Experimenting with zero-knowledge proofs of training

S Garg, A Goel, S Jha, S Mahloujifar… - Proceedings of the …, 2023 - dl.acm.org
How can a model owner prove they trained their model according to the correct
specification? More importantly, how can they do so while preserving the privacy of the …

{zkSaaS}:{Zero-Knowledge}{SNARKs} as a Service

S Garg, A Goel, A Jain, GV Policharla… - 32nd USENIX Security …, 2023 - usenix.org
A decade of active research has led to practical constructions of zero-knowledge succinct
non-interactive arguments of knowledge (zk-SNARKs) that are now being used in a wide …

Sublonk: Sublinear prover plonk

AR Choudhuri, S Garg, A Goel, S Sekar… - … on Privacy Enhancing …, 2024 - petsymposium.org
We propose SublonK---a new succinct non-interactive argument of knowledge (SNARK).
SublonK is the first SNARK that achieves both a constant proof size and prover runtime that …

Zksql: Verifiable and efficient query evaluation with zero-knowledge proofs

X Li, C Weng, Y Xu, X Wang, J Rogers - Proceedings of the VLDB …, 2023 - par.nsf.gov
Individuals and organizations are using databases to store personal information at an
unprecedented rate. This creates a quandary for data providers. They are responsible for …

{ZKSMT}: A {VM} for Proving {SMT} Theorems in Zero Knowledge

D Luick, JC Kolesar, T Antonopoulos… - 33rd USENIX Security …, 2024 - usenix.org
Verification of program safety is often reducible to proving the unsatisfiability (ie, validity) of a
formula in Satisfiability Modulo Theories (SMT): Boolean logic combined with theories that …

How to prove statements obliviously?

S Garg, A Goel, M Wang - Annual International Cryptology Conference, 2024 - Springer
Cryptographic applications often require proving statements about hidden secrets satisfying
certain circuit relations. Moreover, these proofs must often be generated obliviously, ie …

Cheesecloth:{Zero-Knowledge} proofs of real world vulnerabilities

S Cuéllar, B Harris, J Parker, S Pernsteiner… - 32nd USENIX Security …, 2023 - usenix.org
Currently, when a security analyst discovers a vulnerability in critical software system, they
must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could …

The Sting Framework: Proving the Existence of Superclass Adversaries

M Kelkar, Y Li, N Jean-Louis, CO Pérez… - Cryptology ePrint …, 2024 - eprint.iacr.org
We introduce superclass accountability, a new notion of accountability for security protocols.
Classical notions of accountability typically aim to identify specific adversarial players whose …

[PDF][PDF] Dora: Processor Expressiveness is (Nearly) Free in Zero-Knowledge for RAM Programs.

A Goel, M Hall-Andersen, G Kaptchuk - IACR Cryptol. ePrint Arch., 2023 - iacr.steepath.eu
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeo: supporting fewer instructions results in …

Dora: A simple approach to zero-knowledge for RAM programs

A Goel, M Hall-Andersen, G Kaptchuk - Proceedings of the 2024 on ACM …, 2024 - dl.acm.org
Existing protocols for proving the correct execution of a RAM program in zero-knowledge are
plagued by a processor expressiveness tradeoff: supporting fewer instructions results in …