Smart meter data privacy: A survey
Automated and smart meters are devices that are able to monitor the energy consumption of
electricity consumers in near real-time. They are considered key technological enablers of …
electricity consumers in near real-time. They are considered key technological enablers of …
Bulletproofs: Short proofs for confidential transactions and more
We propose Bulletproofs, a new non-interactive zero-knowledge proof protocol with very
short proofs and without a trusted setup; the proof size is only logarithmic in the witness size …
short proofs and without a trusted setup; the proof size is only logarithmic in the witness size …
SNARKs for C: Verifying program executions succinctly and in zero knowledge
An argument system for NP is a proof system that allows efficient verification of NP
statements, given proofs produced by an untrusted yet computationally-bounded prover …
statements, given proofs produced by an untrusted yet computationally-bounded prover …
{ACORN}: input validation for secure aggregation
Secure aggregation enables a server to learn the sum of client-held vectors in a privacy-
preserving way, and has been applied to distributed statistical analysis and machine …
preserving way, and has been applied to distributed statistical analysis and machine …
Privacy-preserving smart metering
Smart grid proposals threaten user privacy by potentially disclosing fine-grained
consumption data to utility providers, primarily for time-of-use billing, but also for profiling …
consumption data to utility providers, primarily for time-of-use billing, but also for profiling …
Efficient protocols for set membership and range proofs
We consider the following problem: Given a commitment to a value σ, prove in zero-
knowledge that σ belongs to some discrete set Φ. The set Φ can perhaps be a list of cities or …
knowledge that σ belongs to some discrete set Φ. The set Φ can perhaps be a list of cities or …
A survey on zero knowledge range proofs and applications
E Morais, T Koens, C Van Wijk, A Koren - SN Applied Sciences, 2019 - Springer
In last years, there has been an increasing effort to leverage distributed ledger technology
(DLT), including blockchain. One of the main topics of interest, given its importance, is the …
(DLT), including blockchain. One of the main topics of interest, given its importance, is the …
Decentralized anonymous credentials
Anonymous credentials provide a powerful tool for making assertions about identity while
maintaining privacy. However, a limitation of today's anonymous credential systems is the …
maintaining privacy. However, a limitation of today's anonymous credential systems is the …
Efficient range proofs with transparent setup from bounded integer commitments
We introduce a new approach for constructing range proofs. Our approach is modular, and
leads to highly competitive range proofs under standard assumption, using less …
leads to highly competitive range proofs under standard assumption, using less …
Arithmetic sketching
This paper introduces arithmetic sketching, an abstraction of a primitive that several previous
works use to achieve lightweight, low-communication zero-knowledge verification of secret …
works use to achieve lightweight, low-communication zero-knowledge verification of secret …