Proving as fast as computing: succinct arguments with constant prover overhead

N Ron-Zewi, RD Rothblum - Proceedings of the 54th Annual ACM …, 2022 - dl.acm.org
Succinct arguments are proof systems that allow a powerful, but untrusted, prover to
convince a weak verifier that an input x belongs to a language L∈ NP, with communication …

Two Shuffles Make a {RAM}: Improved Constant Overhead Zero Knowledge {RAM}

Y Yang, D Heath - 33rd USENIX Security Symposium (USENIX Security …, 2024 - usenix.org
We optimize Zero Knowledge (ZK) proofs of statements expressed as RAM programs over
arithmetic values. Our arithmetic-circuit-based read/write memory uses only 4 input gates …

AntMan: Interactive zero-knowledge proofs with sublinear communication

C Weng, K Yang, Z Yang, X **e, X Wang - Proceedings of the 2022 ACM …, 2022 - dl.acm.org
Recent works on interactive zero-knowledge (ZK) protocols provide a new paradigm with
high efficiency and scalability. However, these protocols suffer from high communication …

Reef: Fast Succinct {Non-Interactive}{Zero-Knowledge} Regex Proofs

S Angel, E Ioannidis, E Margolin, S Setty… - 33rd USENIX Security …, 2024 - usenix.org
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive
zero-knowledge proofs that a committed document matches or does not match a regular …

The hardness of LPN over any integer ring and field for PCG applications

H Liu, X Wang, K Yang, Y Yu - … International Conference on the Theory and …, 2024 - Springer
Learning parity with noise (LPN) has been widely studied and used in cryptography. It was
recently brought to new prosperity since Boyle et al.(CCS'18), putting LPN to a central role in …

Tight zk cpu: Batched zk branching with cost proportional to evaluated instruction

Y Yang, D Heath, C Hazay, V Kolesnikov… - Proceedings of the …, 2024 - dl.acm.org
We explore Zero-Knowledge Proofs (ZKPs) of statements expressed as programs written in
high-level languages, eg, C or assembly. At the core of executing such programs in ZK is the …

[PDF][PDF] Confidential-PROFITT: confidential PROof of fair training of trees

AS Shamsabadi, SC Wyllie, N Franzese… - The Eleventh …, 2022 - drive.google.com
Post hoc auditing of model fairness suffers from potential drawbacks:(1) auditing may be
highly sensitive to the test samples chosen;(2) the model and/or its training data may need to …

Cheesecloth:{Zero-Knowledge} Proofs of Real World Vulnerabilities

S Cuéllar, B Harris, J Parker, S Pernsteiner… - 32nd USENIX Security …, 2023 - usenix.org
Currently, when a security analyst discovers a vulnerability in critical software system, they
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …

Dora: A Simple Approach to Zero-Knowledge for RAM Programs

A Goel, M Hall-Andersen, G Kaptchuk - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …

{ZKSMT}: A {VM} for Proving {SMT} Theorems in Zero Knowledge

D Luick, JC Kolesar, T Antonopoulos… - 33rd USENIX Security …, 2024 - usenix.org
Verification of program safety is often reducible to proving the unsatisfiability (ie, validity) of a
formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that …