zkbridge: Trustless cross-chain bridges made practical

T Xie, J Zhang, Z Cheng, F Zhang, Y Zhang… - Proceedings of the …, 2022 - dl.acm.org
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …

Verifiable delay functions

D Boneh, J Bonneau, B Bünz, B Fisch - Annual international cryptology …, 2018 - Springer
We study the problem of building a verifiable delay function (VDF). A VDF VDF requires a
specified number of sequential steps to evaluate, yet produces a unique output that can be …

Poseidon: A new hash function for {Zero-Knowledge} proof systems

L Grassi, D Khovratovich, C Rechberger… - 30th USENIX Security …, 2021 - usenix.org
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …

[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

Post-quantum zero-knowledge and signatures from symmetric-key primitives

M Chase, D Derler, S Goldfeder, C Orlandi… - Proceedings of the …, 2017 - dl.acm.org
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …

Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability

D Maram, H Malvai, F Zhang… - … IEEE Symposium on …, 2021 - ieeexplore.ieee.org
We present CanDID, a platform for practical, user-friendly realization of decentralized
identity, the idea of empowering end users with management of their own credentials. While …

Ciphers for MPC and FHE

MR Albrecht, C Rechberger, T Schneider… - Advances in Cryptology …, 2015 - Springer
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …

Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications

L Grassi, Y Hao, C Rechberger, M Schofnegger… - Annual International …, 2023 - Springer
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …

Design of symmetric-key primitives for advanced cryptographic protocols

A Aly, T Ashur, E Ben-Sasson, S Dhooghe… - IACR Transactions on …, 2020 - tosc.iacr.org
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …

From keys to databases—real-world applications of secure multi-party computation

DW Archer, D Bogdanov, Y Lindell, L Kamm… - The Computer …, 2018 - academic.oup.com
We discuss the widely increasing range of applications of a cryptographic technique called
multi-party computation. For many decades, this was perceived to be of purely theoretical …