Enigma: Decentralized computation platform with guaranteed privacy

G Zyskind, O Nathan, A Pentland - arXiv preprint arXiv:1506.03471, 2015 - direct.mit.edu
ABSTRACT a peer-to-peer network enables different parties to jointly store and run
computations on data while keeping the data completely private. Enigma's computational …

Experimenting with collaborative {zk-SNARKs}:{Zero-Knowledge} proofs for distributed secrets

A Ozdemir, D Boneh - … USENIX Security Symposium (USENIX Security 22 …, 2022 - usenix.org
A zk-SNARK is a powerful cryptographic primitive that provides a succinct and efficiently
checkable argument that the prover has a witness to a public NP statement, without …

SCRAPE: Scalable randomness attested by public entities

I Cascudo, B David - … Conference on Applied Cryptography and Network …, 2017 - Springer
Uniform randomness beacons whose output can be publicly attested to be unbiased are
required in several cryptographic protocols. A common approach to building such beacons …

Supporting program comprehension with source code summarization

S Haiduc, J Aponte, A Marcus - Proceedings of the 32nd ACM/IEEE …, 2010 - dl.acm.org
One of the main challenges faced by today's developers is keeping up with the staggering
amount of source code that needs to be read and understood. In order to help developers …

Efficient public verification of data integrity for cloud storage systems from indistinguishability obfuscation

Y Zhang, C Xu, X Liang, H Li, Y Mu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cloud storage services allow users to outsource their data to cloud servers to save local
data storage costs. However, unlike using local storage devices, users do not physically …

Sok: Verifiability notions for e-voting protocols

V Cortier, D Galindo, R Küsters, J Müller… - … IEEE Symposium on …, 2016 - ieeexplore.ieee.org
There have been intensive research efforts in the last two decades or so to design and
deploy electronic voting (e-voting) protocols/systems which allow voters and/or external …

[HTML][HTML] SoK: Privacy-preserving smart contract

H Qi, M Xu, D Yu, X Cheng - High-Confidence Computing, 2024 - Elsevier
The privacy concern in smart contract applications continues to grow, leading to the
proposal of various schemes aimed at developing comprehensive and universally …

Off-chaining models and approaches to off-chain computations

J Eberhardt, J Heiss - Proceedings of the 2nd Workshop on Scalable …, 2018 - dl.acm.org
Off-chaining has been suggested to enhance scalablity and privacy of blockchains,
especially in public networks. However, a systematic classification is missing. In this paper …

ALBATROSS: publicly attestable batched randomness based on secret sharing

I Cascudo, B David - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
In this paper we present ALBATROSS, a family of multiparty randomness generation
protocols with guaranteed output delivery and public verification that allows to trade off …

Silph: A framework for scalable and accurate generation of hybrid MPC protocols

E Chen, J Zhu, A Ozdemir, RS Wahby… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Many applications in finance and healthcare need access to data from multiple
organizations. While these organizations can benefit from computing on their joint datasets …