8 research outputs found

    Boomy: Batch Opening Of Multivariate polYnomial commitment

    Get PDF
    We present Boomy, a multivariate polynomial commitment scheme enabling the proof of the evaluation of multiple points: batch openings. Boomy is the natural extension of two popular protocols: the univariate polynomial commitment scheme of Kate, Zaverucha and Goldberg \cite{AC:KatZavGol10} and its multivariate counterpart from Papamanthou, Shi and Tamassia \cite{TCC:PapShiTam13}. In the special case of univariate, i.e., for only one evaluation point, Boomy matches these two previous schemes. Our construction is proven secure under the selective security model. In this paper, we present Boomy\u27s complexity and the applications on which it can have a significant impact. In fact, Boomy is perfectly suited to tackling blockchain data availability problems, shrinking existing challenges. We also present special lower-complexity cases that occur frequently in practical situations

    Enabling Blockchain Services for IoE with Zk-Rollups

    Get PDF
    The Internet of Things includes all connected objects from small embedded systems with low computational power and storage capacities to efficient ones, as well as moving objects like drones and autonomous vehicles. The concept of Internet of Everything expands upon this idea by adding people, data and processing. The adoption of such systems is exploding and becoming ever more significant, bringing with it questions related to the security and the privacy of these objects. A natural solution to data integrity, confidentiality and single point of failure vulnerability is the use of blockchains. Blockchains can be used as an immutable data layer for storing information, avoiding single point of failure vulnerability via decentralization and providing strong security and cryptographic tools for IoE. However, the adoption of blockchain technology in such heterogeneous systems containing light devices presents several challenges and practical issues that need to be overcome. Indeed, most of the solutions proposed to adapt blockchains to devices with low resources confront difficulty in maintaining decentralization or security. The most interesting are probably the Layer 2 solutions, which build offchain systems strongly connected to the blockchain. Among these, zk-rollup is a promising new generation of Layer 2/off-chain schemes that can remove the last obstacles to blockchain adoption in IoT, or more generally, in IoE. By increasing the scalability and enabling rule customization while preserving the same security as the Layer 1 blockchain, zk-rollups overcome restrictions on the use of blockchains for IoE. Despite their promises illustrated by recent systems proposed by startups and private companies, very few scientific publications explaining or applying this barely-known technology have been published, especially for non-financial systems. In this context, the objective of our paper is to fill this gap for IoE systems in two steps. We first propose a synthetic review of recent proposals to improve scalability including onchain (consensus, blockchain organization, …) and offchain (sidechain, rollups) solutions and we demonstrate that zk-rollups are the most promising ones. In a second step, we focus on IoE by describing several interesting features (scalability, dynamicity, data management, …) that are illustrated with various general IoE use case

    zkBeacon: Proven Randomness Beacon Based on Zero-Knowledge Verifiable Computation

    No full text
    The generation of random numbers by a trusted third-party is essential to many cryptographic protocols. Recently, the NIST proposed the standardization of randomness beacons, which are hash-based chains of pulses. Each pulse contains a random number and is generated at regular time intervals. However, if the owner of the beacon generator is untrusted, several attacks allow the manipulation of the provided random numbers. In this paper, we firstly suggest protecting the first hash functions of the NIST scheme by adding a verifiable argument of knowledge. More precisely, we propose furnishing a zk-SNARK or a zk-STARK with the hash to make the system more transparent and resistant to randomness manipulation. Secondly, we propose a verifiable computation-based interactive protocol to allow a client, with the help of the beacon, to generate proven randomness. Then, we show that connecting this system to a blockchain could have several benefits. We provide a security analysis with a model allowing a malicious beacon generator. We prove that our first application improves the resilience of the system against randomness manipulation attacks and that the interactive protocol rules out timing attacks for the client and ensures the non-predictability of the random numbers. Finally, we evaluated the computation cost with zk-SNARKs

    Modular zk-Rollup On-Demand

    No full text
    The rapid expansion of the use of blockchain-based systems often leads to a choice between customizable private blockchains and more secure, scalable and decentralized but expensive public blockchains. This choice represents the trade-off between privacy and customization at a low cost and security, scalability, and a large user base but at a high cost. In order to improve the scalability of secure public blockchains while enabling privacy and cost reduction, zk-rollups, a layer 2 solution, appear to be a promising avenue. This paper explores the benefits of zk-rollups, including improved privacy, as well as their potential to support transactions designed for specific applications. We propose an innovative design that allows multiple zk-rollups to co-exist on the same smart contracts, simplifying their creation and customization. We then evaluate the first implementation of our system highlighting a low overhead on existing transaction types and on proof generation while strongly decreasing the cost of new transaction types and drastically reducing zk-rollup creation costs

    Clathrin adaptor CALM/PICALM is associated with neurofibrillary tangles and is cleaved in Alzheimer's brains.

    No full text
    PICALM, a clathrin adaptor protein, plays important roles in clathrin-mediated endocytosis in all cell types. Recently, genome-wide association studies identified single nucleotide polymorphisms in PICALM gene as genetic risk factors for late-onset Alzheimer disease (LOAD). We analysed by western blotting with several anti-PICALM antibodies the pattern of expression of PICALM in human brain extracts. We found that PICALM was abnormally cleaved in AD samples and that the level of the uncleaved 65-75 kDa full-length PICALM species was significantly decreased in AD brains. Cleavage of human PICALM after activation of endogenous calpain or caspase was demonstrated in vitro. Immunohistochemistry revealed that PICALM was associated in situ with neurofibrillary tangles, co-localising with conformationally abnormal and hyperphosphorylated tau in LOAD, familial AD and Down syndrome cases. PHF-tau proteins co-immunoprecipitated with PICALM. PICALM was highly expressed in microglia in LOAD. These observations suggest that PICALM is associated with the development of AD tau pathology. PICALM cleavage could contribute to endocytic dysfunction in AD.JOURNAL ARTICLESCOPUS: ar.jinfo:eu-repo/semantics/publishe
    corecore