Delegable zk-SNARKs with proxies
In this paper, we propose the concept of delegable zero knowledge succinct non-interactive
arguments of knowledge (zk-SNARKs). The delegable zk-SNARK is parameterized by (μ,k,k…
arguments of knowledge (zk-SNARKs). The delegable zk-SNARK is parameterized by (μ,k,k…
[PDF][PDF] DFS: Delegation-friendly zkSNARK and private delegation of provers
… scalable private delegation schemes for zkSNARKs by combining distributed computations
and … 23]: the Marlin zkSNARK [22] proved to be more efficiently delegable than other common …
and … 23]: the Marlin zkSNARK [22] proved to be more efficiently delegable than other common …
zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure
… Delegation Issuance authority is delegatable in zk-creds. Authority to issue a credential can
… extract on all adversarially generated messages and proxy them to the ideal functionality. …
… extract on all adversarially generated messages and proxy them to the ideal functionality. …
Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs
M Babel, J Sedlmeir - arXiv preprint arXiv:2301.00823, 2023 - arxiv.org
… anonymous credentials including these lacking features with zk-SNARKs (Section 4). We
also … A convenient proxy for the complexity of the statement with regard to proving effort is the …
also … A convenient proxy for the complexity of the statement with regard to proving effort is the …
Enabling Secure and Scalable GDPR-Compliant Blockchain-based e-KYC with Efficient Redaction
S Fugkeaw, S Sungchai, S Nakprame… - IEEE …, 2025 - ieeexplore.ieee.org
… -latency validation; 2) adaptive proxy re-encryption to support … (CBDCs), integrating delegatable
anonymous credentials (… authentication, our scheme employs zk-SNARKs. A one-time …
anonymous credentials (… authentication, our scheme employs zk-SNARKs. A one-time …
Multi-key homomorphic signatures unforgeable under insider corruption
… technique, we show that strong ZK-SNARKs implies a “poly-… We introduce two extensions,
multi-key delegatable … homomorphic proxy re-authenticators, in which a proxy can …
multi-key delegatable … homomorphic proxy re-authenticators, in which a proxy can …
NuCypher KMS: Decentralized key management system
… For the first version of NuCypher KMS we choose ECIES for which we created a proxy re-…
it to verify the necessary amount was paid using zk-SNARKs [30]. When NuCypher KMS is …
it to verify the necessary amount was paid using zk-SNARKs [30]. When NuCypher KMS is …
[PDF][PDF] Nucypher: A proxy re-encryption network to empower privacy in decentralized systems
… It would also help to hide the exact pricing information from the mining node while still
allowing it to verify the necessary amount was paid using zk-SNARKs [30]. When NuCypher is …
allowing it to verify the necessary amount was paid using zk-SNARKs [30]. When NuCypher is …
A Hitchhiker's Guide to Privacy-Preserving Cryptocurrencies: A Survey on Anonymity, Confidentiality, and Auditability
M Nardelli, F De Sclavis, M Iezzi - arXiv preprint arXiv:2505.21008, 2025 - arxiv.org
… Zk-SNARKs are succinct non-interactive arguments of knowledge. Many zk-SNARK …
Solidus [40] uses banks as proxies; therefore, transactions are not explicitly exchanged …
Solidus [40] uses banks as proxies; therefore, transactions are not explicitly exchanged …
A Systematic Review on Blockchain-Enabled eKYC: Leveraging SSI and DID for Secure and Efficient Identity Verification
… However, zk-SNARKs face certain challenges, such as the O(… Furthermore, pairing
operations in zk-SNARKs demand … The protocols zk-SNARKs have a dependency on a trusted …
operations in zk-SNARKs demand … The protocols zk-SNARKs have a dependency on a trusted …