARK (USENIX'22) allows multiple parties to jointly create a zk-
SNARK proof over distributed secrets (also known as the witness). It provides a promising …