Delegable zk-SNARKs with proxies

J Sha, S Liu - Frontiers of Computer Science, 2024 - Springer
In this paper, we propose the concept of delegable zero knowledge succinct non-interactive
arguments of knowledge (zk-SNARKs). The delegable zk-SNARK is parameterized by (μ,k,k…

[PDF][PDF] DFS: Delegation-friendly zkSNARK and private delegation of provers

Y Hu, P Mishra, X Wang, J Xie, K Yang, Y Yu… - Cryptology ePrint …, 2025 - usenix.org
… scalable private delegation schemes for zkSNARKs by combining distributed computations
and … 23]: the Marlin zkSNARK [22] proved to be more efficiently delegable than other common …

zk-creds: Flexible anonymous credentials from zksnarks and existing identity infrastructure

M Rosenberg, J White, C Garman… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
… Delegation Issuance authority is delegatable in zk-creds. Authority to issue a credential can
… extract on all adversarially generated messages and proxy them to the ideal functionality. …

Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs

M Babel, J Sedlmeir - arXiv preprint arXiv:2301.00823, 2023 - arxiv.org
… anonymous credentials including these lacking features with zk-SNARKs (Section 4). We
also … A convenient proxy for the complexity of the statement with regard to proving effort is the …

Enabling Secure and Scalable GDPR-Compliant Blockchain-based e-KYC with Efficient Redaction

S Fugkeaw, S Sungchai, S Nakprame… - IEEE …, 2025 - ieeexplore.ieee.org
… -latency validation; 2) adaptive proxy re-encryption to support … (CBDCs), integrating delegatable
anonymous credentials (… authentication, our scheme employs zk-SNARKs. A one-time …

Multi-key homomorphic signatures unforgeable under insider corruption

RWF Lai, RKH Tai, HWH Wong, SSM Chow - International Conference on …, 2018 - Springer
… technique, we show that strong ZK-SNARKs implies a “poly-… We introduce two extensions,
multi-key delegatable … homomorphic proxy re-authenticators, in which a proxy can …

NuCypher KMS: Decentralized key management system

M Egorov, ML Wilkison, D Nuñez - arXiv preprint arXiv:1707.06140, 2017 - arxiv.org
… For the first version of NuCypher KMS we choose ECIES for which we created a proxy re-…
it to verify the necessary amount was paid using zk-SNARKs [30]. When NuCypher KMS is …

[PDF][PDF] Nucypher: A proxy re-encryption network to empower privacy in decentralized systems

M Egorov, D Nuñez, M Wilkison - NuCypher whitepaper, 2018 - awebanalysis.com
… It would also help to hide the exact pricing information from the mining node while still
allowing it to verify the necessary amount was paid using zk-SNARKs [30]. When NuCypher is …

A Hitchhiker's Guide to Privacy-Preserving Cryptocurrencies: A Survey on Anonymity, Confidentiality, and Auditability

M Nardelli, F De Sclavis, M Iezzi - arXiv preprint arXiv:2505.21008, 2025 - arxiv.org
Zk-SNARKs are succinct non-interactive arguments of knowledge. Many zk-SNARK …
Solidus [40] uses banks as proxies; therefore, transactions are not explicitly exchanged …

A Systematic Review on Blockchain-Enabled eKYC: Leveraging SSI and DID for Secure and Efficient Identity Verification

I Ahmed, K Toyoda, T Nakano… - IEEE Internet of …, 2025 - ieeexplore.ieee.org
… However, zk-SNARKs face certain challenges, such as the O(… Furthermore, pairing
operations in zk-SNARKs demand … The protocols zk-SNARKs have a dependency on a trusted …