Uneingeschränkter Zugang

ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy

 und   
21. März 2025

Zitieren
COVER HERUNTERLADEN

Berentsen, A., L. Jeremias, N. Remo. A Walk-through of a Simple ZK-STARK Proof. 21.12.2022. https://ssrn.com/abstract=4308637 or http://dx.doi.org/10.2139/ssrn.4308637 Search in Google Scholar

Ben-Sasson, E., et al. Scalable, Transparent, and Post-Quantum Secure Computational Integrity. – Cryptology ePrint Archive, 2018. Search in Google Scholar

Ben-Sasson, E., I. Bentov, Y. Horesh, M. Riabzev. Scalable Zero Knowledge with No Trusted Setup. – In: A. Boldyreva, D. Micciancio, Eds. Advances in Cryptology – CRYPTO 2019. CRYPTO 2019. – Lecture Notes in Computer Science, Vol. 11694, 2019, Springer, Cham. DOI: 10.1007/978-3-030-26954-8_23. Search in Google Scholar

Liu, B., S. Xie, Y. Yang, et al. Privacy-Preserving Divisible Double Auction with a Hybridized TEE-Blockchain System. – Cybersecurity, Vol. 4, 2021, No 37. DOI: 10.1186/s42400-021-00100-x. Search in Google Scholar

Yan, Z., Y. Deng, Y. Sun. Concurrent Non-Malleable Zero-Knowledge and Simultaneous Resettable Non-Malleable Zero-Knowledge in Constant Rounds. – Cybersecur. Vol. 1, 2018, No 12. DOI: 10.1186/s42400-018-0014-7. Search in Google Scholar

Jayabalan, J., N. Jeyanthi. A Review of State-of-Art Blockchain Schemes for Electronic Health Records Management. – Cybernetics and Information Technologies, Vol. 24, 2024, No 1, pp. 35-63. Search in Google Scholar

Sumathi, M., S. Raja, V. Natarajan, R. Murugesan. A Decentralized Medical Network for Maintaining Patient Records Using Blockchain Technology. – Cybernetics and Information Technologies, Vol. 22, 2022, No 4, pp. 129-141. Search in Google Scholar

Gong, Y., Y. Jin, Y. Li, Z. Liu, Z. Zhu. Analysis and Comparison of the Main Zero- Knowledge Proof Scheme. – 2022 International Conference on Big Data, Information and Computer Network (BDICN’22), Sanya, China, 2022, pp. 366-372. DOI: 10.1109/BDICN55575.2022.00074. Search in Google Scholar

Frimpong, S., A. M. Han, E. K. Boahen, R. N. A. Sosu, I. Hanson, O. Larbi-Siaw, I. B. Senkyire. RecGuard: An Efficient Privacy Preservation Blockchain-Based System for Online Social Network Users. – Blockchain: Research and Applications, Vol. 4, 2023, Issue 1, 100111. ISSN: 2096-7209. DOI: 10.1016/j.bcra.2022.100111. Search in Google Scholar

Chi, P. -W., Y. -H. Lu, A. Guan. A Privacy-Preserving Zero-Knowledge Proof for Blockchain. – In: IEEE Access, Vol. 11, 2023, pp. 85108-85117. DOI: 10.1109/ACCESS.2023.3302691. Search in Google Scholar

Zhou, Lu, A. Diro, A. Saini, S. Kaisar, P. C. Hiep. Leveraging Zero-Knowledge Proofs for Blockchain-Based Identity Sharing: A Survey of Advancements, Challenges, and Opportunities. – Journal of Information Security and Applications, Vol. 80, 2024, 103678. ISSN 2214-2126, DOI: 10.1016/j.jisa.2023.103678. Search in Google Scholar

Feng, T., P. Yang, C. Liu, J. Fang, R. Ma. Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof. – Wireless Communications and Mobile Computing, 2022, 1040662, 2022, 11 p. DOI: 10.1155/2022/1040662. Search in Google Scholar

Radeva, I., I. Popchev. Blockchain-Enabled Supply-Chain in Crop Production Framework. – Cybernetics and Information Technologies, Vol. 22, 2022, No 1, pp. 151-170. Search in Google Scholar

Barbara, M. A. Proof of All: Verifiable Computation in a Nutshell. – arXiv Preprint arXiv:1908.02327, 2019, 14. Search in Google Scholar

Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. – Decentralized Business Review, 2008, 21260. Search in Google Scholar

An article on ‘Modular Multiplicative Inverse’. https://www.extendedeuclideanalgorithm.com/multiplicative_inverse.php#owmultinv Search in Google Scholar

M. Abramowitz, Stegun, Irene Ann, Eds. (1983) June 1964. Chapter 25, eqn 25.2.3. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. – Applied Mathematics Series, Vol. 55 (9th reprint with additional corrections of 10th original printing with corrections (December 1972), First Ed.). Washington DC.; New York: United States Department of Commerce, National Bureau of Standards; Dover Publications. 878 p. ISBN: 978-0-486-61272-0. LCCN: 64-60036. MR: 0167642. LCCN: 65-12253. Search in Google Scholar

Kate, A., G. M. Zaverucha, I. Goldberg. Constant-Size Commitments to Polynomials and Their Applications. – In: M. Abe, Ed. Advances in Cryptology – ASIACRYPT 2010. ASIACRYPT 2010. Lecture Notes in Computer Science, Vol. 6477. 2010. Berlin, Heidelberg, Springer. DOI: 10.1007/978-3-642-17373-8_11. Search in Google Scholar

Becker, G. Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis (PDF). Ruhr-Universität Bochum. 18. 7. 2008, p. 16. Archived from the original (PDF) on 22.12.2014. Retrieved 20.11.2013. Search in Google Scholar

Merkle Tree. Available online on Wikipedia. https://en.wikipedia.org/wiki/Merkle_tree Search in Google Scholar

Ben-Sasson, E., I. Bentov, Y. Horesh, M. Riabzev. Licensed under Creative Commons License CC-BY 45th International Colloquium on Automata, Languages, and Programming (ICALP’2018), 2018. – In: I. Chatzigiannakis, C. Kaklamanis, D. Marx, D. Sannella, Eds. Article No 14, pp. 1-14. Search in Google Scholar

Ben-Sasson, E., I. Bentov, Y. Horesh, M. Riabzev. Fast Reed-Solomon Interactive Oracle Proofs of Proximity. Electron. Colloquium Comput. Complex., TR17. 2017. Search in Google Scholar

Ben-Sasson, E. StarkWare – Productizing zk-STARKs to Provide Blockchain Scalability and Privacy. https://epicenter.tv/episodes/310/ Search in Google Scholar

Ben-Sasson, E. Scaling Computation on Blockchains with ZK-STARK Invited Talk by Eli Ben-Sasson. https://www.youtube.com/watch?v=8vduDYBu8uQ&list=PLeeS-3Ml-rpoVMNQkUrFDSfaTuUMxVtjy Search in Google Scholar

Fernández-Caramès, T. M., P. Fraga-Lamas. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks. – In: IEEE Access, Vol. 8, 2020, pp. 21091-21116. DOI: 10.1109/ACCESS.2020.2968985. Search in Google Scholar

Sprache:
Englisch
Zeitrahmen der Veröffentlichung:
4 Hefte pro Jahr
Fachgebiete der Zeitschrift:
Informatik, Informationstechnik