Orion: Zero knowledge proof with linear prover time

T Xie, Y Zhang, D Song - Annual International Cryptology Conference, 2022 - Springer
Zero-knowledge proof is a powerful cryptographic primitive that has found various
applications in the real world. However, existing schemes with succinct proof size suffer from …

{zkSaaS}:{Zero-Knowledge}{SNARKs} as a Service

S Garg, A Goel, A Jain, GV Policharla… - 32nd USENIX Security …, 2023 - usenix.org
A decade of active research has led to practical constructions of zero-knowledge succinct
non-interactive arguments of knowledge (zk-SNARKs) that are now being used in a wide …

Spartan and bulletproofs are simulation-extractable (for free!)

Q Dao, P Grubbs - Annual International Conference on the Theory and …, 2023 - Springer
Increasing deployment of advanced zero-knowledge proof systems, especially zkSNARKs,
has raised critical questions about their security against real-world attacks. Two classes of …

Zombie: Middleboxes that {Don't} Snoop

C Zhang, Z DeStefano, A Arun, J Bonneau… - … USENIX Symposium on …, 2024 - usenix.org
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …

Bounded Verification for Finite-Field-Blasting: In a Compiler for Zero Knowledge Proofs

A Ozdemir, RS Wahby, F Brown, C Barrett - International Conference on …, 2023 - Springer
Abstract Zero Knowledge Proofs (ZKPs) are cryptographic protocols by which a prover
convinces a verifier of the truth of a statement without revealing any other information …

Satisfiability modulo finite fields

A Ozdemir, G Kremer, C Tinelli, C Barrett - International Conference on …, 2023 - Springer
We study satisfiability modulo the theory of finite fields and give a decision procedure for this
theory. We implement our procedure for prime fields inside the cvc5 SMT solver. Using this …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

[PDF][PDF] Two Shuffles Make a RAM: Improved Constant Overhead Zero Knowledge RAM.

Y Yang, D Heath - IACR Cryptol. ePrint Arch., 2023 - usenix.org
Abstract We optimize Zero Knowledge (ZK) proofs of statements expressed as RAM
programs over arithmetic values. Our arithmetic-circuit-based read/write memory uses only 4 …

End-to-End Secure Messaging with Traceability Only for Illegal Content

J Bartusek, S Garg, A Jain, GV Policharla - … International Conference on …, 2023 - Springer
As end-to-end encrypted messaging services become widely adopted, law enforcement
agencies have increasingly expressed concern that such services interfere with their ability …

Not-So-Low Hanging Fruit: Security and Privacy Research Opportunities for IETF Protocols

CA Wood - Proceedings of the Applied Networking Research …, 2023 - dl.acm.org
The IETF is actively developing technical specifications for state-of-the-art cryptographic
protocols that aim to improve user privacy in the areas of privacy-preserving measurement …