Proving as fast as computing: succinct arguments with constant prover overhead
Succinct arguments are proof systems that allow a powerful, but untrusted, prover to
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …
Two Shuffles Make a {RAM}: Improved Constant Overhead Zero Knowledge {RAM}
We optimize Zero Knowledge (ZK) proofs of statements expressed as RAM programs over
arithmetic values. Our arithmetic-circuit-based read/write memory uses only 4 input gates …
arithmetic values. Our arithmetic-circuit-based read/write memory uses only 4 input gates …
AntMan: Interactive zero-knowledge proofs with sublinear communication
Recent works on interactive zero-knowledge (ZK) protocols provide a new paradigm with
high efficiency and scalability. However, these protocols suffer from high communication …
high efficiency and scalability. However, these protocols suffer from high communication …
Reef: Fast Succinct {Non-Interactive}{Zero-Knowledge} Regex Proofs
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive
zero-knowledge proofs that a committed document matches or does not match a regular …
zero-knowledge proofs that a committed document matches or does not match a regular …
The hardness of LPN over any integer ring and field for PCG applications
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …
Tight zk cpu: Batched zk branching with cost proportional to evaluated instruction
We explore Zero-Knowledge Proofs (ZKPs) of statements expressed as programs written in
high-level languages, eg, C or assembly. At the core of executing such programs in ZK is the …
high-level languages, eg, C or assembly. At the core of executing such programs in ZK is the …
[PDF][PDF] Confidential-PROFITT: confidential PROof of fair training of trees
Post hoc auditing of model fairness suffers from potential drawbacks:(1) auditing may be
highly sensitive to the test samples chosen;(2) the model and/or its training data may need to …
highly sensitive to the test samples chosen;(2) the model and/or its training data may need to …
Cheesecloth:{Zero-Knowledge} Proofs of Real World Vulnerabilities
Currently, when a security analyst discovers a vulnerability in critical software system, they
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …
Dora: A Simple Approach to Zero-Knowledge for RAM Programs
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …
{ZKSMT}: A {VM} for Proving {SMT} Theorems in Zero Knowledge
D Luick, JC Kolesar, T Antonopoulos… - 33rd USENIX Security …, 2024 - usenix.org
Verification of program safety is often reducible to proving the unsatisfiability (ie, validity) of a
formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that …
formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that …