Securing fog computing for internet of things applications: Challenges and solutions
Internet of Things (IoT) allows billions of physical objects to be connected to collect and
exchange data for offering various applications, such as environmental monitoring …
exchange data for offering various applications, such as environmental monitoring …
The security of big data in fog-enabled IoT applications including blockchain: A survey
The proliferation of inter-connected devices in critical industries, such as healthcare and
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
power grid, is changing the perception of what constitutes critical infrastructure. The rising …
Hyperplonk: Plonk with linear-time prover and high-degree custom gates
Plonk is a widely used succinct non-interactive proof system that uses univariate polynomial
commitments. Plonk is quite flexible: it supports circuits with low-degree “custom” gates as …
commitments. Plonk is quite flexible: it supports circuits with low-degree “custom” gates as …
A survey on IoT security: application areas, security threats, and solution architectures
The Internet of Things (IoT) is the next era of communication. Using the IoT, physical objects
can be empowered to create, receive, and exchange data in a seamless manner. Various …
can be empowered to create, receive, and exchange data in a seamless manner. Various …
Marlin: Preprocessing zkSNARKs with universal and updatable SRS
We present a methodology to construct preprocessing zkSNARKs where the structured
reference string (SRS) is universal and updatable. This exploits a novel use of holography …
reference string (SRS) is universal and updatable. This exploits a novel use of holography …
Sonic: Zero-knowledge SNARKs from linear-size universal and updatable structured reference strings
Ever since their introduction, zero-knowledge proofs have become an important tool for
addressing privacy and scalability concerns in a variety of applications. In many systems …
addressing privacy and scalability concerns in a variety of applications. In many systems …
Achieving privacy-preserving and verifiable support vector machine training in the cloud
With the proliferation of machine learning, the cloud server has been employed to collect
massive data and train machine learning models. Several privacy-preserving machine …
massive data and train machine learning models. Several privacy-preserving machine …
Spartan: Efficient and general-purpose zkSNARKs without trusted setup
S Setty - Annual International Cryptology Conference, 2020 - Springer
This paper introduces Spartan, a new family of zero-knowledge succinct non-interactive
arguments of knowledge (zkSNARKs) for the rank-1 constraint satisfiability (R1CS), an NP …
arguments of knowledge (zkSNARKs) for the rank-1 constraint satisfiability (R1CS), an NP …
Doubly-efficient zkSNARKs without trusted setup
We present a zero-knowledge argument for NP with low communication complexity, low
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …
concrete cost for both the prover and the verifier, and no trusted setup, based on standard …
Pianist: Scalable zkrollups via fully distributed zero-knowledge proofs
In the past decade, blockchains have seen various financial and technological innovations,
with cryptocurrencies reaching a market cap of over 1 trillion dollars. However, scalability is …
with cryptocurrencies reaching a market cap of over 1 trillion dollars. However, scalability is …