Smart meter data privacy: A survey

MR Asghar, G Dán, D Miorandi… - … Surveys & Tutorials, 2017 - ieeexplore.ieee.org
Automated and smart meters are devices that are able to monitor the energy consumption of
electricity consumers in near real-time. They are considered key technological enablers of …

Bulletproofs: Short proofs for confidential transactions and more

B Bünz, J Bootle, D Boneh, A Poelstra… - … IEEE symposium on …, 2018 - ieeexplore.ieee.org
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very
short proofs and without a trusted setup; the proof size is only logarithmic in the witness size …

SNARKs for C: Verifying program executions succinctly and in zero knowledge

E Ben-Sasson, A Chiesa, D Genkin, E Tromer… - Annual cryptology …, 2013 - Springer
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …

{ACORN}: input validation for secure aggregation

J Bell, A Gascón, T Lepoint, B Li, S Meiklejohn… - 32nd USENIX Security …, 2023 - usenix.org
Secure aggregation enables a server to learn the sum of client-held vectors in a privacy-
preserving way, and has been applied to distributed statistical analysis and machine …

Privacy-preserving smart metering

A Rial, G Danezis - Proceedings of the 10th annual ACM workshop on …, 2011 - dl.acm.org
Smart grid proposals threaten user privacy by potentially disclosing fine-grained
consumption data to utility providers, primarily for time-of-use billing, but also for profiling …

Efficient protocols for set membership and range proofs

J Camenisch, R Chaabouni, A Shelat - … on the Theory and Application of …, 2008 - Springer
We consider the following problem: Given a commitment to a value σ, prove in zero-
knowledge that σ belongs to some discrete set Φ. The set Φ can perhaps be a list of cities or …

A survey on zero knowledge range proofs and applications

E Morais, T Koens, C Van Wijk, A Koren - SN Applied Sciences, 2019 - Springer
In last years, there has been an increasing effort to leverage distributed ledger technology
(DLT), including blockchain. One of the main topics of interest, given its importance, is the …

Decentralized anonymous credentials

C Garman, M Green, I Miers - Cryptology ePrint Archive, 2013 - eprint.iacr.org
Anonymous credentials provide a powerful tool for making assertions about identity while
maintaining privacy. However, a limitation of today's anonymous credential systems is the …

Efficient range proofs with transparent setup from bounded integer commitments

G Couteau, M Klooß, H Lin, M Reichle - … on the Theory and Applications of …, 2021 - Springer
We introduce a new approach for constructing range proofs. Our approach is modular, and
leads to highly competitive range proofs under standard assumption, using less …

Arithmetic sketching

D Boneh, E Boyle, H Corrigan-Gibbs, N Gilboa… - Annual International …, 2023 - Springer
This paper introduces arithmetic sketching, an abstraction of a primitive that several previous
works use to achieve lightweight, low-communication zero-knowledge verification of secret …