Zombie: Middleboxes that {Don't} Snoop

C Zhang, Z DeStefano, A Arun, J Bonneau… - … USENIX Symposium on …, 2024 - usenix.org
Zero-knowledge middleboxes (ZKMBs) are a recent paradigm in which clients get privacy
and middleboxes enforce policy: clients prove in zero knowledge that the plaintext …

{Zero-Knowledge} Middleboxes

P Grubbs, A Arun, Y Zhang, J Bonneau… - 31st USENIX Security …, 2022 - usenix.org
This paper initiates research on zero-knowledge middleboxes (ZKMBs). A ZKMB is a
network middlebox that enforces network usage policies on encrypted traffic. Clients send …

[HTML][HTML] DACP: Enforcing a dynamic access control policy in cross-domain environments

A Salehi, R Han, C Rudolph, M Grobler - Computer Networks, 2023 - Elsevier
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain
to cross-domain environments (CDEs) is important for distributed services. However …

Doubly efficient interactive proofs for general arithmetic circuits with linear prover time

J Zhang, T Liu, W Wang, Y Zhang, D Song… - Proceedings of the …, 2021 - dl.acm.org
We propose a new doubly efficient interactive proof protocol for general arithmetic circuits.
The protocol generalizes the interactive proof for layered circuits proposed by Goldwasser …

Hyperproofs: Aggregating and maintaining proofs in vector commitments

S Srinivasan, A Chepurnoy, C Papamanthou… - 31st USENIX Security …, 2022 - usenix.org
We present Hyperproofs, the first vector commitment (VC) scheme that is efficiently
maintainable and aggregatable. Similar to Merkle proofs, our proofs form a tree that can be …

Constant-overhead zero-knowledge for RAM programs

N Franzese, J Katz, S Lu, R Ostrovsky, X Wang… - Proceedings of the …, 2021 - dl.acm.org
We show a constant-overhead interactive zero-knowledge (ZK) proof system for RAM
programs, that is, a ZK proof in which the communication complexity as well as the running …

CoopEdge+: Enabling decentralized, secure and cooperative multi-access edge computing based on blockchain

L Yuan, Q He, S Tan, B Li, J Yu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Multi-access Edge Computing (MEC) has emerged as a new distributed computing
paradigm for its ability to offer low-latency services to users. Suffering from constrained …

Towards Interoperable Self-sovereign Identities

H Yildiz, A Küpper, D Thatmann, S Göndör… - IEEE …, 2023 - ieeexplore.ieee.org
Self-sovereign identity is a digital identity paradigm that allows users and organizations to
manage digital identity in a decentralized fashion without any central authority controlling …

[HTML][HTML] A survey on zero-knowledge authentication for internet of things

Z Chen, Y Jiang, X Song, L Chen - Electronics, 2023 - mdpi.com
The Internet of Things (IoT) is ubiquitous in our lives. However, the inherent vulnerability of
IoT smart devices can lead to the destruction of networks in untrustworthy environments …

Data ecosystems: sovereign data exchange among organizations (Dagstuhl Seminar 19391)

C Cappiello, A Gal, M Jarke, J Rehof - Dagstuhl Reports, 2020 - drops.dagstuhl.de
This report documents the program and the outcomes of Dagstuhl Seminar 19391``Data
Ecosystems: Sovereign Data Exchange among Organizations''. The goal of the seminar was …