Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

S Ullah, J Zheng, N Din, MT Hussain, F Ullah… - Computer Science …, 2023 - Elsevier
Elliptic Curve (EC) is the most recent and advanced technique of Elliptic Curve
Cryptography (ECC). EC is often used to improve the security of open communication …

State of the art of zero-knowledge proofs in blockchain

D Čapko, S Vukmirović, N Nedić - 2022 30th …, 2022 - ieeexplore.ieee.org
Blockchain technology promises a decentralized ecosystem for building apps with
decentralized ownership and high security level. One of the most adopted blockchain …

Forward and backward private searchable encryption from constrained cryptographic primitives

R Bost, B Minaud, O Ohrimenko - … of the 2017 ACM SIGSAC Conference …, 2017 - dl.acm.org
Using dynamic Searchable Symmetric Encryption, a user with limited storage resources can
securely outsource a database to an untrusted server, in such a way that the database can …

Recursive proof composition without a trusted setup

S Bowe, J Grigg, D Hopwood - Cryptology ePrint Archive, 2019 - eprint.iacr.org
Non-interactive arguments of knowledge are powerful cryptographic tools that can be used
to demonstrate the faithful execution of arbitrary computations with publicly verifiable proofs …

Zokrates-scalable privacy-preserving off-chain computations

J Eberhardt, S Tai - … Conference on Internet of Things (iThings) …, 2018 - ieeexplore.ieee.org
Scalability and privacy are two challenges for today's blockchain systems. Processing
transactions at every node in the system limits the system's ability to scale. Furthermore, the …

[PDF][PDF] Zcash protocol specification

D Hopwood, S Bowe, T Hornby, N Wilcox - GitHub: San Francisco, CA …, 2016 - caladex.io
Zcash is an implementation of the Decentralized Anonymous Payment scheme Zerocash,
with security fixes and improvements to performance and functionality. It bridges the existing …

Succinct {Non-Interactive} zero knowledge for a von neumann architecture

E Ben-Sasson, A Chiesa, E Tromer… - 23rd USENIX Security …, 2014 - usenix.org
We build a system that provides succinct non-interactive zero-knowledge proofs (zk-
SNARKs) for program executions on a von Neumann RISC architecture. The system has two …

Pinocchio: Nearly practical verifiable computation

B Parno, J Howell, C Gentry, M Raykova - Communications of the ACM, 2016 - dl.acm.org
To instill greater confidence in computations outsourced to the cloud, clients should be able
to verify the correctness of the results returned. To this end, we introduce Pinocchio, a built …

MIStore: a blockchain-based medical insurance storage system

L Zhou, L Wang, Y Sun - Journal of medical systems, 2018 - Springer
Currently, blockchain technology, which is decentralized and may provide tamper-resistance
to recorded data, is experiencing exponential growth in industry and research. In this paper …

HomeChain: A blockchain-based secure mutual authentication system for smart homes

C Lin, D He, N Kumar, X Huang… - IEEE Internet of …, 2019 - ieeexplore.ieee.org
Increasingly, governments around the world, particularly in technologically advanced
countries, are exploring or implementing smart homes, or the related smart facilities for the …