Zombie: Middleboxes that {Don't} Snoop
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …
{Zero-Knowledge} Middleboxes
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …
network middlebox that enforces network usage policies on encrypted traffic. Clients send …
[HTML][HTML] DACP: Enforcing a dynamic access control policy in cross-domain environments
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain
to cross-domain environments (CDEs) is important for distributed services. However …
to cross-domain environments (CDEs) is important for distributed services. However …
Doubly efficient interactive proofs for general arithmetic circuits with linear prover time
We propose a new doubly efficient interactive proof protocol for general arithmetic circuits.
The protocol generalizes the interactive proof for layered circuits proposed by Goldwasser …
The protocol generalizes the interactive proof for layered circuits proposed by Goldwasser …
Hyperproofs: Aggregating and maintaining proofs in vector commitments
S Srinivasan, A Chepurnoy, C Papamanthou… - 31st USENIX Security …, 2022 - usenix.org
We present Hyperproofs, the first vector commitment (VC) scheme that is efficiently
maintainable and aggregatable. Similar to Merkle proofs, our proofs form a tree that can be …
maintainable and aggregatable. Similar to Merkle proofs, our proofs form a tree that can be …
Constant-overhead zero-knowledge for RAM programs
We show a constant-overhead interactive zero-knowledge (ZK) proof system for RAM
programs, that is, a ZK proof in which the communication complexity as well as the running …
programs, that is, a ZK proof in which the communication complexity as well as the running …
CoopEdge+: Enabling decentralized, secure and cooperative multi-access edge computing based on blockchain
Multi-access Edge Computing (MEC) has emerged as a new distributed computing
paradigm for its ability to offer low-latency services to users. Suffering from constrained …
paradigm for its ability to offer low-latency services to users. Suffering from constrained …
Towards Interoperable Self-sovereign Identities
Self-sovereign identity is a digital identity paradigm that allows users and organizations to
manage digital identity in a decentralized fashion without any central authority controlling …
manage digital identity in a decentralized fashion without any central authority controlling …
[HTML][HTML] A survey on zero-knowledge authentication for internet of things
Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …
IoT smart devices can lead to the destruction of networks in untrustworthy environments …
Data ecosystems: sovereign data exchange among organizations (Dagstuhl Seminar 19391)
This report documents the program and the outcomes of Dagstuhl Seminar 19391``Data
Ecosystems: Sovereign Data Exchange among Organizations''. The goal of the seminar was …
Ecosystems: Sovereign Data Exchange among Organizations''. The goal of the seminar was …