Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs

M Babel, J Sedlmeir - arXiv preprint arXiv:2301.00823, 2023 - arxiv.org
Today, digital identity management for individuals is either inconvenient and error-prone or
creates undesirable lock-in effects and violates privacy and security expectations. These …

zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure

M Rosenberg, J White, C Garman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
Frequently, users on the web need to show that they are, for example, not a robot, old
enough to access an age restricted video, or eligible to download an ebook from their local …

Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols

J Bacelar Almeida, M Barbosa, E Bangerter… - Proceedings of the …, 2012 - dl.acm.org
Developers building cryptography into security-sensitive applications face a daunting task.
Not only must they understand the security guarantees delivered by the constructions they …

LiteZKP: Lightening zero-knowledge proof-based blockchains for IoT and edge platforms

ES Boo, J Kim, JG Ko - IEEE Systems Journal, 2021 - ieeexplore.ieee.org
This article presents LiteZKP a framework for supporting multiple anonymous payments
using a smart contract-based zero-knowledge proof (ZKP) protocol on resource-limited …

VAIM: verifiable anonymous identity management for human-centric security and privacy in the internet of things

G Ra, T Kim, I Lee - IEEE Access, 2021 - ieeexplore.ieee.org
The human internet of things (HIoT) is a promising trend that adopts a user-centered vision
to improve life quality by interacting with heterogeneous physical and virtual entities and the …

ZPiE: Zero-knowledge proofs in embedded systems

X Salleras, V Daza - Mathematics, 2021 - mdpi.com
Zero-Knowledge Proofs (ZKPs) are cryptographic primitives allowing a party to prove to
another party that the former knows some information while keeping it secret. Such a …

[HTML][HTML] Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities

L Zhou, A Diro, A Saini, S Kaisar, PC Hiep - Journal of Information Security …, 2024 - Elsevier
Identity sharing systems, regardless of their architectural models, share common
vulnerabilities. These systems compel users to divulge personal information and furnish …

CC: A Framework for Building Composable Zero-Knowledge Proofs

A Kosba, Z Zhao, A Miller, Y Qian, H Chan… - Cryptology ePrint …, 2015 - eprint.iacr.org
Non-interactive zero-knowledge proofs are a powerful cryptographic primitive used in
privacy-preserving protocols. We design and build C $\emptyset $ C $\emptyset $, the first …

Efficient zero-knowledge proof of algebraic and non-algebraic statements with applications to privacy preserving credentials

M Chase, C Ganesh, P Mohassel - … , Santa Barbara, CA, USA, August 14 …, 2016 - Springer
Practical anonymous credential systems are generally built around sigma-protocol ZK
proofs. This requires that credentials be based on specially formed signatures. Here we ask …

Curve trees: Practical and transparent {Zero-Knowledge} accumulators

M Campanelli, M Hall-Andersen, SH Kamp - 32nd USENIX Security …, 2023 - usenix.org
In this work we improve upon the state of the art for practical zero-knowledge for set
membership, a building block at the core of several privacy-aware applications, such as …