Zeestar: Private smart contracts by homomorphic encryption and zero-knowledge proofs
Data privacy is a key concern for smart contracts handling sensitive data. The existing work
zkay addresses this concern by allowing developers without cryptographic expertise to …
zkay addresses this concern by allowing developers without cryptographic expertise to …
[HTML][HTML] SoK: Privacy-preserving smart contract
The privacy concern in smart contract applications continues to grow, leading to the
proposal of various schemes aimed at develo** comprehensive and universally …
proposal of various schemes aimed at develo** comprehensive and universally …
[HTML][HTML] Tethering Layer 2 solutions to the blockchain: A survey on proving schemes
A blockchain is a data structure consisting of a list of blocks containing transactions and
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …
maintained by a network of nodes in a decentralized manner. In permissionless blockchains …
{VeriZexe}: Decentralized Private Computation with Universal Setup
Traditional blockchain systems execute program state transitions on-chain, requiring each
network node participating in state-machine replication to re-compute every step of the …
network node participating in state-machine replication to re-compute every step of the …
Eagle: Efficient privacy preserving smart contracts
Abstract The proliferation of Decentralised Finance (DeFi) and Decentralised Autonomous
Organisations (DAO), which in current form are exposed to front-running of token …
Organisations (DAO), which in current form are exposed to front-running of token …
smartfhe: Privacy-preserving smart contracts from fully homomorphic encryption
R Solomon, R Weber… - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
Despite the great potential and flexibility of smart contract-enabled blockchains, building
privacy-preserving applications using these platforms remains an open question. Existing …
privacy-preserving applications using these platforms remains an open question. Existing …
Verifiable computing applications in blockchain
From weak clients outsourcing computational tasks to more powerful machines, to
distributed blockchain nodes needing to agree on the state of the ledger in the presence of …
distributed blockchain nodes needing to agree on the state of the ledger in the presence of …
Zapper: Smart contracts with data and identity privacy
Privacy concerns prevent the adoption of smart contracts in sensitive domains incompatible
with the public nature of shared ledgers. We present Zapper, a privacy-focused smart …
with the public nature of shared ledgers. We present Zapper, a privacy-focused smart …
Unstoppable wallets: Chain-assisted threshold ECDSA and its applications
The security and usability of cryptocurrencies and other blockchain-based applications
depend on the secure management of cryptographic keys. However, current approaches for …
depend on the secure management of cryptographic keys. However, current approaches for …
Anonymous sealed-bid auction on ethereum
In a competitive market, online auction systems enable optimal trading of digital products
and services. Bidders can participate in existing blockchain-based auctions while protecting …
and services. Bidders can participate in existing blockchain-based auctions while protecting …