└── README.md /README.md: -------------------------------------------------------------------------------- 1 | # Awesome Web3Knowledge 2 | 3 | :cake: A collection of awesome knowledge about Web 3.0 4 | 5 | ## Classification 6 | 7 | Throughout this list you'll find emojis next to resources, here's what each of them indicates: 8 | 9 | :scroll: Scientific paper 10 | 11 | :books: Course, long series or complete series 12 | 13 | :bomb: Collection of valuable resources 14 | 15 | :school: A programming library 16 | 17 | :file_folder: Documentation 18 | 19 | :computer: Official Website 20 | 21 | :green_book: Specific, written tutorial 22 | 23 | :video_camera: Video tutorial 24 | 25 | :dizzy: Stellar resource, not from this earth 26 | 27 | :mag: Search 28 | 29 | :bulb: Utility 30 | 31 | :moneybag: Grant 32 | 33 | :anchor: Decentralized Institution 34 | 35 | :newspaper: News 36 | 37 | :airplane: Location 38 | 39 | ## Content 40 | 41 | - [Web 3.0 Definitions](#web-3.0-definitions) 42 | - [Cryptography](#cryptography) 43 | - [Number Theory Curves Fields](#number-theory-curves-fields) 44 | - [Elliptic Curves](#elliptic-curves) 45 | - [Hash Functions](#hash-functions) 46 | - [Pairings](#pairings) 47 | - [Commitment Schemes](#commitment-schemes) 48 | - [Accumulators](#accumulators) 49 | - [Merkle Trees](#merkle-trees) 50 | - [Universal Composability (UC) Model Security](#universal-composability-model-security) 51 | - [Threshold Cryptography](#threshold-cryptography) 52 | - [Constraint Systems and Arithmetization](#constraint-systems-and-arithmetization) 53 | - [Rank1 Constraint System (R1CS) and Quadratic Arithmetic Programs (QAPs)](#rank1-constraint-system-and-quadratic-arithmetic-programs) 54 | - [PLONK Arithemtization](#plonk-arithemtization) 55 | - [Arithmetic Intermediate Representation (AIR)](#arithmetic-intermediate-representation) 56 | - [Zero Knowledge](#zero-knowledge) 57 | - [Trusted Setup](#trusted-setup) 58 | - [Universal Setup](#universal-setup) 59 | - [Transparent-No Setup](#transparent-no-setup) 60 | - [Unsorted ZKP Systems](#unsorted-zkp-systems) 61 | - [Recursive Proofs](#recursive-proofs) 62 | - [Short-lived ZKPs](#short-lived-zkps) 63 | - [Multi-Verifier Proofs](#multi-verifier-proofs) 64 | - [Multi-Prover Proofs](#multi-prover-proofs) 65 | - [Designated-Verifier Proofs](#designated-verifier-proofs) 66 | - [Garbled Circuits](#garbled-circuits) 67 | - [Interactive Proofs based on VOLE](#interactive-proofs-based-on-vole) 68 | - [zk Virtual Machines](#zk-virtual-machines) 69 | - [Decentralized Finance](#decentralized-finance) 70 | - [Ethereum](#ethereum) 71 | - [Smart Contract Security](#smart-contract-security) 72 | - [Arbitrage](#arbitrage) 73 | - [Confidential UTXO and Mixers](#confidential-utxo-and-mixers) 74 | - [Decentralized Key Management](#decentralized-key-management) 75 | - [Wallets](#wallets) 76 | - [Decentralized Identity](#decentralized-identity) 77 | - [Group Signatures](#group-signatures) 78 | - [Credential Systems](#credential-systems) 79 | - [Distributed Trust](#distributed-trust) 80 | - [Decentralized Oracles](#decentralized-oracles) 81 | - [Side Chain Committees](#side-chain-committees) 82 | - [Cryptoeconomic Security](#cryptoeconomic-security) 83 | - [Decentralized Data Management](#decentralized-data-management) 84 | - [Access Control](#access-control) 85 | - [Data Sharing](#data-sharing) 86 | - [Storage](#storage) 87 | - [Secret Management](#secret-management) 88 | - [Privacy](#privacy) 89 | - [Secure Computation](#secure-computation) 90 | - [Multi Party Computation](#multi-party-computation) 91 | - [Homomorphic Encryption](#homomorphic-encryption) 92 | - [Trusted Execution Environments (TEEs)](#trusted-execution-environments) 93 | - [Privacy-preserving Computation](#privacy-preserving-computation) 94 | - [Differential Privacy](#differential-privacy) 95 | - [Data Lineage](#data-lineage) 96 | - [Decentralized Computation](#decentralized-computation) 97 | - [Blockchain-coordinated Computation](#blockchain-coordinated-computation) 98 | - [On-chain Computation](#on-chain-computation) 99 | - [Off-chain Computation](#off-chain-computation) 100 | - [Hybrid Computation](#hybrid-computation) 101 | - [Policy-compliant Computation](#policy-compliant-computation) 102 | - [Policy Transpilers](#policy-transpilers) 103 | - [User Centricity and Data Sovereignty](#user-centricity-and-data-sovereignty) 104 | - [Systematizations of Knowledge (SoK)](#systematizations-of-knowledge) 105 | - [Application Development](#application-development) 106 | - [Decentralized Programming](#decentralized-programming) 107 | - [Smart Contracts](#smart-contracts) 108 | - [Layer 2 and Bridges](#layer-2-and-bridges) 109 | - [Oracles](#oracles) 110 | - [Web 3.0 Identity](#web-3.0-identity) 111 | - [Frontend](#frontend) 112 | - [Standardization](#standardization) 113 | - [Tooling](#tooling) 114 | - [Cryptographic Libraries](#cryptographic-libraries) 115 | - [Trusted Enclaves](#trusted-enclaves) 116 | - [Zero Knowledge Proofs](#zero-knowledge-proofs) 117 | - [Programming](#programming) 118 | - [Golang](#golang) 119 | - [Rust](#rust) 120 | - [Solidity](#solidity) 121 | - [Research](#research) 122 | - [Paper Search](#paper-search) 123 | - [Education](#education) 124 | - [Researchers to follow by domain](#researchers-to-follow-by-domain) 125 | - [Conferences](#conferences) 126 | - [Grants](#grants) 127 | - [Scientific Writing](#scientific-writing) 128 | - [Companies](#companies) 129 | - [Blockchain Development](#blockchain-development) 130 | - [Identity Management](#identity-management) 131 | - [Storage Network](#storage-network) 132 | - [Data Management](#data-management) 133 | - [Resolution](#resolution) 134 | - [Asset Management](#asset-management) 135 | - [Blockchain Projects](#blockchain-projects) 136 | - [News](#news) 137 | 138 | --- 139 | 140 | ## Web 3.0 Definitions & Overviews 141 | 142 | - :bomb: [Blockchain Roadmap - Everything you need to know](https://roadmap.sh/blockchain) 143 | - :green_book: [Blockchains, crypto, & web3: Connections, models, more](https://a16z.simplecast.com/episodes/blockchains-crypto-web3-connections-models-QRYQ9oIi), [all episodes](https://a16z.simplecast.com/episodes) 144 | - :green_book: [Web5: The Decentralized Web Platform](https://developer.tbd.website/docs/Decentralized%20Web%20Platform%20-%20Public.pdf) 145 | - :green_book: [What is Web5, Jack Dorsey’s latest idea?](https://medium.com/geekculture/what-is-web5-jack-dorseys-latest-idea-d40d3a2e4973) 146 | - :green_book: [Web3 is Self-Certifying](https://jaygraber.medium.com/web3-is-self-certifying-9dad77fd8d81) 147 | - :green_book: [Decentralized Identity: Passport to Web3](https://medium.com/amber-group/decentralized-identity-passport-to-web3-d3373479268a) 148 | 149 | 150 | ## Cryptography 151 | 152 | - :dizzy: [A Graduate Course in Applied Cryptography (Dan Boneh)](http://toc.cryptobook.us/) 153 | - :bomb: [Crypto Stackexchange](https://crypto.stackexchange.com) 154 | - :green_book: [Cryptopals - Collection of challenges on basic cryptography](https://cryptopals.com/) 155 | - :green_book: [Notes on Cryptography and Computer Security](https://docs.google.com/viewer?url=https://github.com/mahdiz/lecture-notes/raw/master/crypto/main.pdf) 156 | - :video_camera: :dizzy: [ZK Hack - ZK Whiteboard sessions](https://zkhack.dev/whiteboard/module-one/) 157 | - :green_book: [David Crypto Blog](https://www.cryptologie.net/) 158 | 159 | ### Number Theory Curves Fields 160 | 161 | - :video_camera: [Finite Fields in Cryptography: Why and How](https://www.youtube.com/watch?v=ColSUxhpn6A) 162 | - [explained-from-first-principles: Number theory](https://explained-from-first-principles.com/number-theory/) 163 | - [introduction to mathematical cryptography](https://drive.google.com/drive/u/1/folders/1ILBHUZrDZDku3HfK1yyp6AbBD_F3nRm5) 164 | - :green_book: [Explaining BLS12–381 … The “Zero Knowledge Proof” Curve](https://medium.com/asecuritysite-when-bob-met-alice/explaining-bls12-381-the-zero-knowledge-proof-curve-aa5eabec8261) 165 | 166 | ### Elliptic Curves 167 | 168 | - :green_book: [Elliptic Curve Cryptography: a gentle introduction](https://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/) 169 | - :books: [BLS12-381 for the rest of us](https://hackmd.io/@benjaminion/bls12-381#BLS12-381-For-The-Rest-Of-Us) 170 | - [Elliptic Curve Cryptography (ECC)](https://cryptobook.nakov.com/asymmetric-key-ciphers/elliptic-curve-cryptography-ecc) 171 | - [A survey of elliptic curves for proof systems](https://eprint.iacr.org/2022/586.pdf) 172 | - [The animated elliptic curve](https://curves.xargs.org/) 173 | - [An Illustrated Guide to Elliptic Curve Cryptography Validation](https://research.nccgroup.com/2021/11/18/an-illustrated-guide-to-elliptic-curve-cryptography-validation/) 174 | - :green_book: [Explaining BLS12–381 … The “Zero Knowledge Proof” Curve](https://medium.com/asecuritysite-when-bob-met-alice/explaining-bls12-381-the-zero-knowledge-proof-curve-aa5eabec8261) 175 | 176 | ### Hash Functions 177 | 178 | - :video_camera: [6 4 Constructing compression functions 8 min](https://www.youtube.com/watch?v=QukLrvrnr3U) 179 | - :video_camera: [SHA-256 | COMPLETE Step-By-Step Explanation (W/ Example)](https://www.youtube.com/watch?v=orIgy2MjqrA&list=LL&index=14) 180 | 181 | ### Pairings 182 | 183 | - :video_camera: [Pairings in Cryptography](https://www.youtube.com/watch?v=8WDOpzxpnTE&t=3208s) 184 | - [Pairings for beginners](http://infosec.pusan.ac.kr/wp-content/uploads/2019/09/Pairings-For-Beginners.pdf) 185 | - :green_book: [Exploring Elliptic Curve Pairings](https://medium.com/@VitalikButerin/exploring-elliptic-curve-pairings-c73c1864e627) 186 | 187 | ### Commitment Schemes 188 | 189 | - [Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions](https://hal.inria.fr/hal-01306152/file/poly-commit.pdf) 190 | - [Notes for Lecture 27](http://theory.stanford.edu/~trevisan/cs276/lecture27.pdf) 191 | - [Penumbra Value Commitments](https://protocol.penumbra.zone/main/protocol/value_commitments.html) 192 | - [Efficient Functional Commitments: How to Commit to a Private Function](https://eprint.iacr.org/2021/1342.pdf) 193 | - [Polynomial Commitment with a One-to-Many Prover and Applications](https://www.usenix.org/system/files/sec22summer_zhang-jiaheng.pdf) 194 | - [Commit-Chains: Secure, Scalable Off-Chain Payments](https://eprint.iacr.org/2018/642.pdf) 195 | - :video_camera: [Lecture 10 Premiere: Privacy on the Blockchain](https://www.youtube.com/watch?v=H3GmsxRU1Kw) 196 | 197 | ### Accumulators 198 | 199 | - :scroll: [Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains](https://eprint.iacr.org/2018/1188.pdf) 200 | - :scroll: [An Expressive (Zero-Knowledge) Set Accumulator](https://user.eng.umd.edu/~cpap/published/accumEUROSP2017.pdf) 201 | 202 | ### Merkle Trees 203 | 204 | - :green_book: [Some ways to use ZK-SNARKs for privacy](https://vitalik.ca/general/2022/06/15/using_snarks.html) 205 | - :green_book: [Accelerating Penumbra's Merkle Tree by up to 4,000,000x](https://penumbra.zone/blog/tiered-commitment-tree/) 206 | 207 | ### Universal Composability Model Security 208 | 209 | - [Universally Composable Security: A New Paradigm for Cryptographic Protocols](https://eprint.iacr.org/2000/067.pdf) 210 | - [Security and Composition of Multiparty Cryptographic Protocols](https://link.springer.com/content/pdf/10.1007/s001459910006.pdf) 211 | - [Security and Composition of Cryptographic Protocols: A tutorial](http://cs.tau.ac.il/~canetti/materials/sp09-sem-lec9.pdf) 212 | - [iUC: Flexible Universal Composability Made Simple](https://eprint.iacr.org/2019/1073.pdf) 213 | - [Obtaining Universally Composable Security: Towards the Bare Bones of Trust](https://eprint.iacr.org/2007/475.pdf) 214 | - [Security and composition of cryptographic protocols: a tutorial (part I)](https://dl.acm.org/doi/abs/10.1145/1165555.1165570) 215 | 216 | ### Threshold Cryptography 217 | 218 | - :scroll: [Mithril: Stake-based Threshold Multisignatures](https://eprint.iacr.org/2021/916.pdf) 219 | - :scroll: [Threshold Cryptography as a Service (in the Multiserver and YOSO Models)](https://eprint.iacr.org/2021/1290) 220 | - :video_camera: [Fast Multiparty Threshold ECDSA with Fast Trustless Setup](https://www.youtube.com/watch?v=PdfDZIwuZm0&list=LL&index=71) 221 | 222 | ## Constraint Systems and Arithmetization 223 | 224 | Arithmetization is a preliminary process that derives an alternative circuit representation that allows for a more efficient proof computation. 225 | In general, the "backend" of a SNARK considers pre-processing and formatting of an arithmetic or boolean circuit. 226 | The "frontend" of a SNARK describes the actual proof algorithm, which leverages the intermediate description emitted from the backend to efficiently prove & verify that a prover knows a specific witness that satisfies the circuit at hand. 227 | Most proof algorithms make use of pairings, where a specific elliptic curve is leveraged to homomorphically compute circuit satisfiability without disclosing the witness of the prover in plain. 228 | 229 | - :green_book: [Simple Explanations of Arithmetic Circuits and Zero-Knowledge Proofs](https://medium.com/web3studio/simple-explanations-of-arithmetic-circuits-and-zero-knowledge-proofs-806e59a79785) 230 | 231 | ### Rank1 Constraint System and Quadratic Arithmetic Programs 232 | Important for pairing based SNARKs, such as Groth16. 233 | 234 | - :green_book: [R1CS & QAP Overview](https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649) 235 | - [R1CS & QAP Implementation Example](https://asecuritysite.com/zero/go_qap) 236 | - [Paper on DIZK that includes a good description of Groth16, R1CS and QAP](https://eprint.iacr.org/2018/691.pdf) 237 | 238 | ### PLONK Arithemtization 239 | 240 | - :green_book: [PLONK Arithmetization](https://hackmd.io/@jake/plonk-arithmetization) 241 | - :books: [Halo2](https://zcash.github.io/halo2/concepts/) 242 | - :video_camera: [ZK HACK mini - Introduction to Plonky2](https://www.youtube.com/watch?v=p77Av0sXKQ4) 243 | 244 | ### Arithmetic Intermediate Representation 245 | Important for zkEVM execution of SNARKS. 246 | 247 | ## Zero Knowledge 248 | 249 | - :dizzy: [Proofs, Arguments and Zero-Knowledge (Justin Thaler)](https://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.pdf) 250 | - :bomb: [ZK Research](https://0xst.notion.site/ZK-Research-94ba836c3b2a4e2491a871364ee5b13b) 251 | - :bomb: [ingopedia: A curated list of ZK resources and links.](https://github.com/ingonyama-zk/ingopedia) 252 | - :video_camera: [CESC ZKP Workshop](https://www.youtube.com/watch?v=SzBDWyJ3X6U&list=PLS01nW3Rtgor2MjOJBJexhQ6ZKWs6uQw8) 253 | - :green_book: [BLS12-381 For The Rest Of Us](https://hackmd.io/@benjaminion/bls12-381) 254 | - :green_book: [zkSNARKs in a nutshell](https://blog.ethereum.org/2016/12/05/zksnarks-in-a-nutshell/) 255 | - :green_book: [A Brief Dive Into zk-SNARKs and the ZoKrates Toolbox on the Ethereum Blockchain](https://medium.com/cornellblockchain/a-brief-dive-into-zk-snarks-and-the-zokrates-toolbox-on-the-ethereum-blockchain-cb7bd7f00fdc) 256 | - :green_book: [Quadratic Arithmetic Programs: from Zero to Hero](https://medium.com/@VitalikButerin/quadratic-arithmetic-programs-from-zero-to-hero-f6d558cea649) 257 | - :green_book: [Zk-SNARKs: Under the Hood](https://medium.com/@VitalikButerin/zk-snarks-under-the-hood-b33151a013f6) 258 | - :green_book: [An approximate introduction to how zk-SNARKs are possible](https://vitalik.ca/general/2021/01/26/snarks.html) 259 | - :green_book: [Demystifying Zero Knowledge Proofs](https://docs.google.com/presentation/d/1gfB6WZMvM9mmDKofFibIgsyYShdf0RV_Y8TLz3k1Ls0/edit#slide=id.g443f641f0b_1_338) 260 | - :green_book: [What are zk-SNARKs?](https://z.cash/technology/zksnarks/) 261 | - :green_book: [Zero-Knowledge Proofs: STARKs vs SNARKs](https://consensys.net/blog/blockchain-explained/zero-knowledge-proofs-starks-vs-snarks/) 262 | - :scroll: [Non-Interactive Zero-Knowledge Proofs for Composite Statements](https://eprint.iacr.org/2018/557) 263 | - :green_book: [Delendum.xyz: ZK in Identity](https://delendum.xyz/2022/07/26/zk-identity-systems.html) 264 | 265 | ### Trusted Setup 266 | 267 | ### Universal Setup 268 | 269 | - :bomb: [Awesome-PLONK](https://github.com/fluidex/awesome-plonk/blob/main/README.md) 270 | - :books: [Polynomial IOP PLONK - Introduction Dan Boneh](https://www.youtube.com/watch?v=vxyoPM2m7Yg) 271 | - [PlonK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge](https://eprint.iacr.org/2019/953.pdf) 272 | 273 | ### Transparent-No Setup 274 | 275 | - :green_book: [From Zero Knowledge to Bulletproofs](https://github.com/AdamISZ/from0k2bp/blob/master/from0k2bp.pdf) 276 | 277 | ### Unsorted ZKP Systems 278 | Todo: Separate the below list and filter universal, trusted transparent setup, etc. 279 | 280 | - [Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments](https://www.usenix.org/system/files/sec22fall_srinivasan.pdf) 281 | - [SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs](https://eprint.iacr.org/2021/1577.pdf) 282 | - [Many-out-of-many Proofs](https://github.com/ConsenSys/anonymous-zether/blob/master/docs/AnonZether.pdf) 283 | - [Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers](https://eprint.iacr.org/2021/1678.pdf) 284 | - [Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs](https://eprint.iacr.org/2019/188.pdf) 285 | - [Proof of Replication](https://research.filecoin.io/assets/proof-of-replication.pdf) 286 | - [Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge](https://eprint.iacr.org/2016/635.pdf) 287 | - [ZoKrates - Scalable Privacy-Preserving Off-Chain Computations](https://www.ise.tu-berlin.de/fileadmin/fg308/publications/2018/2018_eberhardt_ZoKrates.pdf) 288 | - [LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs](https://eprint.iacr.org/2019/142.pdf) 289 | - :video_camera: [Youtube: Discrete Log based Zero-Knowledge Proofs - Dan Boneh, Stanford](https://www.youtube.com/watch?v=wB3DlND7KEw) 290 | - [ZKProof Community Reference](https://docs.zkproof.org/pages/reference/reference.pdf) 291 | - :books: [Lecture 5: Proofs of Knowledge, Schnorr’s protocol, NIZK](https://crypto.stanford.edu/cs355/19sp/lec5.pdf) 292 | - :scroll: [Doubly-efficient zkSNARKs without trusted setup](https://eprint.iacr.org/2017/1132.pdf) 293 | - :scroll: [zkStudyClub: PCD without zkSNARK with Pratyush Mishra (UC Berkeley) & Benedikt Bünz (Stanford)](https://www.youtube.com/watch?v=TRyep--q6jU) 294 | - :scroll: [Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning](https://www.usenix.org/system/files/sec21-weng.pdf) 295 | - :scroll: [Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation](https://eprint.iacr.org/2019/317.pdf) 296 | 297 | ### Recursive Proofs 298 | 299 | - :scroll: [Darlin: Recursive proofs using Marlin](https://arxiv.org/pdf/2107.04315.pdf) 300 | 301 | ### Short-lived ZKPs 302 | 303 | - :scroll: [Short-lived zero-knowledge proofs and signatures](https://eprint.iacr.org/2022/190.pdf) 304 | - :scroll: [Verifiable Delay Functions](https://link.springer.com/chapter/10.1007/978-3-319-96884-1_25) 305 | 306 | ### Multi-Verifier Proofs 307 | 308 | - :scroll: [Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs](https://eprint.iacr.org/2022/082.pdf) 309 | - :scroll: [Non-Interactive Zero-Knowledge Proofs to Multiple Verifiers](https://eprint.iacr.org/2022/063.pdf) 310 | - :scroll: [Verifiable Relation Sharing and Multi-Verifier Zero-Knowledge in Two Rounds: Trading NIZKs with Honest Majority*](https://eprint.iacr.org/2022/167.pdf) 311 | 312 | ### Multi-Prover Proofs 313 | 314 | - [Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets](https://eprint.iacr.org/2021/1530.pdf) 315 | 316 | ### Designated-Verifier Proofs 317 | 318 | - :scroll: [Designated Verifier Proofs and Their Applications](https://link.springer.com/content/pdf/10.1007/3-540-68339-9_13.pdf) 319 | 320 | ### Garbled Circuits 321 | 322 | - :scroll: [A Gentle Introduction to Yao’s Garbled Circuits](https://web.mit.edu/sonka89/www/papers/2017ygc.pdf) 323 | - :video_camera: [MPC-Mike Rosulek-Lecture 2: Advanced Techniques and Optimizations for Garbled Circuits](https://www.youtube.com/watch?v=D6r6o2KQ3Oc&list=LL&index=55) 324 | - :video_camera: [MPC-Mike Rosulek-Lecture 1-3: Overview of Secure Computation and Yao's Protocol](https://www.youtube.com/watch?v=4jZcGqgZKY8&list=LL&index=54) 325 | 326 | ### Interactive Proofs based on VOLE 327 | 328 | - :scroll: [Introduction Vector Oblivious Linear Evaluation (Peter Scholl)](http://cyber.biu.ac.il/wp-content/uploads/2021/11/Vector_Oblivious_Linear_Evaluation-1.pdf) 329 | - :scroll: [Wolverine: Fast, Scalable, and Communication-Efficient Zero-Knowledge Proofs for Boolean and Arithmetic Circuits](https://eprint.iacr.org/2020/925.pdf) 330 | - :scroll: [Mac'N'Cheese Carsten Baum](https://eprint.iacr.org/2020/1410.pdf) 331 | - :scroll: [QuickSilver Kang Yang](https://eprint.iacr.org/2021/076.pdf?ref=https://githubhelp.com) 332 | - :scroll: [AntMan: Interactive Zero-Knowledge Proofs with Sublinear Communication*](https://eprint.iacr.org/2022/566.pdf) 333 | 334 | ### zk Virtual Machines 335 | 336 | ## Decentralized Finance 337 | 338 | - :video_camera: [Decentralized Finance Lecture (Arthur Gervais)](https://www.youtube.com/watch?v=wlVFc7JklPY&list=PLOa3v6xgsJullbz4uD13nm-U5D_cw0xLh) 339 | - :video_camera: [Decentralized Finance MOOC (Berkeley)](https://www.youtube.com/watch?v=gX3mc83CJtQ&list=PLS01nW3RtgopJOtsMVOK3N7n7qyNMPbJ_) 340 | 341 | ### Smart Contract Security 342 | 343 | - [tbDEX: A Liquidity Protocol v0.1](https://tbdex.io/whitepaper.pdf) 344 | - [The Ring of Gyges: Investigating the Future of Criminal Smart Contracts](https://dl.acm.org/doi/pdf/10.1145/2976749.2978362) 345 | - [Marvel DC: A Blockchain-Based Decentralized and Incentive-Compatible Distributed Computing Protocol](https://arxiv.org/pdf/2207.14011.pdf) 346 | - [Towards Efficient Data Valuation Based on the Shapley Value](http://proceedings.mlr.press/v89/jia19a/jia19a.pdf) 347 | - [AuthSC: Mind the Gap between Web and Smart Contracts](https://arxiv.org/pdf/2004.14033.pdf) 348 | 349 | ### Arbitrage 350 | 351 | - :scroll: [On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols](https://arxiv.org/pdf/2103.02228.pdf) 352 | 353 | ### Confidential UTXO and Mixers 354 | 355 | - :scroll: [Quisquis: A New Design for Anonymous Cryptocurrencies](https://discovery.ucl.ac.uk/id/eprint/10090371/1/asiacrypt-main.pdf) 356 | 357 | ## Decentralized Key Management 358 | 359 | - :scroll: [NuCypher KMS: Decentralized key management system](https://arxiv.org/pdf/1707.06140.pdf) 360 | 361 | ### Wallets 362 | 363 | - :scroll: [A Formal Treatment of Hardware Wallets](https://eprint.iacr.org/2019/034.pdf) 364 | - :scroll: [On the Usability of Authenticity Checks for Hardware Security Tokens](https://www.usenix.org/system/files/sec21-pfeffer.pdf) 365 | - :scroll: [What’s in Your Wallet? Privacy and Security Issues in Web 3.0](https://arxiv.org/pdf/2109.06836.pdf) 366 | 367 | ## Decentralized Identity 368 | 369 | - :bomb: [Kantara Identity](https://kantara.atlassian.net/wiki/spaces/GI/overview) 370 | - :bomb: [Blockchain and Identity](https://github.com/peacekeeper/blockchain-identity) 371 | - :green_book: [Where to use a blockchain in non-financial applications?](https://vitalik.ca/general/2022/06/12/nonfin.html) 372 | - :green_book: [iden3 Blog](https://blog.iden3.io/) 373 | - :green_book: [Anonymous Credential Part 2: Selective Disclosure and CL Signature](https://medium.com/finema/anonymous-credential-part-2-selective-disclosure-and-cl-signature-b904a93a1565) 374 | - :green_book: [The BBS Signature Scheme](https://identity.foundation/bbs-signature/draft-looker-cfrg-bbs-signatures.html) 375 | - :green_book: [tutorial anoncreds](https://docknetwork.github.io/sdk/tutorials/tutorial_anoncreds.html) 376 | - :green_book: [Zero Knowledge in DiDs and Social Networks](https://mirror.xyz/0xd8159c4DD43FEe99FA86D0BAaCA7a9cC33334864/NzuSXZ5rlgKMrdI6CdplM-03RHia6-k0ei67h3rPp-Y) 377 | 378 | ### Group Signatures 379 | 380 | - [Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes](https://link.springer.com/content/pdf/10.1007/3-540-44448-3_25.pdf) 381 | - [Group Signatures: Authentication with Privacy](https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/GruPA/GruPA.pdf?__blob=publicationFile) 382 | 383 | ### Credential Systems 384 | Todo: separate into on-chain and off-chain credential systems. 385 | 386 | - :scroll: [Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies](https://bford.info/pub/dec/pop.pdf) 387 | - :scroll: [Decentralized Trust Management](https://www.ieee-security.org/TC/SP2020/tot-papers/blaze-1996.pdf) 388 | - :scroll: [NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging](https://hal.inria.fr/hal-01673292/file/ares2017.pdf) 389 | - :scroll: [Compact Certificates of Collective Knowledge](http://people.csail.mit.edu/nickolai/papers/micali-compactcert.pdf) 390 | - :file_folder: [CA Authorization Smart Contract Architecture](https://files.slack.com/files-pri/T02467QPZ5G-F03BK93D59T/image.png) 391 | - :scroll: [On Enforcing the Digital Immunity of a Large Humanitarian Organization](https://discovery.ucl.ac.uk/id/eprint/10116630/1/Jovanovic_digital-immunity.pdf) 392 | - :scroll: [Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology](https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.154.421&rep=rep1&type=pdf) 393 | - :scroll: [Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance](https://eprint.iacr.org/2022/011.pdf) 394 | - :scroll: [Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies](https://arxiv.org/pdf/1905.09093.pdf) 395 | - :scroll: [Towards Self-sovereign, Decentralized Personal Data Sharing and Identity Management](https://mediatum.ub.tum.de/doc/1545514/1545514.pdf) 396 | - :scroll: [Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts](https://arxiv.org/pdf/1908.02443.pdf%20) 397 | - :scroll: [Anonymous Credentials Light](https://cs.brown.edu/people/fbaldimt/papers/CCS13.pdf) 398 | - :scroll: [SCPKI: A Smart Contract-based PKI and Identity System](http://library.usc.edu.ph/ACM/SIGSAC%202017/bcc/p35.pdf) 399 | - :scroll: [Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation](http://www.contrib.andrew.cmu.edu/~bparno/papers/cinderella.pdf) 400 | - :scroll: [With a Little Help from My Friends: Constructing Practical Anonymous Credentials](https://eprint.iacr.org/2021/1419.pdf) 401 | - :scroll: [Towards Smart Contract-based Verification of Anonymous Credentials](https://eprint.iacr.org/2022/492.pdf) 402 | - :scroll: [Exploring Web3 From the View of Blockchain](https://arxiv.org/pdf/2206.08821.pdf) 403 | - :scroll: [zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure](https://eprint.iacr.org/2022/878.pdf) 404 | - :scroll: [Decentralized Anonymous Credentials](https://eprint.iacr.org/2013/622.pdf) 405 | - :scroll: [A note on anonymous credentials using BLS signatures](https://arxiv.org/pdf/2006.05201.pdf) 406 | - :scroll: [Zero-knowledge credentials with deferred revocation checks](https://github.com/decentralized-identity/snark-credentials/blob/master/whitepaper.pdf) 407 | - :scroll: [Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers](https://arxiv.org/pdf/1802.07344.pdf) 408 | - :scroll: [Anonymous credentials 2.0](https://wiki.hyperledger.org/download/attachments/6426712/Anoncreds2.1.pdf) 409 | - :scroll: [An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation](https://link.springer.com/content/pdf/10.1007/3-540-44987-6_7.pdf) 410 | - :scroll: [A Truly Self-Sovereign Identity System](https://arxiv.org/pdf/2007.00415.pdf) 411 | - :scroll: [SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization](https://eprint.iacr.org/2019/1270.pdf) 412 | - :scroll: [ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi](https://eprint.iacr.org/2022/1286.pdf) 413 | 414 | ### Distributed Trust 415 | Reputation and recommendation-based trust systems connected to blockchain verification. 416 | 417 | - :scroll: [Portal: Time-Bound and Replay-Resistant Zero-Knowledge Proofs for Single Sign-On](https://tum-esi.github.io/publications-list/PDF/2024-ZKDAPPS-Portal.pdf) 418 | - :scroll: [Privacy-Preserving Reputation Systems based on Blockchain and other Cryptographic Building Blocks: A Survey](https://perso.liris.cnrs.fr/omar.hasan/publications/hasan_2021_acm.pdf) 419 | - :scroll: [A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation](https://ieeexplore.ieee.org/abstract/document/8029549/) 420 | - :scroll: [Reflections on trusting distributed trust](https://arxiv.org/pdf/2210.08127.pdf) 421 | 422 | ### Decentralized Oracles 423 | 424 | - :scroll: [Janus: Fast Privacy-Preserving Data Provenance For TLS](https://eprint.iacr.org/2023/1377.pdf) 425 | - :scroll: [ORIGO: Proving Provenance of Sensitive Data with Constant Communication](https://eprint.iacr.org/2024/447.pdf) 426 | - :scroll: [Zero-Knowledge Middleboxes](https://www.usenix.org/system/files/sec22-grubbs.pdf) 427 | - :scroll: [Zombie: Middleboxes that Don’t Snoop](https://www.usenix.org/system/files/nsdi24-zhang-collin.pdf) 428 | - :scroll: [Proxying is Enough: Security of Proxying in TLS Oracles and AEAD Context Unforgeability](https://eprint.iacr.org/2024/733.pdf) 429 | - :scroll: [Blind Certificate Authorities](https://par.nsf.gov/servlets/purl/10163755) 430 | - :scroll: [Chainlink 2.0: Next Steps in the Evolution of Decentralized Oracle Networks](https://research.chain.link/whitepaper-v2.pdf) 431 | - :scroll: [Chainlink Off-chain Reporting Protocol](https://research.chain.link/ocr.pdf) 432 | - :scroll: [Town Crier: An Authenticated Data Feed for Smart Contracts](https://dl.acm.org/doi/pdf/10.1145/2976749.2978326) 433 | - :scroll: [DECO: Liberating Web Data Using Decentralized Oracles for TLS](https://dl.acm.org/doi/pdf/10.1145/3372297.3417239) 434 | - :scroll: [PECO: methods to enhance the privacy of DECO protocol](https://eprint.iacr.org/2022/1774.pdf) 435 | - :scroll: [Practical Decentralized Oracle Contracts for Cryptocurrencies](https://eprint.iacr.org/2022/499.pdf) 436 | - :scroll: [Discreet Log Contracts](https://adiabat.github.io/dlc.pdf) 437 | - :video_camera: [Youtube: Fan Zhang- "Connection Blockchains to the Real World"](https://www.youtube.com/watch?v=LWphxmUWXG0) 438 | - :green_book: [How DECO Enables Undercollateralized DeFi Lending: A Proof of Concept With Teller](https://blog.chain.link/undercollateralized-lending-teller-deco-poc/) 439 | 440 | ## Side Chain Committees 441 | 442 | - :green_book: [HoneyBadgerSwap: Making MPC as a Sidechain](https://medium.com/initc3org/honeybadgerswap-making-mpc-as-a-sidechain-364bebdb10a5) 443 | 444 | ### Cryptoeconomic Security 445 | 446 | - :scroll: [Cryptoeconomic Security for Data Availability Committees](https://arxiv.org/pdf/2208.02999.pdf) 447 | - :scroll: [Balance: Dynamic Adjustment of Cryptocurrency Deposits](https://dl.acm.org/doi/pdf/10.1145/3319535.3354221) 448 | 449 | ## Decentralized Data Management 450 | 451 | - :green_book: [IPFS: Blog, news & more](https://blog.ipfs.tech/) 452 | 453 | ### Access Control 454 | 455 | - :scroll: [CALYPSO: Private Data Management for Decentralized Ledgers](https://eprint.iacr.org/2018/209.pdf) 456 | - :scroll: [Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams](https://www.usenix.org/system/files/sec20-shafagh.pdf) 457 | - :scroll: [Witness Encryption and its Applications](https://eprint.iacr.org/2013/258.pdf) 458 | - :scroll: [LedgerView: Access-Control Views on Hyperledger Fabric](https://www.comp.nus.edu.sg/~ooibc/BlockchainView.pdf) 459 | - :scroll: [WAVE: A Decentralized Authorization Framework with Transitive Delegation](https://www.usenix.org/system/files/sec19-andersen.pdf) 460 | - :scroll: [Decentralizing Privacy: Using Blockchain to Protect Personal Data](http://homepage.cs.uiowa.edu/~ghosh/blockchain.pdf) 461 | - :scroll: [Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives](https://ieeexplore.ieee.org/abstract/document/7966965) 462 | - :scroll: [Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials](https://link.springer.com/content/pdf/10.1007/978-3-642-00468-1_28.pdf) 463 | - :scroll: [A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs](https://eprint.iacr.org/2019/589.pdf) 464 | - :scroll: [Abuse Resistant Law Enforcement Access Systems](https://eprint.iacr.org/2021/321.pdf) 465 | - :scroll: [TimeCrypt: Encrypted Data Stream Processing at Scale with Cryptographic Access Control](https://www.usenix.org/system/files/nsdi20-paper-burkhalter.pdf) 466 | - :scroll: [Interactive Authentication](https://eprint.iacr.org/2022/1682.pdf) 467 | 468 | ### Data Sharing 469 | 470 | - :scroll: [Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust](https://www.usenix.org/system/files/nsdi20-paper-hu-yuncong.pdf) 471 | - :scroll: [OblivP2P: An Oblivious Peer-to-Peer Content Sharing System](https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_jia.pdf) 472 | - :scroll: [Building a Secure Data Market on Blockchain](https://www.usenix.org/conference/enigma2019/presentation/song), [Youtube](https://www.youtube.com/watch?v=xF50qCIYwpQ) 473 | - :scroll: [Zeph: Cryptographic Enforcement of End-to-End Data Privacy](https://www.usenix.org/system/files/osdi21-burkhalter.pdf) 474 | - :scroll: [A Demonstration of Sterling: A Privacy-Preserving Data Marketplace](https://www.raymondcheng.net/download/papers/sterling-vldb.pdf) 475 | - :scroll: [Towards Building a Responsible Data Economy (Dawn Song, UC Berkeley)](https://speakerdeck.com/anyscale/towards-building-a-responsible-data-economy-dawn-song-uc-berkeley?slide=53), [Youtube](https://www.youtube.com/watch?v=nBzufVswN1g) 476 | - :scroll: [Federated Authorization over Access to Personal Data for Decentralized Identity Management](https://hardjono.mit.edu/sites/default/files/documents/DecentralizedIDmgmt-IEEE-Comms-2019.pdf) 477 | - :scroll: [FileBounty: Fair Data Exchange](https://arxiv.org/pdf/2008.11362.pdf) 478 | - :scroll: [Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection](https://www.usenix.org/legacy/events/hotos11/tech/final_files/ManiatisAkhawe.pdf) 479 | - :scroll: [Towards Blockchain-based Auditable Storage and Sharing of IoT Data](https://arxiv.org/pdf/1705.08230.pdf) 480 | - :scroll: [Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains](https://eprint.iacr.org/2021/1612.pdf) 481 | - :scroll: [NFTs for Art and Collectables: Primer and Outlook](https://files.osf.io/v1/resources/gwzd7/providers/osfstorage/628cfa67be4dfd076a66dcb8?action=download&direct&version=1) 482 | 483 | ### Storage 484 | 485 | - :scroll: [IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3)](https://arxiv.org/pdf/1407.3561.pdf) 486 | - :scroll: [Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks](https://arxiv.org/pdf/2001.04526.pdf) 487 | - :scroll: [Secure Untrusted Data Repository (SUNDR)](https://www.usenix.org/legacy/event/osdi04/tech/full_papers/li_j/li_j.pdf) 488 | - :scroll: [DORY: An Encrypted Search System with Distributed Trust](https://www.usenix.org/system/files/osdi20-dauterman_dory.pdf) 489 | - :scroll: [Verifiable Set Operations over Outsourced Databases](https://link.springer.com/content/pdf/10.1007/978-3-642-54631-0_7.pdf) 490 | - :scroll: [When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach](http://www.comp.hkbu.edu.hk/~xujl/Papers/sigmod18_auth.pdf) 491 | - :scroll: [vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases](https://eprint.iacr.org/2017/1145.pdf) 492 | 493 | ### Secret Management 494 | 495 | - :scroll: [Can a Public Blockchain Keep a Secret?](https://eprint.iacr.org/2020/464.pdf) 496 | - :scroll: [CHURP: Dynamic-Committee Proactive Secret Sharing](https://dl.acm.org/doi/pdf/10.1145/3319535.3363203) 497 | - :scroll: [Storing and Retrieving Secrets on a Blockchain](https://eprint.iacr.org/2020/504.pdf) 498 | - :scroll: [Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties](https://eprint.iacr.org/2021/1397.pdf) 499 | - :scroll: [Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices](https://eprint.iacr.org/2019/1328.pdf) 500 | - :scroll: [Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications](https://eprint.iacr.org/2022/971.pdf) 501 | - :scroll: [COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services](http://www.di.fc.ul.pt/~blferreira/papers/COBRA.pdf) 502 | - :scroll: [Smart Contract With Secret Parameters](https://infoscience.epfl.ch/record/277810) 503 | 504 | ### Privacy 505 | The privacy tropic in the context of decentralized data management incorporates (i) asset attestation, delegation, transfer, etc. (ii) private information retrieval, (iii) oblivious random access machines (ORAMs), and (iv) confidential access control policies. 506 | 507 | - :scroll: (i) [Espresso CAP Specification: Configurable Asset Privacy](https://raw.githubusercontent.com/EspressoSystems/cap/main/cap-specification.pdf) 508 | - :scroll: (i) [Decentralized Cross-Blockchain Asset Transfers](https://arxiv.org/pdf/2004.10488.pdf) 509 | - :scroll: (ii) [Heterogeneous Private Information Retrieval](https://par.nsf.gov/servlets/purl/10183612) 510 | - :scroll: (ii) [Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach](https://arxiv.org/pdf/1605.07956.pdf) 511 | - :scroll: (iii) [MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework](https://par.nsf.gov/servlets/purl/10205591) 512 | - :scroll: (iii) [A Tale of Two Trees: One Writes, and Other Reads](https://par.nsf.gov/servlets/purl/10200542) 513 | - :scroll: (iv) [Ciphertext policy Attribute based Encryption with anonymous access policy](https://arxiv.org/pdf/1011.0527.pdf) 514 | 515 | ## Secure Computation 516 | 517 | - :green_book: [Secure computation: Homomorphic encryption or hardware enclaves?](https://medium.com/mc2-project/secure-computation-homomorphic-encryption-or-hardware-enclaves-83da90102593) 518 | 519 | ### Multi Party Computation 520 | 521 | - :video_camera: [MPC-Mike Rosulek-Lecture 3: Oblivious Transfer and Extension](https://www.youtube.com/watch?v=l6EcGZYkTug&list=LL&index=53) 522 | - :bomb: [A curated list of multi party computation resources and links.](https://github.com/rdragos/awesome-mpc) 523 | - :scroll: [MP-SPDZ: A Versatile Framework for Multi-Party Computation](https://eprint.iacr.org/2020/521.pdf) 524 | - :scroll: [Faster Secure Two-Party Computation in the Single-Execution Setting](https://eprint.iacr.org/2016/762.pdf) 525 | - :scroll: [Computing on Encrypted Data](https://homes.esat.kuleuven.be/~nsmart/FHE-MPC/Yao.pdf) 526 | - :scroll: [Publicly Auditable MPC-as-a-Service with succinct verification and universal setup](https://arxiv.org/pdf/2107.04248.pdf) 527 | - :scroll: [Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant](https://eprint.iacr.org/2022/421.pdf) 528 | - :scroll: [Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability](https://eprint.iacr.org/2020/767.pdf) 529 | - :scroll: [MPC-TP: Fully Linear PCPs and their Cryptographic Applications - Niv Gilboa](https://www.youtube.com/watch?v=ognJEChMyrk) 530 | - :scroll: [Founding Secure Computation on Blockchains](https://eprint.iacr.org/2019/253.pdf) 531 | - :scroll: [YOSO: You Only Speak Once Secure MPC with Stateless Ephemeral Roles](https://eprint.iacr.org/2021/210.pdf) 532 | 533 | ### Homomorphic Encryption 534 | 535 | - :video_camera: [Paillier homomorphic encryption and a share conversion protocol - Federico Mazzone](https://www.youtube.com/watch?v=bOOesu7O1f8&list=LL&index=52) 536 | - :scroll:[Efficient Threshold FHE with Application to Real-Time Systems](https://eprint.iacr.org/2022/1625.pdf) 537 | 538 | ### Trusted Execution Environments 539 | 540 | ## Privacy-preserving Computation 541 | 542 | ### Differential Privacy 543 | 544 | - [CHORUS: a Programming Framework for Building Scalable Differential Privacy Mechanisms](https://arxiv.org/pdf/1809.07750.pdf) 545 | - [Non-Interactive Differentially Anonymous Router](https://eprint.iacr.org/2021/1242.pdf) 546 | - [Differential Privacy for Directional Data](https://dl.acm.org/doi/pdf/10.1145/3460120.3484734) 547 | - [GUPT: Privacy Preserving Data Analysis Made Easy](http://www.elaineshi.com/docs/gupt.pdf) 548 | - [The Algorithmic Foundations of Differential Privacy](https://www.tau.ac.il/~saharon/BigData2018/privacybook.pdf) 549 | - [The Composition Theorem for Differential Privacy](http://proceedings.mlr.press/v37/kairouz15.pdf) 550 | - [Prio: Private, Robust, and Scalable Computation of Aggregate Statistics](https://www.usenix.org/system/files/conference/nsdi17/nsdi17-corrigan-gibbs.pdf) 551 | - [Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares](https://eprint.iacr.org/2021/576.pdf) 552 | - [Lightweight techniques for private heavy hitters](https://eprint.iacr.org/2021/017.pdf) 553 | - [Some Remarks and Ideas About Monetization of Sensitive Data](https://link-springer-com.eaccess.ub.tum.de/content/pdf/10.1007/978-3-319-29883-2.pdf#cite.Emiliano) 554 | - [On the Tradeoff Between Privacy and Utility in Data Publishing](https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.159.1900&rep=rep1&type=pdf) 555 | - [Empirical privacy and empirical utility of anonymized data](http://archive.dimacs.rutgers.edu/~graham/pubs/papers/empiricalpriv.pdf) 556 | - [Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure](https://arxiv.org/pdf/1801.02505.pdf) 557 | - [Secure Multi-party Differential Privacy](https://proceedings.neurips.cc/paper/2015/file/a01610228fe998f515a72dd730294d87-Paper.pdf) 558 | - [Secure Multiparty Computation for Privacy-Preserving Data Mining](https://journalprivacyconfidentiality.org/index.php/jpc/article/download/566/549/) 559 | - [Differential Privacy Under Fire](https://www.usenix.org/legacy/events/sec11/tech/full_papers/Haeberlen.pdf) 560 | - [Private Record Matching Using Differential Privacy](https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.1068.6437&rep=rep1&type=pdf) 561 | - [Detecting Violations of Differential Privacy](https://dl.acm.org/doi/pdf/10.1145/3243734.3243818) 562 | - [Verifiable Differential Privacy](https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.726.795&rep=rep1&type=pdf) 563 | - [DPGen: Automated Program Synthesis for Differential Privacy](https://arxiv.org/pdf/2109.07441.pdf) 564 | - [LightDP: Towards Automating Differential Privacy Proofs](https://arxiv.org/pdf/1607.08228.pdf) 565 | - [εktelo: A Framework for Defining Differentially-Private Computations](https://dl.acm.org/doi/pdf/10.1145/3183713.3196921) 566 | - [Approximate Span Liftings](https://arxiv.org/pdf/1710.09010.pdf) 567 | - [Differentially Private Bayesian Programming](https://dl.acm.org/doi/pdf/10.1145/2976749.2978371) 568 | 569 | ### Data Lineage 570 | 571 | - [SAC: A System for Big Data Lineage Tracking](http://merlintang.github.io/paper/sac_icde.pdf) 572 | - [Capturing and Querying Fine-grained Provenance of Preprocessing Pipelines in Data Science](https://eprints.soton.ac.uk/449939/1/ChapmanVLDB2021.pdf) 573 | - [Data quality: “Garbage in – garbage out”](https://journals.sagepub.com/doi/pdf/10.1177/1833358318774357) 574 | 575 | ## Decentralized Computation 576 | 577 | - :green_book: [Navigating Privacy on Public Blockchains](https://wdai.us/posts/navigating-privacy/) 578 | 579 | ### Blockchain-coordinated Computation 580 | Todo: Separate blockchain coordinated computation into off-chain computation and smart contract execution. 581 | 582 | #### On-chain Computation 583 | - :scroll: [On-Chain Fully Homomorphic Encryption: smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption](https://eprint.iacr.org/2021/133.pdf) 584 | - :scroll: [zkay: Specifying and Enforcing Data Privacy in Smart Contracts](https://thanghoang.github.io/teaching/sp21/cs5594/files/paper/zkay.pdf) 585 | - :scroll: [Zapper: Smart Contracts with Data and Identity Privacy](https://files.sri.inf.ethz.ch/website/papers/ccs22-zapper.pdf) 586 | 587 | #### Off-chain Computation 588 | - :scroll: [VERI-ZEXE: Decentralized Private Computation with Universal Setup](https://eprint.iacr.org/2022/802.pdf) 589 | - :scroll: [Zexe: Enabling Decentralized Private Computation](https://eprint.iacr.org/2018/962.pdf) 590 | - :video_camera: [Zexe Youtube](https://www.youtube.com/watch?v=aqkzV81sLmQ&t=5s) 591 | - :scroll: [BUILDING PRACTICAL SYSTEMS THAT COMPUTE ON ENCRYPTED DATA](https://people.eecs.berkeley.edu/~raluca/Thesis.pdf) 592 | - :scroll: [Arbitrum: Scalable, private smart contracts](https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-kalodner.pdf) 593 | - :scroll: [CLOAK: Enabling Confidential Smart Contract with Multi-party Transactions](https://arxiv.org/pdf/2106.13926.pdf) 594 | - :scroll: [Scalable and Privacy-preserving Off-chain Computations](https://www.depositonce.tu-berlin.de/bitstream/11303/13087/4/eberhardt_jacob.pdf) 595 | 596 | #### Hybrid Computation 597 | - :scroll: [Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts](https://eprint.iacr.org/2015/675.pdf) 598 | - :scroll: [HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication](https://dl.acm.org/doi/pdf/10.1145/3319535.3354238) 599 | - :scroll: [Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts](https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8806762) 600 | - :scroll: [Enigma: Decentralized Computation Platform with Guaranteed Privacy](https://arxiv.org/pdf/1506.03471.pdf) 601 | - :scroll: [Decentralized Privacy-preserving Timed Execution in Blockchain-based Smart Contract Platforms](https://arxiv.org/pdf/1902.05613.pdf) 602 | - :scroll: [ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts](https://dl.acm.org/doi/pdf/10.1145/3372297.3417243) 603 | - :scroll: [Piranha: A GPU Platform for Secure Computation](https://eprint.iacr.org/2022/892.pdf) 604 | - :scroll: [Pesca: A Privacy-Enhancing Smart-Contract Architecture](https://wdai.us/files/2022/PESCA.pdf) 605 | - :scroll: [Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance](https://eprint.iacr.org/2021/1249.pdf) 606 | - :scroll: [Auditable, Available and Resilient Private Computation on the Blockchain via MPC](https://eprint.iacr.org/2022/398.pdf) 607 | - :scroll: [Cerebro: A Platform for Multi-Party Cryptographic Collaborative Learning](https://www.usenix.org/system/files/sec21-zheng.pdf) 608 | - :scroll: [A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract](https://drops.dagstuhl.de/opus/volltexte/2020/13418/pdf/OASIcs-FMBC-2020-5.pdf) 609 | 610 | ### Policy-compliant Computation 611 | 612 | - [Blockchain Enabled Privacy Audit Logs](https://www.researchgate.net/profile/Reza-Samavi/publication/320203888_Blockchain_Enabled_Privacy_Audit_Logs/links/5a8f271d0f7e9ba42969773b/Blockchain-Enabled-Privacy-Audit-Logs.pdf) 613 | - [Blockchain Enabled Privacy Audit Logs](https://link.springer.com/chapter/10.1007/978-3-319-68288-4_38) 614 | - [PRIVGUARD: Privacy Regulation Compliance Made Easier](https://www.usenix.org/system/files/sec22summer_wang-lun.pdf) 615 | - [LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness](https://eprint.iacr.org/2019/178.pdf) 616 | 617 | ### Policy Transpilers 618 | 619 | - :scroll: [zkGen: Policy-to-Circuit Transpiler](https://tum-esi.github.io/publications-list/PDF/2024-ICBC-zkGen.pdf) 620 | 621 | #### User Centricity and Data Sovereignty 622 | 623 | - [User Centricity: A Taxonomy and Open Issues](https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.466.343&rep=rep1&type=pdf) 624 | - [Dawn Song (Berkeley)- "Data Sovereignty and Decentralized Data Science"](https://www.youtube.com/watch?v=g8pk89kc940) 625 | - [User-Managed Access to Web Resources](https://eprints.ncl.ac.uk/file_store/production/161154/15A97BD1-4A42-49DF-A5F3-3D3DC9CC8730.pdf) 626 | - [Federated Authorization over Access to Personal Data for Decentralized Identity Management](https://hardjono.mit.edu/sites/default/files/documents/DecentralizedIDmgmt-IEEE-Comms-2019.pdf) 627 | - [Bringing Privacy Control back to Citizens](https://www.ipvs.uni-stuttgart.de/departments/as/publications/stachch/sac_20_dispel.pdf) 628 | - [Metaverse for Social Good: A University Campus Prototype](https://arxiv.org/pdf/2108.08985.pdf) 629 | - [Personal Data: The Emergence of a New Asset Class](https://www3.weforum.org/docs/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf) 630 | - [Property Rights By Armen A. Alchian](https://www.econlib.org/library/Enc/PropertyRights.html) 631 | - [User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection](https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=8436400) 632 | - [Decentralized Society: Finding Web3’s Soul](https://wrenchinthegears.com/wp-content/uploads/2022/05/Vitalek-Buterin-Soulbound-Token-Paper-May-2022.pdf) 633 | - [Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services](https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final22.pdf) 634 | - [PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution](https://arxiv.org/pdf/1904.07275.pdf) 635 | - [Towards Contractual Agreements for Revocation of Online Data](http://poepper.net/papers/revocation-contracts2019.pdf) 636 | 637 | ## Systematizations of Knowledge 638 | 639 | - :scroll: [SoK: Off The Chain Transactions](https://nms.kcl.ac.uk/patrick.mccorry/SoKoffchain.pdf) 640 | - :scroll: [Formalizing Anonymous Blacklisting Systems](https://oaklandsok.github.io/papers/henry2011.pdf) 641 | - :scroll: [SoK: Privacy-Preserving Computing in the Blockchain Era](https://eprint.iacr.org/2021/727.pdf) 642 | - :scroll: [SoK: A Taxonomy of Cryptocurrency Wallets](https://eprint.iacr.org/2020/868.pdf) 643 | - :scroll: [SoK: Off The Chain Transactions](https://nms.kcl.ac.uk/patrick.mccorry/SoKoffchain.pdf) 644 | - :scroll: [SoK: Certified Robustness for Deep Neural Networks](https://sokcertifiedrobustness.github.io/) 645 | - :scroll: [SoK: Computer-Aided Cryptography](https://oaklandsok.github.io/papers/barbosa2021.pdf) 646 | - :scroll: [SoK: Blockchain Light Clients](https://eprint.iacr.org/2021/1657.pdf) 647 | - :scroll: [SoK: General Purpose Compilers for Secure Multi-Party Computation](https://www.cis.upenn.edu/~stevez/papers/HHNZ19.pdf) 648 | - :scroll: [SoK: TEE-assisted Confidential Smart Contract](https://arxiv.org/pdf/2203.08548.pdf) 649 | - :scroll: [SoK: Differential Privacy as a Causal Property](https://oaklandsok.github.io/papers/tschantz2020.pdf) 650 | - :scroll: [SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies](https://oaklandsok.github.io/papers/bonneau2015.pdf) 651 | - :scroll: [SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust](https://oaklandsok.github.io/papers/chuat2020.pdf) 652 | - :scroll: [SoK: Oracles from the Ground Truth to Market Manipulation](https://arxiv.org/pdf/2106.00667.pdf) 653 | - :scroll: [SoK: Benchmarking Flaws in Systems Security](https://arxiv.org/pdf/1801.02381.pdf) 654 | - :scroll: [SoK: Communication Across Distributed Ledgers](https://allquantor.at/blockchainbib/pdf/zamyatin2019sok.pdf) 655 | 656 | ## Application Development 657 | 658 | - :file_folder: [roadmap.sh](https://roadmap.sh/) 659 | - :file_folder: [A collection of (mostly) technical things every software developer should know about](https://github.com/mtdvio/every-programmer-should-know) 660 | 661 | ### Decentralized Programming 662 | 663 | - :file_folder: [CoLink: Decentralized Programming](https://co-learn.notion.site/co-learn/Welcome-to-CoLink-5bf0c431201441e68cba07a5f7101728) 664 | 665 | ### Smart Contracts 666 | 667 | - :school: [openzeppelin-contracts: OpenZeppelin Contracts is a library for secure smart contract development.](https://github.com/OpenZeppelin/openzeppelin-contracts) 668 | - :file_folder: [How To Use AccessControl.sol](https://medium.com/coinmonks/how-to-use-accesscontrol-sol-9ea3a57f4b15) 669 | - :file_folder: [Role Based Access Control for the Ethereum Blockchain](https://hackernoon.com/role-based-access-control-for-the-ethereum-blockchain-bcc9dfbcfe5c) 670 | - :school: [Creating Zero knowledge Proofs with ZoKrates](https://www.youtube.com/watch?v=_ZvGZxhCFfE) 671 | - :school: [Ethereum Contract Development with Go](https://github.com/miguelmota/ethereum-development-with-go-book) 672 | - :green_book: [How To Script An Automatic Token Airdrop for 40k subscribers](https://medium.com/hackernoon/how-to-script-an-automatic-token-airdrop-for-40k-subscribers-e40c8b1a02c6) 673 | 674 | ### Layer 2 and Bridges 675 | 676 | - :green_book: [Fantastic Zero-Knowledge Proofs](https://medium.com/@outsideranalytics/fantastic-zero-knowledge-proofs-ef4bb746f838) 677 | - :green_book: [Scaling Relic Protocol with zk-SNARKs](https://relicprotocol.medium.com/scaling-relic-protocol-with-zk-snarks-7c5c319c8e9f) 678 | - :school: [Arbitrum: The most secure L2](https://bridge.arbitrum.io/) 679 | - :school: [Arbitrum Developer Quickstart](https://developer.offchainlabs.com/docs/developer_quickstart) 680 | 681 | ### Oracles 682 | 683 | - :school: [libocr consists of a Go library and a set of Solidity smart contracts that implement the Chainlink Offchain Reporting Protocol](https://github.com/smartcontractkit/libocr) 684 | - :file_folder: [This demonstrates how a smart contract on NEAR can access off-chain data via Chainlink's oracle solution.](https://github.com/near-examples/chainlink-demo) 685 | 686 | ### Web 3.0 Identity 687 | 688 | - :file_folder: [Sign-In with Ethereum](https://docs.login.xyz/) 689 | - :school: [ethr-did-resolver: DID resolver for Ethereum Addresses with support for key management](https://github.com/decentralized-identity/ethr-did-resolver) 690 | - :school: [Golang SSI Framework](https://github.com/TBD54566975/ssi-sdk) 691 | - :file_folder: [NFT3 | The First Unified Virtual Identity Network for Web3](https://www.nft3.com/) 692 | - :file_folder: [The essential web3 toolkit for sharing and funding anything.](https://mirror.xyz/) 693 | - :file_folder: [Identity protocol for open applications](https://idx.xyz/) 694 | - :file_folder: [Polygon DID Implementation](https://docs.polygon.technology/docs/develop/did-implementation/getting-started/) 695 | - :file_folder: [Introducing Polygon ID, Zero-Knowledge Identity for Web3](https://blog.polygon.technology/introducing-polygon-id-zero-knowledge-own-your-identity-for-web3/) 696 | - :file_folder: [Claim your passport](https://arcx.game/passport) 697 | - :file_folder: [decentralized-identity / snark-credentials](https://github.com/decentralized-identity/snark-credentials/blob/master/whitepaper.pdf) 698 | - :file_folder: [spruceID: Your Keys, Your Data](https://www.spruceid.com/), :school: [github](https://github.com/spruceid) 699 | - :file_folder: [iden3: Prove your access rights, not your identity](https://iden3.io/) 700 | - :school: [emmy: Library for zero-knowledge proof based applications (like anonymous credentials](https://github.com/xlab-si/emmy) 701 | 702 | ### Infrastructure 703 | This section is about running blockchain nodes and scaling of backend services. 704 | 705 | - :school: [Ranger - A Rust library for listening to P2P traffic without a full node](https://github.com/Rjected/ranger) 706 | - :school: [Go Ethereum Development](https://geth.ethereum.org/) 707 | - :school: [Learn Kubernetes](https://youtube.com/playlist?list=PL34sAs7_26wNBRWM6BDhnonoA5FMERax0) 708 | - :school: [Welcome to the IPFS docs](https://docs.ipfs.tech/) 709 | 710 | ### Backend 711 | 712 | - :school: [go ethereum client](https://goethereumbook.org/en/client-setup/) 713 | 714 | ### Frontend 715 | 716 | - :school: [ether.js: Complete Ethereum library and wallet implementation in JavaScript](https://github.com/ethers-io/ethers.js) 717 | - :school: [Explore the world’s leading design portfolios](https://dribbble.com/) 718 | 719 | ### Standardization 720 | 721 | - :file_folder: [Encrypted Data Vaults 0.1](https://digitalbazaar.github.io/encrypted-data-vaults/#why-do-we-need-encrypted-data-vaults) 722 | - :file_folder: [Decentralized Identifier Resolution (DID Resolution) v0.2](https://w3c-ccg.github.io/did-resolution/#resolver-architectures-proxied) 723 | - :file_folder: [A Primer for Decentralized Identifiers](https://w3c-ccg.github.io/did-primer/) 724 | - :file_folder: [Verifiable Credentials Data Model v1.1](https://www.w3.org/TR/vc-data-model/) 725 | - :file_folder: [3ID DID Method Specification](https://github.com/ceramicnetwork/CIP/blob/main/CIPs/CIP-79/CIP-79.md#example-2) 726 | - :school: [ERC1238: Non-transferrable Non-Fungible Tokens (NTT)](https://github.com/ethereum/EIPs/issues/1238) 727 | - :school: [EIP-721: Non-Fungible Token Standard](https://eips.ethereum.org/EIPS/eip-721) 728 | - :school: [ERC-725 - Ethereum Identity Standard](https://docs.ethhub.io/built-on-ethereum/identity/ERC725/) 729 | - :school: [ERC-735: Claim Holder #735](https://github.com/ethereum/eips/issues/735) 730 | - :school: [EIP-1155: Multi Token Standard](https://eips.ethereum.org/EIPS/eip-1155) 731 | - :school: [EIP-1462: Base Security Token](https://eips.ethereum.org/EIPS/eip-1462) 732 | - :school: [EIP-1056: Ethereum Lightweight Identity](https://eips.ethereum.org/EIPS/eip-1056) 733 | - :school: [Ethereum Improvement Proposals](https://eips.ethereum.org/all) 734 | - :file_folder: [Blockchain Identity](https://decentralized-id.com/blockchain/) 735 | 736 | ### Tooling 737 | 738 | - :school: [Regular Expressions 101](https://regex101.com/) 739 | - :school: [curl-to-Go](https://mholt.github.io/curl-to-go/) 740 | 741 | ### Cryptographic Libraries 742 | 743 | - :school: [RELIC](https://github.com/relic-toolkit/relic) 744 | - :school: [ark-crypto-primitives](https://github.com/arkworks-rs/crypto-primitives) 745 | 746 | ### Trusted Enclaves 747 | 748 | - :file_folder: [Keystone Enclave An Open-Source Secure Enclave for RISC-V](https://keystone-enclave.org/files/keystone-risc-v-summit.pdf) 749 | 750 | ### Zero Knowledge Proofs 751 | 752 | - :file_folder: [Starkware STARK 101](https://starkware.co/stark-101/) 753 | - :file_folder: [zkSync is a user-centric zk rollup platform from Matter Labs (opens new window). It is a scaling solution for Ethereum, already live on Ethereum mainnet.](https://docs.zksync.io/userdocs/) 754 | - :school: [zkSNARK implementation in JavaScript & WASM](https://github.com/iden3/snarkjs) 755 | - :school: [ZoKrates](https://zokrates.github.io/) 756 | - :school: [arkworks is a Rust ecosystem for zkSNARK programming](https://github.com/arkworks-rs) 757 | - :school: [gnark is a fast zk-SNARK library that offers a high-level API to design circuits](https://github.com/ConsenSys/gnark) 758 | - :school: [mimblewimble ](https://github.com/mimblewimble) 759 | - :school: [Go-snark-study](https://github.com/arnaucube/go-snark-study) 760 | - :green_book: [ZK from Scratch](https://asecuritysite.com/zero/#zero3) 761 | - :file_folder: [circom and snarkjs](https://cs251.stanford.edu/hw/proj4.pdf) 762 | - :school: [zkSnark circuit compiler](https://github.com/iden3/circom) 763 | - :school: [zkSNARK implementation in JavaScript & WASM](https://github.com/iden3/snarkjs) 764 | - :school: [Circom circuits used by the iden3 core protocol.](https://github.com/iden3/circuits) 765 | - :file_folder: [zkrp package](https://pkg.go.dev/github.com/0xdecaf/zkrp#section-readme) 766 | - :school: [Ethereum implementation of the Coconut smart contract library](https://github.com/musalbas/coconut-ethereum) 767 | - :school: [MerkleTree compatible with circomlib/sm](https://github.com/iden3/go-merkletree) 768 | - :video_camera: [IDEN3: Scalable distributed identity infrastructure using zero-knowledge proofs to guarantee privacy](https://www.youtube.com/watch?v=VFD2Z_mlSbM) 769 | - :file_folder: [Iden3 Documentation: Iden3 Docs](https://docs.iden3.io/) 770 | - :school: [Circom and SnarkJS](https://docs.iden3.io/circom-snarkjs/) 771 | - :file_folder: [zkDocs](https://github.com/a16z/zkdocs) 772 | - :green_book: [Create your first zero-knowledge snark circuit using circom and snarkjs](https://blog.iden3.io/first-zk-proof.html) 773 | - :green_book: [ZKP— PlonK Algorithm Introduction](https://trapdoortech.medium.com/zkp-plonk-algorithm-introduction-834556a32a) 774 | - :school: [Feta: Efficient Threshold Designated-Verifier Zero-Knowledge Proofs](https://github.com/KULeuven-COSIC/Feta) 775 | 776 | ### STARKs 777 | 778 | - :school: [Winterfell 🐺: A STARK prover and verifier for arbitrary computations](https://github.com/facebook/winterfell) 779 | - :school: [Caigo: Golang Library for StarkNet/Cairo](https://github.com/dontpanicdao/caigo) 780 | 781 | ### Multi Party Computation 782 | 783 | - :file_folder: [MPC-SoK Frameworks](https://github.com/MPC-SoK) 784 | - :school: [dpss python](https://github.com/tyurek/dpss) 785 | - :green_book: [Robust MPC-based confidentiality layer for blockchains](https://github.com/initc3/HoneyBadgerMPC) 786 | - :scroll: [Anonymous Zether: A private payment system for Ethereum-based blockchains, with no trusted setup.](https://github.com/ConsenSys/anonymous-zether) 787 | - :school: [emp-toolkit](https://github.com/emp-toolkit) 788 | - :file_folder: [ABY Developer Guide](https://www.informatik.tu-darmstadt.de/media/encrypto/encrypto_code/abydevguide.pdf) 789 | - :computer: [The Confidential Computing Platform for Collaborative Analytics and AI](https://opaque.co/) 790 | - :scroll: [Zether: Towards Privacy in a Smart Contract World](https://eprint.iacr.org/2019/191.pdf) 791 | - :school: [A collection of Bristol format circuit files](https://github.com/n-for-1-auth/circuits) 792 | - :file_folder: ['Bristol Fashion' MPC Circuits](https://homes.esat.kuleuven.be/~nsmart/MPC/) 793 | 794 | ## Programming 795 | 796 | - :bomb: [Practical Cryptography for Developers](https://cryptobook.nakov.com/) 797 | 798 | ### Golang 799 | 800 | - :books: [A Tour of Go - The Go Programming Language](https://go.dev/tour/welcome/1) 801 | 802 | ### Rust 803 | 804 | - :books: [Rust by Example](https://doc.rust-lang.org/rust-by-example/) 805 | - :books: [Rust Crypto Engineering Course](https://uncloak.org/courses/rust+cryptography+engineering/course-Rust+Cryptography+Engineering+Study+Group+Syllabus) 806 | - :books: [Rust Crypto Engineering Study Group](https://hackmd.io/@thor314/ryEWRY6Qs) 807 | - :video_camera: [Rust Crypto Engineering Study Group](https://drive.google.com/drive/folders/1506sz7G5o6ATeGObP1AEwMV4msaLK3HD) 808 | 809 | ### Solidity 810 | 811 | ## Research 812 | 813 | ### Paper Search 814 | 815 | - :bulb: [Explore connected papers in a visual graph](https://www.connectedpapers.com/) 816 | - :bulb: [researchrabbit ai](https://researchrabbitapp.com/) 817 | 818 | ### Education 819 | 820 | - :video_camera: [Blockchain Lecture (Arthur Gervais)](https://www.youtube.com/watch?v=wlVFc7JklPY&list=PLOa3v6xgsJullbz4uD13nm-U5D_cw0xLh) 821 | - :file_folder: [Asecuritysite.com](https://asecuritysite.com/) 822 | - :books: [Mhadi Zamani: Resources](http://mahdiz.com/resources.html) 823 | - :books: [Mhadi Zamani: Crypto](http://mahdiz.com/crypto/) 824 | - :books: [Decentralized Systems Lab](https://decentralize.ece.illinois.edu/) 825 | - :books: [CS294/194-196: Special Topics on Science and Technology of Decentralization and Decentralized Intelligence](https://berkeley-desys.github.io/s22) 826 | - :books: [ZK-STARK Theory & Implementation](https://berkeley-desys.github.io/assets/material/lec5_eli_ben_sasson_zk_stark.pdf) 827 | - :books: [Proofs, Arguments, and Zero-Knowledge](https://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.html), :scroll: [PDF](https://people.cs.georgetown.edu/jthaler/ProofsArgsAndZK.pdf), :video_camera: [Youtube](https://www.youtube.com/watch?v=esBIB_ZaFVg&list=PLj80z0cJm8QEmZkGgSOLpr_8B08SCWVQ7) 828 | - :books: [CSN09112 Module](https://github.com/billbuchanan/csn09112), :school: [Example file encryption using scrypt and NaCl for the gocrypto book](https://github.com/billbuchanan/filecrypt) 829 | - :books: [ECE/CS 598 AM: Cryptography with Ideal Functionalities](https://decentralize.ece.illinois.edu/ece-cs-598-am-cryptography-with-ideal-functionalities/) 830 | - :books: [Einführung in die Kryptographie von Christof Paar](https://www.youtube.com/channel/UCuJu8DOJLMltMt8RcX1tdBw/videos) 831 | - :books: [Decentralized Systems Lab](https://decentralize.ece.illinois.edu/) 832 | - :books: [Zero-Knowledge Proofs](https://zkp.science/) 833 | - :books: [Lecture slides Blockchain-based Systems Engineering](https://github.com/sebischair/bbse) 834 | - :books: [Iden3 Documentation: Publications](https://docs.iden3.io/publications/publications/) 835 | - :books: [Onur Mutlu: Digital Design and Computer Architecture Spring 2020 (252-0028-00L)](https://safari.ethz.ch/digitaltechnik/spring2020/doku.php?id=start) 836 | - :books: [Onur Mutlu: Lecture Video Playlist on YouTube](https://safari.ethz.ch/digitaltechnik/spring2019/doku.php?id=schedule) 837 | - :books: [Andrew Miller: ECE498AC/CS498AM: Applied Cryptography, Fall 2019](https://soc1024.ece.illinois.edu/teaching/ece498ac/fall2019/) 838 | - :books: [Decentralized Systems Lab: Courses](https://decentralize.ece.illinois.edu/courses/) 839 | - :books: [Christine Parlour, Dawn Song: CS294-177/CS194-177/PHDBA 297T.1/MFE 230T.3: Decentralized Finance](https://berkeley-defi.github.io/f21) 840 | - :books: [Intuitive Advanced Cryptography](https://raw.githubusercontent.com/cryptosubtlety/intuitive-advanced-cryptography/master/advancedcrypto.pdf) 841 | - :books: [A Graduate Course in Applied Cryptography](https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_5.pdf) 842 | - :video_camera: [IC3 Initiative for Cryptocurrencies and Contracts](https://www.youtube.com/channel/UCz-eTbD4kHkYxGhUfXawHow) 843 | - :video_camera: [DeFi MOOC](https://www.youtube.com/channel/UCB67PxhB5LAWEbI4etQS7aw) 844 | - :video_camera: [CryptoClear](https://www.youtube.com/c/CryptoClear) 845 | - :video_camera: [UC Model Youtube: MACS Frontier](https://www.youtube.com/channel/UCIm7ruYT6rUvhm76YeIKiLw) 846 | - :video_camera: [Zero Knowledge](https://www.youtube.com/channel/UCYWsYz5cKw4wZ9Mpe4kuM_g) 847 | - :video_camera: [Grand Amphi Théatre](https://www.youtube.com/channel/UC_kOxlaYNOTtNwtwySZ0B8w) 848 | - :video_camera: [ZK Whiteboard Sessions](https://www.youtube.com/playlist?list=PLj80z0cJm8QErn3akRcqvxUsyXWC81OGq) 849 | 850 | ### Researchers to follow by domain 851 | 852 | 853 | 854 | 855 | 856 | 857 | 858 | 859 | 860 | 861 | 862 | 863 | 864 | 865 | 866 | 867 | 868 | 869 | 870 | 871 | 872 | 873 | 874 | 875 | 876 | 877 | 878 | 879 | 880 | 881 | 882 | 883 | 884 | 885 | 886 | 887 | 888 | 889 | 890 | 891 | 892 | 893 | 894 | 895 | 896 | 897 | 898 | 899 | 900 | 901 | 902 | 903 | 904 | 905 | 906 | 907 | 908 | 909 | 910 | 911 | 912 | 913 | 914 | 915 | 916 | 917 | 918 | 919 | 920 | 921 | 922 | 923 | 924 | 925 | 926 | 927 | 928 | 929 | 930 | 931 | 932 | 933 | 934 | 935 | 936 | 937 | 938 | 939 | 940 | 941 | 942 | 943 | 944 | 945 | 946 | 947 | 948 | 949 | 950 | 951 | 952 | 953 | 954 | 955 | 956 | 957 | 958 | 959 | 960 | 961 | 962 | 963 | 964 | 965 | 966 | 967 | 968 | 969 | 970 | 971 | 972 | 973 | 974 | 975 | 976 | 977 | 978 | 979 | 980 | 981 | 982 | 983 | 984 | 985 | 986 | 987 | 988 | 989 | 990 |
NameBlockchain SecurityConsensus AlgorithmsDecentralized FinanceMPC / ZK Research
Dan Boneh
Silvio Micali
Vitalik Buterin
Andrew Miller
Dawn Song
Arthur Gervais
Bryan Ford
Benedikt Bünz
Raluca Ada Popa
Pratyush Mishra
Joseph Bonneau
Paul Grubbs
Ariel Gabizon
Shafi Goldwasser
Justin Thaler
Xiao Wang
Eli Ben-Sasson
Alessandro Chiesa
991 | 992 | ### Conferences 993 | 994 | - :bomb: [Cryptography Conferences](https://waset.org/cryptography-conferences) 995 | - :bomb: [Security and Privacy Conference Deadlines](https://sec-deadlines.github.io/) 996 | - :bomb: [Security Conference Ranking](https://people.engr.tamu.edu/guofei/sec_conf_stat.htm) 997 | - :airplane: [CESC: Crypto Economics Security Conference](https://cesc.io/) 998 | - :airplane: [ICBC: IEEE International Conference on Blockchain and Cryptocurrency](https://icbc2023.ieee-icbc.org/authors/call-papers) 999 | - :airplane: [CAAW: 1st International Workshop on Cryptoasset Analytics](https://caaw.io/) 1000 | - :airplane: [IEEE-Security](https://www.ieee-security.org/) 1001 | - :airplane: [Usenix Security Symposium](https://www.usenix.org/conferences/byname/108) 1002 | - :airplane: [Eurocrypt](https://eurocrypt.iacr.org/2023/) 1003 | - :airplane: [Crypto](https://www.iacr.org/conferences/) 1004 | - :airplane: [S&P: IEEE Symposium on Security and Privacy](https://www.ieee-security.org/TC/SP-Index.html) 1005 | - :airplane: [NDSS Symposium](https://www.ndss-symposium.org/) 1006 | - :airplane: [CCS (sigsag): ACM Conference on Computer and Communications Security](https://www.sigsac.org/ccs.html) 1007 | 1008 | ### Grants 1009 | 1010 | - :moneybag: [Gitcoin Grants](https://gitcoin.co/grants/) 1011 | - :moneybag: [Andreessen Horowitz (a16z) Seeds](https://a16z.com/seed/) 1012 | - :moneybag: [Y Combinator Funding](https://www.ycombinator.com/apply) 1013 | - :moneybag: [EWOR](https://www.ewor.com/) 1014 | - :moneybag: [Moonrock Capital](https://www.moonrockcapital.io/) 1015 | 1016 | ### Scientific Writing 1017 | 1018 | - :scroll: [Scientific Methods in Computer Science](http://poincare.math.rs/~vladaf/Courses/Matf%20MNSR/Literatura/Scientific%20Methods%20in%20Computer%20Science.pdf), [second_link](https://john.cs.olemiss.edu/~hcc/researchMethods/2014spr/notes/localcopy/cs_method.pdf) 1019 | - :video_camera: [How to Write a Great Research Paper (7 Excellent Tips)](https://www.youtube.com/watch?v=VEXaUHNmpQw) 1020 | - :scroll: [Benchmarking Crimes: An Emerging Threat in Systems Security](https://arxiv.org/pdf/1801.02381.pdf) 1021 | 1022 | ## Companies 1023 | 1024 | ### Blockchain Development 1025 | 1026 | - :computer: [Consensys](https://consensys.net/) 1027 | - :computer: [Infura](https://www.infura.io/) 1028 | - :computer: [Polygon](https://polygon.technology/) 1029 | 1030 | ### Identity Management 1031 | 1032 | - :scroll: [Hyperledger CL Credentials](https://github.com/hyperledger/ursa-docs/blob/main/docs/features/attribute_equality_anoncreds.md) 1033 | - :scroll: [Hyperledger BBS+ Credentials](https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjprZizn-n5AhWcXvEDHRjMCdAQFnoECAYQAQ&url=https%3A%2F%2Fwiki.hyperledger.org%2Fdownload%2Fattachments%2F6426712%2FAnoncreds2.1.pdf&usg=AOvVaw2B-a7JFWfJ1LVFOidVWVhD), :scroll: [PDF Title: Anonymous credentials 2.0](Anoncreds2.1-3.pdf) 1034 | - :computer: [Veramo](https://veramo.io/), :school: [docs](https://veramo.io/docs/basics/introduction/), :school: [specs](https://github.com/uport-project/specs) 1035 | - :computer: [SpruceID](https://www.spruceid.com/), :school: [docs](https://www.spruceid.dev/), :school: [cryptoscript](https://github.com/spruceid/cryptoscript) 1036 | - :computer: [iden3](https://iden3.io/), :school: [docs](https://docs.iden3.io/) 1037 | - :computer: [Mattr](https://mattr.global/), :school: [docs](https://github.com/mattrglobal), :green_book: [learn](https://learn.mattr.global/docs/concepts/digital-identity) 1038 | - :computer: [Trinsic](https://trinsic.id/), :school: [docs](https://docs.trinsic.id/docs/introduction) 1039 | - :computer: [Lukso](https://lukso.network/), :school: [docs](https://docs.lukso.tech/) 1040 | - :computer: [Ceramic](https://ceramic.network/), :school: [docs](https://developers.ceramic.network/docs/advanced/standards/application-protocols/identity-index/) 1041 | - :computer: [Ocean Protocol](https://oceanprotocol.com/), :school: [docs](https://github.com/oceanprotocol/docs) 1042 | - :computer: [Secret Network](https://scrt.network/), :school: [docs](https://docs.scrt.network/secret-network-documentation/) 1043 | - :computer: [Oasis Labs](https://www.oasislabs.com/), :school: [docs](https://docs.oasislabs.com/parcel/latest/quickstart/getting-started.html) 1044 | - :computer: [iExec](https://iex.ec/), :school: [docs](https://docs.iex.ec/) 1045 | - :computer: [Sia](https://siawiki.tech/) 1046 | - :computer: [Kepler](https://www.kepler.xyz/), :school: [docs](https://github.com/spruceid) 1047 | - :computer: [Storj](https://www.storj.io/), :scroll: [paper](https://www.storj.io/storj.pdf) 1048 | - :computer: [Filecoin](https://filecoin.io/), :scroll: [paper](https://filecoin.io/filecoin.pdf) 1049 | - :computer: [Gitcoin Passport](https://passport.gitcoin.co/) 1050 | - :computer: [Sismo](https://www.sismo.io/) 1051 | - (optional) :computer: [brightID](https://www.brightid.org/), :school: [docs](https://github.com/BrightID) 1052 | - (optional) :computer: [civic](https://www.civic.com/), :school: [docs](https://docs.civic.com/) 1053 | - (optional) :computer: [Decentralized Identity Foundation](https://identity.foundation/), :school: [docs](https://github.com/decentralized-identity) 1054 | - (optional) :computer: [ShoCard](https://www.shocard.com/en.html), :school: [docs](https://www.shocard.com/en/developer.html) 1055 | - (optional) :computer: [Phala](https://www.phala.network/en/), :school: [docs](https://wiki.phala.network/en-us/build/developer/intro/) 1056 | - (optional) :computer: [iDX](https://idx.xyz/), :school: [docs](https://developers.idx.xyz/learn/welcome/) 1057 | - (optional) :computer: [Serto](https://www.serto.id/), :school: [docs](https://docs.serto.id/docs/intro) 1058 | 1059 | ### Storage Network 1060 | 1061 | - :computer: [Smart contracts + provable storage = FVM](https://fvm.filecoin.io/) 1062 | - :green_book: [Decentralized Web Node](https://identity.foundation/decentralized-web-node/spec/#abstract) 1063 | - :school: [Decentralized Web Node (DWN) SDK](https://developer.tbd.website/projects/dwn-sdk-js/readme/) 1064 | 1065 | ### Data Management 1066 | 1067 | - :computer: (airdrop) [POAP - The bookmarks of your life](https://poap.xyz/) 1068 | - :computer: [Atlan: The new way for data-driven teams to discover, understand, trust, and collaborate on data assets](https://atlan.com/) 1069 | - :computer: [Promethium: Fast Data Discovery and Governance](https://www.pm61data.com/) 1070 | - :computer: [Steem: Powering Communities and Opportunities](https://steem.com/) 1071 | - :computer: [Affinidi: Changing data ownership for good](https://www.affinidi.com/) 1072 | - :computer: [GET protocol: Ticketing is the start of something bigger](https://www.get-protocol.io/white-label) 1073 | - :computer: [SISMO: The key primitive for web3 identities](https://www.sismo.io/) 1074 | - :computer: [Proof of Interest](https://whitepaper.firstbatch.xyz/) 1075 | - :computer: [MystenLabs: Enigneering asset ownership](https://mystenlabs.com/) 1076 | 1077 | ### Resolution 1078 | 1079 | - :computer: [Decentralized naming and certificate authority](https://handshake.org/) 1080 | - :school: [An ACME-based certificate authority, written in Go](https://github.com/letsencrypt/boulder) 1081 | - :computer: [ENS](https://docs.ens.domains/) 1082 | - :scroll: [Ethereum Name Service: the Good, the Bad, and the Ugly](https://arxiv.org/pdf/2104.05185.pdf?ref=https://githubhelp.com) 1083 | - :file_folder: [Asecuritysite: DNSSEC](https://asecuritysite.com/encryption/go_dnssec) 1084 | - :computer: [The industry leading Web3 API](https://www.alchemy.com/supernode) 1085 | - :computer: [The World’s Most Powerful Blockchain Development Suite](https://infura.io/) 1086 | - :file_folder: [Sign-in with Ethereum RFP](https://notes.ethereum.org/@djrtwo/sign-in-with-ethereum-RFP) 1087 | - :file_folder: [Ceramic Protocol Specification](https://github.com/ceramicnetwork/ceramic/blob/main/SPECIFICATION.md#looking-up-a-stream) 1088 | - :computer: (web2) [Okta](https://www.okta.com/products/single-sign-on/) 1089 | - :video_camera: (web2) [Youtube: OAuth 2.0 & OpenID Connect (OIDC): Technical Overview](https://www.youtube.com/watch?v=rTzlF-U9Y6Y) 1090 | 1091 | ### Asset Management 1092 | 1093 | - :computer: [Asset management for a DeFi world](https://www.tokensets.com/) 1094 | - :computer: [Institutional crypto-capital network](https://www.maple.finance/) 1095 | - :video_camera: [Data DAO part 1 DataDAO introduction](https://www.youtube.com/watch?v=8YuagajvFJ0&t=2s) 1096 | 1097 | ## Blockchain Projects 1098 | 1099 | - :anchor: [Ethereum](https://ethereum.org/en/) 1100 | - :anchor: [Algorand](https://www.algorand.com/) 1101 | - :anchor: [Avalanche](https://www.avax.network/) 1102 | - :anchor: [Tezos](https://tezos.com/) 1103 | - :anchor: [Cardano](https://cardano.org/) 1104 | - :anchor: [Internet Computer](https://internetcomputer.org/) 1105 | - :anchor: [Polkadot](https://polkadot.network/) 1106 | - :computer: [Ceramic](https://ceramic.network/) 1107 | 1108 | ## News 1109 | 1110 | - :video_camera: [Bankless](https://www.youtube.com/c/Bankless) 1111 | - :newspaper: [rekt](https://rekt.news/) 1112 | - :newspaper: [IC3 Newsletter.](https://myemail.constantcontact.com/IC3-Blockchain-Camp-Details-and-News.html?soid=1126638416463&aid=Mhix7NUji-U) 1113 | - :newspaper: [YCombinator: Hacker News](https://news.ycombinator.com/) 1114 | - :newspaper: [Web 5: TBD](https://developer.tbd.website/) 1115 | - :newspaper: [Tezos News](https://tezos.com/#news) 1116 | - :video_camera: [Grand Amphi Théatre](https://www.youtube.com/@grandamphitheatre6328) 1117 | 1118 | ------------------------------------------------------------ 1119 | 1120 | ## Others 1121 | 1122 | ### TLS1.3 1123 | 1124 | - :dizzy: [A Cryptographic Analysis of the TLS 1.3 Handshake Protocol](https://s3.amazonaws.com/files.douglas.stebila.ca/files/research/papers/JC-DFGS21.pdf) 1125 | - :scroll: [Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes](https://eprint.iacr.org/2011/202.pdf) 1126 | - [Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS](https://eprint.iacr.org/2016/475.pdf) 1127 | - :scroll: [Twisted Polynomials and Forgery Attacks on GCM](https://link.springer.com/content/pdf/10.1007/978-3-662-46800-5_29.pdf) 1128 | - :scroll: [GCM Security Bounds Reconsidered](https://link.springer.com/chapter/10.1007/978-3-662-48116-5_19) 1129 | - :scroll: [Message Franking via Committing Authenticated Encryption](https://www.iacr.org/archive/crypto2017/10401394/10401394.pdf) 1130 | - :scroll: [Fast Message Franking: From Invisible Salamanders to Encryptment](https://eprint.iacr.org/2019/016.pdf) 1131 | - :scroll: [Beyond Birthday Bound Secure MAC in Faulty Nonce Model](https://eprint.iacr.org/2019/127.pdf) 1132 | - :scroll: [Partitioning Oracle Attacks](https://www.usenix.org/system/files/sec21_slides_len.pdf) 1133 | - [Implementing and Proving the TLS 1.3 Record Layer](https://cseweb.ucsd.edu/~dstefan/cse227-spring20/papers/tls1.3.pdf) 1134 | - :bulb: [The Illustrated TLS 1.3 Connection](https://tls13.xargs.org/) 1135 | - [ROSEN: RObust and SElective Non-repudiation (for TLS)](https://dl.acm.org/doi/pdf/10.1145/3474123.3486763), [link2](https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/522340/3474123.3486763.pdf?sequence=3&isAllowed=y) 1136 | - [Whom You Gonna Trust? A Longitudinal Study on TLS Notary Services](https://publications.sba-research.org/publications/TLSnotaries_preprint.pdf) 1137 | - :scroll: [TLS-N: Non-repudiation over TLS Enabling Ubiquitous Content Signing](http://pages.cpsc.ucalgary.ca/~joel.reardon/blockchain/readings/ndss2018_09-4_Ritzdorf_paper.pdf) 1138 | 1139 | ### Decentralizing IoT Management 1140 | 1141 | - [Identity Management in IoT Networks Using Blockchain and Smart Contracts](https://ieeexplore-ieee-org.eaccess.ub.tum.de/stamp/stamp.jsp?tp=&arnumber=8726730&tag=1) 1142 | - [Smart Contract-Based Access Control for the Internet of Things](https://arxiv.org/pdf/1802.04410.pdf) 1143 | - [PPCA: Privacy-Preserving Conditional Actions for IoT Environments Using Smart Contracts](https://dl.acm.org/doi/pdf/10.1145/3360774.3360794) 1144 | - [LegIoT: Ledgered Trust Management Platform for IoT](https://www.researchgate.net/profile/Alexandra-Dmitrienko/publication/344292946_LegIoT_Ledgered_Trust_Management_Platform_for_IoT/links/605112d392851cd8ce484013/LegIoT-Ledgered-Trust-Management-Platform-for-IoT.pdf) 1145 | - [A Minimalist Approach to Formalizing Analog Sensor Security](https://oaklandsok.github.io/papers/yan2020.pdf) 1146 | - [SmartDID: A Novel Privacy-preserving Identity based on Blockchain for IoT](https://ieeexplore.ieee.org/abstract/document/9687671) 1147 | - [INVITED Things, Trouble, Trust: On Building Trust in IoT Systems](https://asset-pdf.scinapse.io/prod/2401503174/2401503174.pdf) 1148 | - [Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain](https://www.mdpi.com/2073-431X/10/1/7) 1149 | 1150 | ### Compiler Frameworks 1151 | 1152 | - [SIRNN: A Math Library for Secure RNN Inference](https://eprint.iacr.org/2021/459.pdf) 1153 | 1154 | ### Consensus 1155 | 1156 | - [Bullshark: DAG BFT Protocols Made Practical](https://sonnino.com/papers/bullshark.pdf) 1157 | 1158 | ### Blockchain networking 1159 | 1160 | - [Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees](https://arxiv.org/pdf/1805.11060.pdf) 1161 | 1162 | ### Securing Certificate Issuing 1163 | 1164 | - :scroll: [Experiences Deploying Multi-Vantage-Point Domain Validation at Let’s Encrypt](https://www.usenix.org/system/files/sec21-birge-lee.pdf) 1165 | - :scroll: [Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE](https://ieeexplore.ieee.org/abstract/document/9582795) 1166 | - :scroll: [CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability](https://eprint.iacr.org/2020/934.pdf) 1167 | - :scroll: [TeSC: TLS/SSL-Certificate Endorsed Smart Contracts](https://ieeexplore.ieee.org/abstract/document/9566203) 1168 | 1169 | ### DNSSEC 1170 | 1171 | - :scroll: [One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet](https://www.usenix.org/system/files/conference/nsdi17/nsdi17-shulman.pdf) 1172 | - :scroll: [Designing for Tussle in Encrypted DNS](https://dl.acm.org/doi/pdf/10.1145/3484266.3487383) 1173 | 1174 | ### Anonymity 1175 | 1176 | - :scroll: [k-ANONYMITY: A MODEL FOR PROTECTING PRIVACY](https://www.win.tue.nl/~jhartog/CourseVerif/Papers/10.1.1.90.4099.pdf) 1177 | 1178 | --- 1179 | --------------------------------------------------------------------------------