zkbridge: Trustless cross-chain bridges made practical

T **e, J Zhang, Z Cheng, F Zhang, Y Zhang… - Proceedings of the …, 2022 - dl.acm.org
Blockchains have seen growing traction with cryptocurrencies reaching a market cap of over
1 trillion dollars, major institution investors taking interests, and global impacts on …

[HTML][HTML] Tethering Layer 2 solutions to the blockchain: A survey on proving schemes

D Tortola, A Lisi, P Mori, L Ricci - Computer Communications, 2024 - Elsevier
A blockchain is a data structure consisting of a list of blocks containing transactions and
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …

Proofs for inner pairing products and applications

B Bünz, M Maller, P Mishra, N Tyagi… - Advances in Cryptology …, 2021 - Springer
We present a generalized inner product argument and demonstrate its applications to
pairing-based languages. We apply our generalized argument to prove that an inner pairing …

Sok: Blockchain light clients

P Chatzigiannis, F Baldimtsi, K Chalkias - International Conference on …, 2022 - Springer
Blockchain systems, as append-only ledgers, are typically associated with linearly growing
participation costs. Therefore, for a blockchain client to interact with the system (query or …

Reckle trees: Updatable merkle batch proofs with applications

C Papamanthou, S Srinivasan, N Gailly… - Proceedings of the …, 2024 - dl.acm.org
We propose Reckle trees, a new vector commitment based on succinct RECursive
arguments and MerKLE trees. Reckle trees' distinguishing feature is their support for …

{BalanceProofs}: Maintainable vector commitments with fast aggregation

W Wang, A Ulichney, C Papamanthou - 32nd USENIX Security …, 2023 - usenix.org
We present BalanceProofs, the first vector commitment that is maintainable (ie, supporting
sublinear updates) while also enjoying fast proof aggregation and verification. The basic …

LVMT: An efficient authenticated storage for blockchain

C Li, SM Beillahi, G Yang, M Wu, W Xu… - ACM Transactions on …, 2024 - dl.acm.org
Authenticated storage access is the performance bottleneck of a blockchain, because each
access can be amplified to potentially O (log n) disk I/O operations in the standard Merkle …

Linear-map vector commitments and their practical applications

M Campanelli, A Nitulescu, C Ràfols… - … Conference on the …, 2022 - Springer
Vector commitments (VC) are a cryptographic primitive that allows one to commit to a vector
and then “open” some of its positions efficiently. Vector commitments are increasingly …

Libras: a fair, secure, verifiable and scalable outsourcing computation scheme based on blockchain

L Huo, L Wu, Z Zhang, C Li, D He… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Existing multitask outsourcing computations struggle to guarantee the fairness for
participants and the correctness of the computation results. Some solutions use blockchain …

How to prove statements obliviously?

S Garg, A Goel, M Wang - Annual International Cryptology Conference, 2024 - Springer
Cryptographic applications often require proving statements about hidden secrets satisfying
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …