Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Selected Papers From ESORICS 2021
Guest editors: Elisa Bertino, Haya Shulman and Michael Waidner
Article type: Research Article
Authors: Zhou, Zheleia | Zhang, Bingshenga; * | Chen, Yuana | Li, Jiaqia | Zhou, Yajina | Lu, Yibiaoa | Ren, Kuia | Thai, Phucb | Zhou, Hong-Shengb
Affiliations: [a] School of Computer Science and Technology, Zhejiang University, Zhejiang, China | [b] Department of Computer Science, Virginia Commonwealth University, VA, USA
Correspondence: [*] Corresponding author. E-mail: bingsheng@zju.edu.cn.
Note: [1] A preliminary version (In European Symposium on Research in Computer Security (2021) 430–451 Springer) of this paper was presented at the 26th European Symposium on Research in Computer Security (ESORICS) 2021.
Abstract: Non-interactive zero-knowledge proof or argument (NIZK) systems are widely used in many security sensitive applications to enhance computation integrity, privacy and scalability. In such systems, a prover wants to convince one or more verifiers that the result of a public function is correctly computed without revealing the (potential) private input, such as the witness. In this work, we introduce a new notion, called scriptable SNARK, where the prover and verifier(s) can specify the function (or language instance) to be proven via a script. We formalize this notion in UC framework and provide a generic trusted hardware based solution. We then instantiate our solution in both SGX and Trustzone with Lua script engine. The system can be easily used by typical programmers without any cryptographic background. The benchmark result shows that our solution is better than all the known SNARK proof systems w.r.t. prover’s running time (1000 times faster), verifier’s running time, and the proof size. In addition, we also give a lightweight scriptable SNARK protocol for hardware with limited state, e.g., Θ(λ) bits. Finally, we show how the proposed scriptable SNARK can be readily deployed to solve many well-known problems in the blockchain context, e.g. verifier’s dilemma, fast joining for new players, etc.
Keywords: Scriptable SNARK, universal composition, trusted hardware model
DOI: 10.3233/JCS-210167
Journal: Journal of Computer Security, vol. 30, no. 6, pp. 757-793, 2022
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
sales@iospress.com
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
info@iospress.nl
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office info@iospress.nl
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
china@iospress.cn
For editorial issues, like the status of your submitted paper or proposals, write to editorial@iospress.nl
如果您在出版方面需要帮助或有任何建, 件至: editorial@iospress.nl