This Week in Blockchain Research Issue #31
Paper of the Week:
Paper Title: Transparent SNARKs from DARK Compilers.
In recent years, there has been a surge of industry interest in verifiable outsourced computation (such as trustless cloud computing) as well as zero-knowledge proofs, particularly in blockchains.
Zero-knowledge proofs are posted to the blockchain ledger as a part of transactions and nodes must verify many proofs in the span of a short period of time, making succinctness and fast verification necessary properties for the deployment of such proof systems.
Verifiable computation is also being explored as a scaling solution for blockhain transactions, and even as a way to entirely eliminate the need for maintaining historical blockchain data.
Following that came SNARGs (“succinct non-interactive arguments”) achieving better concrete efficiency characteristics such as succinctness, non-interactivity, and verifier-scalability.
Somewhat unfortunately, the best performing proof systems to date (considering proof size and verification time) require a trusted preprocessing. These are the pairing-based SNARKs which have been deployed in live systems such as the ZCash cryptocurrency.
Transparent proof systems (do not involve any trusted setup) such as STARKs and Bulletproofs exist, but cannot perform as well.
Another thread of research has produced proof systems that remove trust from the circuit preprocessing step, and instead have a universal (trusted) setup: a one-time trusted setup that can be reused for any computation
Therefore, the main technical contribution of this work is thus a new polynomial commitment scheme without trusted setup (i.e., a transparent polynomial commitment scheme), which can be used to construct transparent SNARKs.
A framework is presented that unifies all existing approaches to constructing SNARKs from polynomial commitments using the language of interactive oracle proofs (IOPs).
The SNARK is concretely efficient with 7.8KB proofs (70× reduction over state of the art) and 75ms verification time for circuits with 1 million gates.
Authors: Benedikt Bünz*†, Ben Fisch*†, and Alan Szepieniec‡,
Affiliations: * Stanford University, † Findora Foundation and ‡ Nervos Foundation.
1. Paper Title: Rationality is Self-Defeating in Permissionless Systems.
Summary: If you think you have designed a permissionless decentralized system that is cleverly secured based on rationality assumptions, you haven’t.
Authors: Bryan Ford* and Rainer Böhme†.
Affiliations: * EPFL and † Universität Innsbruck.
2. Paper Title: Crypto Mining Makes Noise.
Summary: A novel attacker model that subsumes the attacker model present in the literature (cryptojacking) and a ML based framework that is able to detect and identify crypto-mining activities related to the attack.
Authors: Maurantonio Caprolu*, Simone Raponi*, Gabriele Oligeri*, and Roberto Di Pietro*,
Affiliations: * HBKU.
3. Paper Title: The Security Reference Architecture for Blockchains: Towards a Standardized Model for Studying Vulnerabilities, Threats, and Defenses.
Summary: A security reference architecture for blockchains, which utilizes a stacked model (similar to the ISO/OSI) that demonstrates the nature and hierarchy of various security and privacy threats.
Authors: Ivan Homoliak*†, Sarad Venugopalan*, Qingze Hum*, Daniel Reijsbergen*, Richard Schumi*, and Pawel Szalachowski*,
Affiliations: * Singapore University of Technology and Design and †Brno University of Technology.
4. Paper Title: Kriptosare.gen, a dockerized Bitcoin testbed: analysis of server performance.
Summary: A platform for deploying full-scale Bitcoin networks, together with the tools to control the network.
Authors: Francesco Zola*, Cristina Pérez-Solá†, Jon Egaña Zubia*, Maria Eguimendia*, and Jordi Herrera-Joancomartí‡,
Affiliations: * Vicomtech, † Universitat Oberta de Catalunya, and ‡ Universitat Autònoma de Barcelona.
1. Paper Title: SIMS : Self-Sovereign Identity Management System with Preserving Privacy in Blockchain.
Summary: A self-sovereign identity management system in the blockchain environment that has the self sovereignty to utilize personal information with preserving privacy.
Authors: Jeonghyuk Lee*, Jungyeon Hwang‡, Jaekyung Choi†, Hyunok Oh*, and Jihye Kim†,
Affiliations: * Hanyang University, † Kookmin University, and ‡ Electronics and Telecommunications Research Institute.
1. Paper Title: Linear-Size Constant-Query IOPs for Delegating Computation.
Summary: This work constructs interactive oracle proofs (IOPs) for algebraic computations over large fields that are “almost” ideal. It can achieve linear proof length, O(N log N ) (strictly quasilinear) prover arithmetic complexity, constant query and round complexity, and polylogarithmic verifier time.
Authors: Eli Ben-Sasson*, Alessandro Chiesa†, Lior Goldberg*, Tom Gur‡, Michael Riabzev*, and Nicholas Spooner†,
Affiliations: * StarkWare, † UC Berkeley, and ‡ University of Warwick.
1. Paper Title: Analysis of Nakamoto Consensus, Revisited.
Summary: A simple and transparent analysis used to teach senior undergraduate students and graduate students.
Authors: Jianyu Niu*, Chen Feng*, Hoang Dau†, Yu-Chih Huang‡, Jingge Zhu§,
Affiliations: * The University of British Columbia, † RMIT, ‡ National Taipei University, and § The University of Melbourne.
1. Paper Title: The New York Inclusive Value Ledger: A Peer-to-Peer Savings & Payments Platform for an All-Embracing and Dynamic State Economy.
Summary: This document sketches a smart-device-accessible peer-to-peer (‘P2P’) savings and payments platform – the ‘New York Inclusive Value Ledger’ – which, thanks to new digital technologies, can easily be instituted and administered by any unit of government in the State of New York that wishes to supply this critical productive, commercial and financial infrastructure to all of its constituents.
Authors: Robert Hockett*,
Affiliations: * Cornell Law School.
2. Paper Title: SoK: Demystifying Stablecoins.
Summary: This paper is a systemization of work on stablecoins.
Authors: Jeremy Clark*, Didem Demirag*, and Seyedehmahsa Moosavi*,
Affiliations: * Concordia University.
3. Paper Title: Token Economics in Real-Life: Cryptocurrency and Incentives Design for Insolar’s Blockchain Network.
Summary: This work presents facets of the token engineering process for a real-life 80-person Swiss blockchain startup.
Authors: Marek Laskowski*, Henry Kim*, Michael Zargham†, Matt Barlin†, and Danil Kabanov‡,
Affiliations: * York University, † BlockScience, and ‡ Insolar Technologies GmbH.
Oct 28-29 - CryptoEconomics Security Conference (Berkeley)
Nov 11-15 - ACM Conference on Computer and Communications Security (London)
Feb 10-14 - Financial Cryptography and Data Security 2020 (Malaysia)
Feb 19-21 - Stanford Blockchain Conference 2020 (Palo Alto)
Mar 7-8 - Cryptoeconomic Systems Conference 2020 (Boston)
April 13-16 - The 2nd IEEE International Conference on Decentralized Applications and Infrastructures (IEEE DAPPS 2020) (Oxford)
Past Conferences’ Videos:
“Significant research in the blockchain space is constantly being achieved by academic researchers. Unfortunately, a lot of this research is overlooked due to the massive numbers of papers being generated and the way they are being promoted and published. We’ve put together a categorized list of academic papers that can guide our subscribers and keep them up to date.”
Thanks for reading! If we missed anything, shoot us an email so that we can feature it in our next newsletter!
This newsletter is for informational purposes only. This content does not in any way constitute an offer or solicitation of an offer to buy or sell any investment solution or recommendation to buy or sell a security; nor it is to be taken as legal, business, investment, or tax advice. In fact, none of the information in this or other content on zk Capital should be relied on in any manner as advice. None of the authors, contributors, or anyone else connected with zk Capital, in any way whatsoever, can be responsible for your use of the information contained in this newsletter.