ICSE 2025 (series) / EnCyCriS 2025 (series) / EnCyCriS 2025 /
Evaluating the Integration of Aurora zkSNARK in the Zupply Framework
The Zupply framework introduces an anonymous authentication protocol that utilizes zero-knowledge proofs to ensure data integrity and participant anonymity and unlinkability within supply chains. Zupply employed the Groth16 zkSNARK, which requires a trusted setup. This paper explores the integration of Aurora, a transparent setup zkSNARK to the Zupply framework. This paper presents the core Zupply arithmetic circuits, including Auth, Trans, Merge, and Div, which allows succinct zero-knowledge proofs without exposing sensitive data. We evaluate the performance of the Zupply Aurora-based implementation across varying Merkle hash tree depths, comparing it to the original Groth16-based setup for BN254 and BLS12-381 elliptic curves.
Sat 3 MayDisplayed time zone: Eastern Time (US & Canada) change
Sat 3 May
Displayed time zone: Eastern Time (US & Canada) change
11:00 - 12:30 | |||
11:00 20mPaper | Cyberspace Vigilante or Security Sleuth: Understanding Who Threat Hunters Are EnCyCriS Samantha Hill University of Victoria, Alessandra Maciel Paz Milani University of Victoria, Callum Curtis University of Victoria, Arty Starr University of Victoria, Enrique Larios Vargas University of Victoria, Marcus Dunn University of Victoria, Margaret-Anne Storey University of Victoria | ||
11:20 20mPaper | Enhanced Detection of Code Vulnerability with Synergy between Data-Driven, Rule-Based and Unsupervised Learnings EnCyCriS Hibah Mohammed Ghouse Hubspot, Samiha Shimmi Northern Illinois University, Mona Rahimi Northern Illinois University | ||
11:40 20mPaper | Evaluating the Integration of Aurora zkSNARK in the Zupply Framework EnCyCriS | ||
12:00 30mPanel | Panel based discussions and open questions - morning session EnCyCriS |