TCSE logo 
 Sigsoft logo
Sustainability badge
Sat 3 May 2025 11:40 - 12:00 at 206 - Paper session 1 - continued Chair(s): Ita Ryan

The Zupply framework introduces an anonymous authentication protocol that utilizes zero-knowledge proofs to ensure data integrity and participant anonymity and unlinkability within supply chains. Zupply employed the Groth16 zkSNARK, which requires a trusted setup. This paper explores the integration of Aurora, a transparent setup zkSNARK to the Zupply framework. This paper presents the core Zupply arithmetic circuits, including Auth, Trans, Merge, and Div, which allows succinct zero-knowledge proofs without exposing sensitive data. We evaluate the performance of the Zupply Aurora-based implementation across varying Merkle hash tree depths, comparing it to the original Groth16-based setup for BN254 and BLS12-381 elliptic curves.

Sat 3 May

Displayed time zone: Eastern Time (US & Canada) change

11:00 - 12:30
Paper session 1 - continuedEnCyCriS at 206
Chair(s): Ita Ryan University College Cork
11:00
20m
Paper
Cyberspace Vigilante or Security Sleuth: Understanding Who Threat Hunters Are
EnCyCriS
Samantha Hill University of Victoria, Alessandra Maciel Paz Milani University of Victoria, Callum Curtis University of Victoria, Arty Starr University of Victoria, Enrique Larios Vargas University of Victoria, Marcus Dunn University of Victoria, Margaret-Anne Storey University of Victoria
11:20
20m
Paper
Enhanced Detection of Code Vulnerability with Synergy between Data-Driven, Rule-Based and Unsupervised Learnings
EnCyCriS
Hibah Mohammed Ghouse Hubspot, Samiha Shimmi Northern Illinois University, Mona Rahimi Northern Illinois University
11:40
20m
Paper
Evaluating the Integration of Aurora zkSNARK in the Zupply Framework
EnCyCriS
Mohammadtaghi Badakhshan University of Waterloo, Guang Gong University of Waterloo
12:00
30m
Panel
Panel based discussions and open questions - morning session
EnCyCriS

:
:
:
: