zkbridge: Trustless cross-chain bridges made practical
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …
1 trillion dollars, major institution investors taking interests, and global impacts on …
Verifiable delay functions
We study the problem of building a verifiable delay function (VDF). A VDF VDF requires a
specified number of sequential steps to evaluate, yet produces a unique output that can be …
specified number of sequential steps to evaluate, yet produces a unique output that can be …
Poseidon: A new hash function for {Zero-Knowledge} proof systems
The area of practical computational integrity proof systems, like SNARKs, STARKs,
Bulletproofs, is seeing a very dynamic development with several constructions having …
Bulletproofs, is seeing a very dynamic development with several constructions having …
[PDF][PDF] Zcash protocol specification
D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - zeccoin.net
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …
with security fixes and improvements to performance and functionality. It bridges the existing …
Post-quantum zero-knowledge and signatures from symmetric-key primitives
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …
security entirely from the security of symmetric-key primitives, believed to be quantum …
Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability
We present CanDID, a platform for practical, user-friendly realization of decentralized
identity, the idea of empowering end users with management of their own credentials. While …
identity, the idea of empowering end users with management of their own credentials. While …
Ciphers for MPC and FHE
Designing an efficient cipher was always a delicate balance between linear and non-linear
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
operations. This goes back to the design of DES, and in fact all the way back to the seminal …
Horst Meets Fluid-SPN: Griffin for Zero-Knowledge Applications
Zero-knowledge (ZK) applications form a large group of use cases in modern cryptography,
and recently gained in popularity due to novel proof systems. For many of these …
and recently gained in popularity due to novel proof systems. For many of these …
Design of symmetric-key primitives for advanced cryptographic protocols
While traditional symmetric algorithms like AES and SHA-3 are optimized for efficient
hardware and software implementations, a range of emerging applications using advanced …
hardware and software implementations, a range of emerging applications using advanced …
From keys to databases—real-world applications of secure multi-party computation
We discuss the widely increasing range of applications of a cryptographic technique called
multi-party computation. For many decades, this was perceived to be of purely theoretical …
multi-party computation. For many decades, this was perceived to be of purely theoretical …