Have a personal or library account? Click to login
ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy Cover

ZK-STARK: Mathematical Foundations and Applications in Blockchain Supply Chain Privacy

Open Access
|Mar 2025

References

  1. Berentsen, A., L. Jeremias, N. Remo. A Walk-through of a Simple ZK-STARK Proof. 21.12.2022. <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://ssrn.com/abstract=4308637">https://ssrn.com/abstract=4308637</ext-link> or <ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://dx.doi.org/<a href="https://doi.org/10.2139/ssrn.4308637" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2139/ssrn.4308637</a>">http://dx.doi.org/<a href="https://doi.org/10.2139/ssrn.4308637" target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.2139/ssrn.4308637</a></ext-link></bold>
  2. Ben-Sasson, E., et al. Scalable, Transparent, and Post-Quantum Secure Computational Integrity. – Cryptology ePrint Archive, 2018.
  3. Ben-Sasson, E., I. Bentov, Y. Horesh, M. Riabzev. Scalable Zero Knowledge with No Trusted Setup. – In: A. Boldyreva, D. Micciancio, Eds. Advances in Cryptology – CRYPTO 2019. CRYPTO 2019. – Lecture Notes in Computer Science, Vol. <bold>11694</bold>, 2019, Springer, Cham. DOI: <a href="https://doi.org/10.1007/978-3-030-26954-8_23." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-030-26954-8_23.</a>
  4. Liu, B., S. Xie, Y. Yang, et al. Privacy-Preserving Divisible Double Auction with a Hybridized TEE-Blockchain System. – Cybersecurity, Vol. <bold>4</bold>, 2021, No 37. DOI: <a href="https://doi.org/10.1186/s42400-021-00100-x." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1186/s42400-021-00100-x.</a>
  5. Yan, Z., Y. Deng, Y. Sun. Concurrent Non-Malleable Zero-Knowledge and Simultaneous Resettable Non-Malleable Zero-Knowledge in Constant Rounds. – Cybersecur. Vol. <bold>1</bold>, 2018, No 12. DOI: <a href="https://doi.org/10.1186/s42400-018-0014-7." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1186/s42400-018-0014-7.</a>
  6. Jayabalan, J., N. Jeyanthi. A Review of State-of-Art Blockchain Schemes for Electronic Health Records Management. – Cybernetics and Information Technologies, Vol. <bold>24</bold>, 2024, No 1, pp. 35-63.
  7. Sumathi, M., S. Raja, V. Natarajan, R. Murugesan. A Decentralized Medical Network for Maintaining Patient Records Using Blockchain Technology. – Cybernetics and Information Technologies, Vol. <bold>22</bold>, 2022, No 4, pp. 129-141.
  8. Gong, Y., Y. Jin, Y. Li, Z. Liu, Z. Zhu. Analysis and Comparison of the Main Zero- Knowledge Proof Scheme. – 2022 International Conference on Big Data, Information and Computer Network (BDICN’22), Sanya, China, 2022, pp. 366-372. DOI: <a href="https://doi.org/10.1109/BDICN55575.2022.00074." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/BDICN55575.2022.00074.</a>
  9. Frimpong, S., A. M. Han, E. K. Boahen, R. N. A. Sosu, I. Hanson, O. Larbi-Siaw, I. B. Senkyire. RecGuard: An Efficient Privacy Preservation Blockchain-Based System for Online Social Network Users. – Blockchain: Research and Applications, Vol. <bold>4</bold>, 2023, Issue 1, 100111. ISSN: 2096-7209. DOI: <a href="https://doi.org/10.1016/j.bcra.2022.100111." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.bcra.2022.100111.</a>
  10. Chi, P. -W., Y. -H. Lu, A. Guan. A Privacy-Preserving Zero-Knowledge Proof for Blockchain. – In: IEEE Access, Vol. <bold>11</bold>, 2023, pp. 85108-85117. DOI: <a href="https://doi.org/10.1109/ACCESS.2023.3302691." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ACCESS.2023.3302691.</a>
  11. Zhou, Lu, A. Diro, A. Saini, S. Kaisar, P. C. Hiep. Leveraging Zero-Knowledge Proofs for Blockchain-Based Identity Sharing: A Survey of Advancements, Challenges, and Opportunities. – Journal of Information Security and Applications, Vol. <bold>80</bold>, 2024, 103678. ISSN 2214-2126, DOI: <a href="https://doi.org/10.1016/j.jisa.2023.103678." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1016/j.jisa.2023.103678.</a>
  12. Feng, T., P. Yang, C. Liu, J. Fang, R. Ma. Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof. – Wireless Communications and Mobile Computing, 2022, 1040662, 2022, 11 p. DOI: <a href="https://doi.org/10.1155/2022/1040662." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1155/2022/1040662.</a>
  13. Radeva, I., I. Popchev. Blockchain-Enabled Supply-Chain in Crop Production Framework. – Cybernetics and Information Technologies, Vol. <bold>22</bold>, 2022, No 1, pp. 151-170.
  14. Barbara, M. A. Proof of All: Verifiable Computation in a Nutshell. – arXiv Preprint arXiv:1908.02327, 2019, 14.
  15. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. – Decentralized Business Review, 2008, 21260.
  16. An article on ‘Modular Multiplicative Inverse’. <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.extendedeuclideanalgorithm.com/multiplicative_inverse.php#owmultinv">https://www.extendedeuclideanalgorithm.com/multiplicative_inverse.php#owmultinv</ext-link></bold>
  17. M. Abramowitz, Stegun, Irene Ann, Eds. (1983) June 1964. Chapter 25, eqn 25.2.3. Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables. – Applied Mathematics Series, Vol. <bold>55</bold> (9th reprint with additional corrections of 10th original printing with corrections (December 1972), First Ed.). Washington DC.; New York: United States Department of Commerce, National Bureau of Standards; Dover Publications. 878 p. ISBN: 978-0-486-61272-0. LCCN: 64-60036. MR: 0167642. LCCN: 65-12253.
  18. Kate, A., G. M. Zaverucha, I. Goldberg. Constant-Size Commitments to Polynomials and Their Applications. – In: M. Abe, Ed. Advances in Cryptology – ASIACRYPT 2010. ASIACRYPT 2010. Lecture Notes in Computer Science, Vol. <bold>6477</bold>. 2010. Berlin, Heidelberg, Springer. DOI: <a href="https://doi.org/10.1007/978-3-642-17373-8_11." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1007/978-3-642-17373-8_11.</a>
  19. Becker, G. Merkle Signature Schemes, Merkle Trees and Their Cryptanalysis (PDF). Ruhr-Universität Bochum. 18. 7. 2008, p. 16. Archived from the original (PDF) on 22.12.2014. Retrieved 20.11.2013.
  20. Merkle Tree. Available online on Wikipedia. <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://en.wikipedia.org/wiki/Merkle_tree">https://en.wikipedia.org/wiki/Merkle_tree</ext-link></bold>
  21. Ben-Sasson, E., I. Bentov, Y. Horesh, M. Riabzev. Licensed under Creative Commons License CC-BY 45th International Colloquium on Automata, Languages, and Programming (ICALP’2018), 2018. – In: I. Chatzigiannakis, C. Kaklamanis, D. Marx, D. Sannella, Eds. Article No 14, pp. 1-14.
  22. Ben-Sasson, E., I. Bentov, Y. Horesh, M. Riabzev. Fast Reed-Solomon Interactive Oracle Proofs of Proximity. Electron. Colloquium Comput. Complex., TR17. 2017.
  23. Ben-Sasson, E. StarkWare – Productizing zk-STARKs to Provide Blockchain Scalability and Privacy. <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://epicenter.tv/episodes/310/">https://epicenter.tv/episodes/310/</ext-link></bold>
  24. Ben-Sasson, E. Scaling Computation on Blockchains with ZK-STARK Invited Talk by Eli Ben-Sasson. <bold><ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://www.youtube.com/watch?v=8vduDYBu8uQ&amp;list=PLeeS-3Ml-rpoVMNQkUrFDSfaTuUMxVtjy">https://www.youtube.com/watch?v=8vduDYBu8uQ&amp;list=PLeeS-3Ml-rpoVMNQkUrFDSfaTuUMxVtjy</ext-link></bold>
  25. Fernández-Caramès, T. M., P. Fraga-Lamas. Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks. – In: IEEE Access, Vol. <bold>8</bold>, 2020, pp. 21091-21116. DOI: <a href="https://doi.org/10.1109/ACCESS.2020.2968985." target="_blank" rel="noopener noreferrer" class="text-signal-blue hover:underline">10.1109/ACCESS.2020.2968985.</a>
DOI: https://doi.org/10.2478/cait-2025-0001 | Journal eISSN: 1314-4081 | Journal ISSN: 1311-9702
Language: English
Page range: 3 - 18
Submitted on: Sep 28, 2024
Accepted on: Nov 25, 2024
Published on: Mar 21, 2025
Published by: Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
In partnership with: Paradigm Publishing Services
Publication frequency: 4 times per year

© 2025 Madhuri S. Arade, Nitin N. Pise, published by Bulgarian Academy of Sciences, Institute of Information and Communication Technologies
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.