Author:
Unni Pranav,Banerjee Saumya,Bouzefrane Samia
Publisher
Springer Nature Switzerland
Reference10 articles.
1. Bitansky, N., et al.: The hunting of the SNARK. J. Cryptol. 30(4), 989–1066 (2017)
2. Bowe, S., Chiesa, A., Green, M., Miers, I., Mishra, P., Wu, H.: ZEXE: Enabling decentralized private computation. In 2020 IEEE Symposium on Security and Privacy, pp. 947–964. IEEE Computer Society Press, May 2020
3. Ozdemir, A., Boneh, D.: Experimenting with collaborative zk-SNARKs: Zero-Knowledge proofs for distributed secrets. In: 31st USENIX Security Symposium (USENIX Security 22), pp. 4291–4308, Boston, MA, August 2022. USENIX Association
4. Green, M., Hall-Andersen, M., Hennenfent, E., Kaptchuk, G., Perez, B., Van Laer, G.: Efficient proofs of software exploitability for real-world processors. Proc. Priv. Enhancing Technol. 2023(1), 627–640 (2023)
5. Salleras, X., Daza, V.: ZPiE: Zero-knowledge Proofs in Embedded systems. Mathematics 9(20), 2569 (2021). https://doi.org/10.3390/math9202569