Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Experimenting with zero-knowledge proofs of training
How can a model owner prove they trained their model according to the correct
specification? More importantly, how can they do so while preserving the privacy of the …
specification? More importantly, how can they do so while preserving the privacy of the …
{zkSaaS}:{Zero-Knowledge}{SNARKs} as a Service
A decade of active research has led to practical constructions of zero-knowledge succinct
non-interactive arguments of knowledge (zk-SNARKs) that are now being used in a wide …
non-interactive arguments of knowledge (zk-SNARKs) that are now being used in a wide …
Sublonk: Sublinear prover plonk
We propose SublonK---a new succinct non-interactive argument of knowledge (SNARK).
SublonK is the first SNARK that achieves both a constant proof size and prover runtime that …
SublonK is the first SNARK that achieves both a constant proof size and prover runtime that …
Zksql: Verifiable and efficient query evaluation with zero-knowledge proofs
Individuals and organizations are using databases to store personal information at an
unprecedented rate. This creates a quandary for data providers. They are responsible for …
unprecedented rate. This creates a quandary for data providers. They are responsible for …
{ZKSMT}: A {VM} for Proving {SMT} Theorems in Zero Knowledge
D Luick, JC Kolesar, T Antonopoulos… - 33rd USENIX Security …, 2024 - usenix.org
Verification of program safety is often reducible to proving the unsatisfiability (ie, validity) of a
formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that …
formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that …
How to prove statements obliviously?
Cryptographic applications often require proving statements about hidden secrets satisfying
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …
Cheesecloth:{Zero-Knowledge} proofs of real world vulnerabilities
Currently, when a security analyst discovers a vulnerability in critical software system, they
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …
The Sting Framework: Proving the Existence of Superclass Adversaries
M Kelkar, Y Li, N Jean-Louis, CO Pérez… - Cryptology ePrint …, 2024 - eprint.iacr.org
We introduce superclass accountability, a new notion of accountability for security protocols.
Classical notions of accountability typically aim to identify specific adversarial players whose …
Classical notions of accountability typically aim to identify specific adversarial players whose …
[PDF][PDF] Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs.
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeo: supporting fewer instructions results in …
plagued by a processor expressiveness tradeo: supporting fewer instructions results in …
Dora: A simple approach to zero-knowledge for RAM programs
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …