zkbridge: Trustless cross-chain bridges made practical
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …
1 trillion dollars, major institution investors taking interests, and global impacts on …
Aurora: Transparent succinct arguments for R1CS
E Ben-Sasson, A Chiesa, M Riabzev… - Advances in Cryptology …, 2019 - Springer
We design, implement, and evaluate a zero knowledge succinct non-interactive argument
(SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language …
(SNARG) for Rank-1 Constraint Satisfaction (R1CS), a widely-deployed NP language …
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
S Setty - Annual International Cryptology Conference, 2020 - Springer
This paper introduces Spartan, a new family of zero-knowledge succinct non-interactive
arguments of knowledge (zkSNARKs) for the rank-1 constraint satisfiability (R1CS), an NP …
arguments of knowledge (zkSNARKs) for the rank-1 constraint satisfiability (R1CS), an NP …
Zkcnn: Zero knowledge proofs for convolutional neural network predictions and accuracy
Deep learning techniques with neural networks are developing prominently in recent years
and have been deployed in numerous applications. Despite their great success, in many …
and have been deployed in numerous applications. Despite their great success, in many …
Doubly-efficient zkSNARKs without trusted setup
We present a zero-knowledge argument for NP with low communication complexity, low
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …
Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
We present Libra, the first zero-knowledge proof system that has both optimal prover time
and succinct proof size/verification time. In particular, if C is the size of the circuit being …
and succinct proof size/verification time. In particular, if C is the size of the circuit being …
Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing
C Dong, Y Wang, A Aldweesh, P McCorry… - Proceedings of the …, 2017 - dl.acm.org
Cloud computing has become an irreversible trend. Together comes the pressing need for
verifiability, to assure the client the correctness of computation outsourced to the cloud …
verifiability, to assure the client the correctness of computation outsourced to the cloud …
Safetynets: Verifiable execution of deep neural networks on an untrusted cloud
Inference using deep neural networks is often outsourced to the cloud since it is a
computationally demanding task. However, this raises a fundamental issue of trust. How can …
computationally demanding task. However, this raises a fundamental issue of trust. How can …
Experimenting with collaborative {zk-SNARKs}:{Zero-Knowledge} proofs for distributed secrets
A zk-SNARK is a powerful cryptographic primitive that provides a succinct and efficiently
checkable argument that the prover has a witness to a public NP statement, without …
checkable argument that the prover has a witness to a public NP statement, without …
{DIZK}: A distributed zero knowledge proof system
Recently there has been much academic and industrial interest in practical implementations
of zero knowledge proofs. These techniques allow a party to prove to another party that a …
of zero knowledge proofs. These techniques allow a party to prove to another party that a …