{"id":"https://openalex.org/W4220748900","doi":"https://doi.org/10.3233/jcs-210167","title":"Scriptable and composable SNARKs in the trusted hardware model1","display_name":"Scriptable and composable SNARKs in the trusted hardware model1","publication_year":2022,"publication_date":"2022-04-01","ids":{"openalex":"https://openalex.org/W4220748900","doi":"https://doi.org/10.3233/jcs-210167"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-210167","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-210167","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086088758","display_name":"Zhelei Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhelei Zhou","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5068527949","display_name":"Bingsheng Zhang","orcid":"https://orcid.org/0000-0002-2320-9582"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Bingsheng Zhang","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100400871","display_name":"Yuan Chen","orcid":"https://orcid.org/0000-0001-5914-7945"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yuan Chen","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100325954","display_name":"Jiaqi Li","orcid":"https://orcid.org/0000-0002-8330-0230"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiaqi Li","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088790914","display_name":"Yajin Zhou","orcid":"https://orcid.org/0000-0001-7610-4736"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yajin Zhou","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5019361611","display_name":"Yibiao Lu","orcid":"https://orcid.org/0000-0002-7015-7148"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yibiao Lu","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105297718","display_name":"Kui Ren","orcid":"https://orcid.org/0000-0002-1969-2591"},"institutions":[{"id":"https://openalex.org/I168879160","display_name":"Zhejiang University of Science and Technology","ror":"https://ror.org/05mx0wr29","country_code":"CN","type":"education","lineage":["https://openalex.org/I168879160"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kui Ren","raw_affiliation_strings":["School of Computer Science and Technology, Zhejiang University, Zhejiang, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Technology, Zhejiang University, Zhejiang, China","institution_ids":["https://openalex.org/I168879160"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043007826","display_name":"Phuc Thai","orcid":null},"institutions":[{"id":"https://openalex.org/I184840846","display_name":"Virginia Commonwealth University","ror":"https://ror.org/02nkdxk79","country_code":"US","type":"education","lineage":["https://openalex.org/I184840846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Phuc Thai","raw_affiliation_strings":["Department of Computer Science, Virginia Commonwealth University, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Virginia Commonwealth University, VA, USA","institution_ids":["https://openalex.org/I184840846"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030233265","display_name":"Hong-Sheng Zhou","orcid":"https://orcid.org/0000-0003-3534-6629"},"institutions":[{"id":"https://openalex.org/I184840846","display_name":"Virginia Commonwealth University","ror":"https://ror.org/02nkdxk79","country_code":"US","type":"education","lineage":["https://openalex.org/I184840846"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hong-Sheng Zhou","raw_affiliation_strings":["Department of Computer Science, Virginia Commonwealth University, VA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Virginia Commonwealth University, VA, USA","institution_ids":["https://openalex.org/I184840846"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":9,"corresponding_author_ids":["https://openalex.org/A5068527949"],"corresponding_institution_ids":["https://openalex.org/I168879160"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.01919639,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"30","issue":"6","first_page":"757","last_page":"793"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9890000224113464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/gas-meter-prover","display_name":"Gas meter prover","score":0.8617430925369263},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8451908826828003},{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.6578690409660339},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.5778419971466064},{"id":"https://openalex.org/keywords/direct-anonymous-attestation","display_name":"Direct Anonymous Attestation","score":0.533258855342865},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.5194405913352966},{"id":"https://openalex.org/keywords/proof-assistant","display_name":"Proof assistant","score":0.5184228420257568},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4762144982814789},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.46060851216316223},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.4572254717350006},{"id":"https://openalex.org/keywords/mathematical-proof","display_name":"Mathematical proof","score":0.4362798035144806},{"id":"https://openalex.org/keywords/automated-theorem-proving","display_name":"Automated theorem proving","score":0.4136126935482025},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.3662784695625305},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.31193140149116516},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.2910969853401184},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.17612916231155396},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.1577894687652588},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.13470664620399475},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.1333875060081482}],"concepts":[{"id":"https://openalex.org/C159718280","wikidata":"https://www.wikidata.org/wiki/Q5526353","display_name":"Gas meter prover","level":3,"score":0.8617430925369263},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8451908826828003},{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.6578690409660339},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.5778419971466064},{"id":"https://openalex.org/C169796023","wikidata":"https://www.wikidata.org/wiki/Q3708936","display_name":"Direct Anonymous Attestation","level":3,"score":0.533258855342865},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.5194405913352966},{"id":"https://openalex.org/C203265346","wikidata":"https://www.wikidata.org/wiki/Q11387554","display_name":"Proof assistant","level":3,"score":0.5184228420257568},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4762144982814789},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.46060851216316223},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.4572254717350006},{"id":"https://openalex.org/C108710211","wikidata":"https://www.wikidata.org/wiki/Q11538","display_name":"Mathematical proof","level":2,"score":0.4362798035144806},{"id":"https://openalex.org/C206880738","wikidata":"https://www.wikidata.org/wiki/Q431667","display_name":"Automated theorem proving","level":2,"score":0.4136126935482025},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.3662784695625305},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.31193140149116516},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.2910969853401184},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.17612916231155396},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.1577894687652588},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.13470664620399475},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.1333875060081482},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-210167","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-210167","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":49,"referenced_works":["https://openalex.org/W4180724","https://openalex.org/W41098585","https://openalex.org/W945570858","https://openalex.org/W1499934958","https://openalex.org/W1569778844","https://openalex.org/W1590713339","https://openalex.org/W1836725053","https://openalex.org/W1854738139","https://openalex.org/W1980227445","https://openalex.org/W2002616520","https://openalex.org/W2018746447","https://openalex.org/W2038517014","https://openalex.org/W2061643296","https://openalex.org/W2067047774","https://openalex.org/W2073814996","https://openalex.org/W2075144441","https://openalex.org/W2079913403","https://openalex.org/W2146099890","https://openalex.org/W2150620897","https://openalex.org/W2169934175","https://openalex.org/W2171337840","https://openalex.org/W2192481898","https://openalex.org/W2416431186","https://openalex.org/W2473389213","https://openalex.org/W2517744317","https://openalex.org/W2519006453","https://openalex.org/W2533941064","https://openalex.org/W2536137494","https://openalex.org/W2615526475","https://openalex.org/W2676157184","https://openalex.org/W2734245281","https://openalex.org/W2754619027","https://openalex.org/W2765206040","https://openalex.org/W2765706244","https://openalex.org/W2883563728","https://openalex.org/W2883585522","https://openalex.org/W2883748642","https://openalex.org/W2884599530","https://openalex.org/W2898776076","https://openalex.org/W2919751322","https://openalex.org/W3095069691","https://openalex.org/W3101431950","https://openalex.org/W3204049220","https://openalex.org/W4242464041","https://openalex.org/W6600557889","https://openalex.org/W6685859198","https://openalex.org/W6760109724","https://openalex.org/W6784459322","https://openalex.org/W6817374596"],"related_works":["https://openalex.org/W2149634854","https://openalex.org/W2562305209","https://openalex.org/W3030245161","https://openalex.org/W2096571200","https://openalex.org/W2809883875","https://openalex.org/W3030523870","https://openalex.org/W4389777186","https://openalex.org/W3210659843","https://openalex.org/W2397501045","https://openalex.org/W2920360623"],"abstract_inverted_index":{"Non-interactive":[0],"zero-knowledge":[1],"proof":[2,139,153],"or":[3,31],"argument":[4],"(NIZK)":[5],"systems":[6,140],"are":[7],"widely":[8],"used":[9,117],"in":[10,87,103,193],"many":[11,190],"security":[12],"sensitive":[13],"applications":[14],"to":[15,28,77,188],"enhance":[16],"computation":[17],"integrity,":[18],"privacy":[19],"and":[20,68,90,106,151],"scalability.":[21],"In":[22,54,155],"such":[23,50],"systems,":[24],"a":[25,38,59,81,92,160],"prover":[26,67],"wants":[27],"convince":[29],"one":[30],"more":[32],"verifiers":[33],"that":[34,129],"the":[35,46,52,66,72,136,152,180,194],"result":[36,127],"of":[37],"public":[39],"function":[40,73],"is":[41,132],"correctly":[42],"computed":[43],"without":[44,121],"revealing":[45],"(potential)":[47],"private":[48],"input,":[49],"as":[51],"witness.":[53],"this":[55,85],"work,":[56],"we":[57,157,177],"introduce":[58],"new":[60,203],"notion,":[61],"called":[62],"scriptable":[63,162,182],"SNARK,":[64],"where":[65],"verifier(s)":[69],"can":[70,114,184],"specify":[71],"(or":[74],"language":[75],"instance)":[76],"be":[78,115,185],"proven":[79],"via":[80],"script.":[82],"We":[83,98],"formalize":[84],"notion":[86],"UC":[88],"framework":[89],"provide":[91],"generic":[93],"trusted":[94],"hardware":[95,166],"based":[96],"solution.":[97],"then":[99],"instantiate":[100],"our":[101,130],"solution":[102,131],"both":[104],"SGX":[105],"Trustzone":[107],"with":[108,167],"Lua":[109],"script":[110],"engine.":[111],"The":[112,125],"system":[113],"easily":[116],"by":[118],"typical":[119],"programmers":[120],"any":[122],"cryptographic":[123],"background.":[124],"benchmark":[126],"shows":[128],"better":[133],"than":[134],"all":[135],"known":[137],"SNARK":[138,163,183],"w.r.t.":[141],"prover\u2019s":[142],"running":[143,149],"time":[144],"(1000":[145],"times":[146],"faster),":[147],"verifier\u2019s":[148,198],"time,":[150],"size.":[154],"addition,":[156],"also":[158],"give":[159],"lightweight":[161],"protocol":[164],"for":[165,202],"limited":[168],"state,":[169],"e.g.,":[170],"\u0398":[171],"(":[172],"\u03bb":[173],")":[174],"bits.":[175],"Finally,":[176],"show":[178],"how":[179],"proposed":[181],"readily":[186],"deployed":[187],"solve":[189],"well-known":[191],"problems":[192],"blockchain":[195],"context,":[196],"e.g.":[197],"dilemma,":[199],"fast":[200],"joining":[201],"players,":[204],"etc.":[205]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
